From dc7def3b94ad0ade2f7d7d238cf1b0f08d169ae4 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 12 Sep 2023 16:00:29 +0000 Subject: [PATCH] Auto-Update: 2023-09-12T16:00:26.041015+00:00 --- CVE-2013/CVE-2013-45xx/CVE-2013-4589.json | 26 ++- CVE-2014/CVE-2014-15xx/CVE-2014-1505.json | 6 +- CVE-2014/CVE-2014-35xx/CVE-2014-3566.json | 148 +++++++++++++++-- CVE-2015/CVE-2015-04xx/CVE-2015-0405.json | 12 +- CVE-2015/CVE-2015-04xx/CVE-2015-0423.json | 12 +- CVE-2015/CVE-2015-04xx/CVE-2015-0438.json | 12 +- CVE-2015/CVE-2015-27xx/CVE-2015-2708.json | 12 +- CVE-2015/CVE-2015-27xx/CVE-2015-2709.json | 12 +- CVE-2015/CVE-2015-27xx/CVE-2015-2710.json | 12 +- CVE-2015/CVE-2015-27xx/CVE-2015-2713.json | 12 +- CVE-2015/CVE-2015-27xx/CVE-2015-2716.json | 12 +- CVE-2015/CVE-2015-27xx/CVE-2015-2721.json | 14 +- CVE-2015/CVE-2015-27xx/CVE-2015-2722.json | 12 +- CVE-2015/CVE-2015-27xx/CVE-2015-2724.json | 12 +- CVE-2015/CVE-2015-27xx/CVE-2015-2725.json | 12 +- CVE-2015/CVE-2015-27xx/CVE-2015-2726.json | 12 +- CVE-2015/CVE-2015-27xx/CVE-2015-2730.json | 14 +- CVE-2015/CVE-2015-27xx/CVE-2015-2735.json | 12 +- CVE-2015/CVE-2015-27xx/CVE-2015-2736.json | 12 +- CVE-2015/CVE-2015-27xx/CVE-2015-2739.json | 12 +- CVE-2015/CVE-2015-27xx/CVE-2015-2740.json | 12 +- CVE-2015/CVE-2015-27xx/CVE-2015-2743.json | 12 +- CVE-2015/CVE-2015-44xx/CVE-2015-4495.json | 12 +- CVE-2015/CVE-2015-68xx/CVE-2015-6815.json | 32 ++-- CVE-2015/CVE-2015-88xx/CVE-2015-8816.json | 22 +-- CVE-2015/CVE-2015-89xx/CVE-2015-8918.json | 12 +- CVE-2015/CVE-2015-89xx/CVE-2015-8919.json | 12 +- CVE-2015/CVE-2015-89xx/CVE-2015-8920.json | 12 +- CVE-2015/CVE-2015-89xx/CVE-2015-8921.json | 12 +- CVE-2015/CVE-2015-89xx/CVE-2015-8922.json | 12 +- CVE-2015/CVE-2015-89xx/CVE-2015-8923.json | 12 +- CVE-2015/CVE-2015-89xx/CVE-2015-8924.json | 12 +- CVE-2016/CVE-2016-03xx/CVE-2016-0363.json | 32 ++-- CVE-2016/CVE-2016-03xx/CVE-2016-0376.json | 32 ++-- CVE-2016/CVE-2016-15xx/CVE-2016-1583.json | 22 +-- CVE-2016/CVE-2016-21xx/CVE-2016-2184.json | 22 +-- CVE-2016/CVE-2016-21xx/CVE-2016-2185.json | 32 ++-- CVE-2016/CVE-2016-21xx/CVE-2016-2186.json | 32 ++-- CVE-2016/CVE-2016-21xx/CVE-2016-2187.json | 12 +- CVE-2016/CVE-2016-21xx/CVE-2016-2188.json | 32 ++-- CVE-2016/CVE-2016-28xx/CVE-2016-2815.json | 22 +-- CVE-2016/CVE-2016-28xx/CVE-2016-2818.json | 22 +-- CVE-2016/CVE-2016-28xx/CVE-2016-2834.json | 22 +-- CVE-2016/CVE-2016-28xx/CVE-2016-2847.json | 32 ++-- CVE-2016/CVE-2016-31xx/CVE-2016-3134.json | 32 ++-- CVE-2016/CVE-2016-31xx/CVE-2016-3136.json | 22 +-- CVE-2016/CVE-2016-31xx/CVE-2016-3137.json | 32 ++-- CVE-2016/CVE-2016-31xx/CVE-2016-3138.json | 32 ++-- CVE-2016/CVE-2016-31xx/CVE-2016-3139.json | 22 +-- CVE-2016/CVE-2016-31xx/CVE-2016-3140.json | 32 ++-- CVE-2016/CVE-2016-31xx/CVE-2016-3156.json | 22 +-- CVE-2016/CVE-2016-36xx/CVE-2016-3672.json | 12 +- CVE-2016/CVE-2016-36xx/CVE-2016-3689.json | 22 +-- CVE-2016/CVE-2016-44xx/CVE-2016-4482.json | 32 ++-- CVE-2016/CVE-2016-44xx/CVE-2016-4485.json | 12 +- CVE-2016/CVE-2016-44xx/CVE-2016-4486.json | 32 ++-- CVE-2016/CVE-2016-45xx/CVE-2016-4569.json | 32 ++-- CVE-2016/CVE-2016-49xx/CVE-2016-4913.json | 12 +- CVE-2016/CVE-2016-49xx/CVE-2016-4997.json | 22 +-- CVE-2016/CVE-2016-77xx/CVE-2016-7796.json | 12 +- CVE-2016/CVE-2016-99xx/CVE-2016-9960.json | 12 +- CVE-2016/CVE-2016-99xx/CVE-2016-9961.json | 12 +- CVE-2020/CVE-2020-193xx/CVE-2020-19319.json | 4 +- CVE-2020/CVE-2020-193xx/CVE-2020-19320.json | 4 +- CVE-2020/CVE-2020-193xx/CVE-2020-19323.json | 4 +- CVE-2020/CVE-2020-195xx/CVE-2020-19559.json | 4 +- CVE-2021/CVE-2021-210xx/CVE-2021-21088.json | 102 +++++++++++- CVE-2021/CVE-2021-286xx/CVE-2021-28644.json | 80 +++++++++- CVE-2021/CVE-2021-359xx/CVE-2021-35980.json | 80 +++++++++- CVE-2021/CVE-2021-398xx/CVE-2021-39859.json | 138 +++++++++++++++- CVE-2021/CVE-2021-403xx/CVE-2021-40365.json | 16 +- CVE-2021/CVE-2021-406xx/CVE-2021-40698.json | 109 ++++++++++++- CVE-2021/CVE-2021-406xx/CVE-2021-40699.json | 121 +++++++++++++- CVE-2021/CVE-2021-407xx/CVE-2021-40723.json | 76 ++++++++- CVE-2021/CVE-2021-427xx/CVE-2021-42734.json | 66 +++++++- CVE-2021/CVE-2021-430xx/CVE-2021-43018.json | 52 +++++- CVE-2021/CVE-2021-437xx/CVE-2021-43753.json | 53 +++++- CVE-2021/CVE-2021-446xx/CVE-2021-44693.json | 50 +++--- CVE-2021/CVE-2021-446xx/CVE-2021-44694.json | 54 +++---- CVE-2021/CVE-2021-446xx/CVE-2021-44695.json | 54 +++---- CVE-2022/CVE-2022-14xx/CVE-2022-1415.json | 4 +- CVE-2022/CVE-2022-240xx/CVE-2022-24093.json | 55 +++++++ CVE-2022/CVE-2022-256xx/CVE-2022-25645.json | 8 +- CVE-2022/CVE-2022-259xx/CVE-2022-25901.json | 24 +-- CVE-2022/CVE-2022-391xx/CVE-2022-39158.json | 4 +- CVE-2022/CVE-2022-439xx/CVE-2022-43958.json | 40 ++++- CVE-2022/CVE-2022-450xx/CVE-2022-45044.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48474.json | 55 +++++++ CVE-2022/CVE-2022-484xx/CVE-2022-48475.json | 55 +++++++ CVE-2022/CVE-2022-48xx/CVE-2022-4896.json | 55 +++++++ CVE-2023/CVE-2023-20xx/CVE-2023-2071.json | 55 +++++++ CVE-2023/CVE-2023-255xx/CVE-2023-25519.json | 55 +++++++ CVE-2023/CVE-2023-261xx/CVE-2023-26142.json | 47 ++++++ CVE-2023/CVE-2023-271xx/CVE-2023-27169.json | 32 ++++ CVE-2023/CVE-2023-27xx/CVE-2023-2705.json | 4 +- CVE-2023/CVE-2023-287xx/CVE-2023-28766.json | 4 +- CVE-2023/CVE-2023-288xx/CVE-2023-28831.json | 55 +++++++ CVE-2023/CVE-2023-308xx/CVE-2023-30800.json | 59 ++++++- CVE-2023/CVE-2023-30xx/CVE-2023-3039.json | 55 +++++++ CVE-2023/CVE-2023-310xx/CVE-2023-31067.json | 4 +- CVE-2023/CVE-2023-310xx/CVE-2023-31068.json | 4 +- CVE-2023/CVE-2023-310xx/CVE-2023-31069.json | 4 +- CVE-2023/CVE-2023-314xx/CVE-2023-31468.json | 4 +- CVE-2023/CVE-2023-31xx/CVE-2023-3169.json | 4 +- CVE-2023/CVE-2023-31xx/CVE-2023-3170.json | 4 +- CVE-2023/CVE-2023-320xx/CVE-2023-32005.json | 20 +++ CVE-2023/CVE-2023-325xx/CVE-2023-32558.json | 20 +++ CVE-2023/CVE-2023-326xx/CVE-2023-32672.json | 47 +++++- CVE-2023/CVE-2023-334xx/CVE-2023-33466.json | 6 +- CVE-2023/CVE-2023-343xx/CVE-2023-34357.json | 31 +++- CVE-2023/CVE-2023-356xx/CVE-2023-35658.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35664.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35665.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35666.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35667.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35669.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35670.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35671.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35673.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35674.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35675.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35676.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35677.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35679.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35680.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35681.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35682.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35683.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35684.json | 4 +- CVE-2023/CVE-2023-356xx/CVE-2023-35687.json | 4 +- CVE-2023/CVE-2023-35xx/CVE-2023-3510.json | 4 +- CVE-2023/CVE-2023-364xx/CVE-2023-36497.json | 4 +- CVE-2023/CVE-2023-366xx/CVE-2023-36635.json | 79 ++++++++- CVE-2023/CVE-2023-36xx/CVE-2023-3612.json | 4 +- CVE-2023/CVE-2023-374xx/CVE-2023-37489.json | 59 +++++++ CVE-2023/CVE-2023-377xx/CVE-2023-37798.json | 75 ++++++++- CVE-2023/CVE-2023-378xx/CVE-2023-37875.json | 55 +++++++ CVE-2023/CVE-2023-378xx/CVE-2023-37878.json | 55 +++++++ CVE-2023/CVE-2023-378xx/CVE-2023-37879.json | 55 +++++++ CVE-2023/CVE-2023-378xx/CVE-2023-37881.json | 55 +++++++ CVE-2023/CVE-2023-379xx/CVE-2023-37941.json | 48 +++++- CVE-2023/CVE-2023-380xx/CVE-2023-38070.json | 55 +++++++ CVE-2023/CVE-2023-380xx/CVE-2023-38071.json | 55 +++++++ CVE-2023/CVE-2023-380xx/CVE-2023-38072.json | 55 +++++++ CVE-2023/CVE-2023-380xx/CVE-2023-38073.json | 55 +++++++ CVE-2023/CVE-2023-380xx/CVE-2023-38074.json | 55 +++++++ CVE-2023/CVE-2023-380xx/CVE-2023-38075.json | 55 +++++++ CVE-2023/CVE-2023-380xx/CVE-2023-38076.json | 55 +++++++ CVE-2023/CVE-2023-382xx/CVE-2023-38256.json | 4 +- CVE-2023/CVE-2023-386xx/CVE-2023-38605.json | 96 ++++++++++- CVE-2023/CVE-2023-386xx/CVE-2023-38616.json | 65 +++++++- CVE-2023/CVE-2023-387xx/CVE-2023-38743.json | 4 +- CVE-2023/CVE-2023-388xx/CVE-2023-38829.json | 4 +- CVE-2023/CVE-2023-388xx/CVE-2023-38878.json | 4 +- CVE-2023/CVE-2023-390xx/CVE-2023-39063.json | 4 +- CVE-2023/CVE-2023-390xx/CVE-2023-39068.json | 4 +- CVE-2023/CVE-2023-390xx/CVE-2023-39069.json | 4 +- CVE-2023/CVE-2023-390xx/CVE-2023-39070.json | 4 +- CVE-2023/CVE-2023-391xx/CVE-2023-39150.json | 24 +++ CVE-2023/CVE-2023-392xx/CVE-2023-39227.json | 4 +- CVE-2023/CVE-2023-392xx/CVE-2023-39265.json | 47 +++++- CVE-2023/CVE-2023-393xx/CVE-2023-39318.json | 85 +++++++++- CVE-2023/CVE-2023-393xx/CVE-2023-39319.json | 84 +++++++++- CVE-2023/CVE-2023-393xx/CVE-2023-39320.json | 78 ++++++++- CVE-2023/CVE-2023-393xx/CVE-2023-39321.json | 78 ++++++++- CVE-2023/CVE-2023-394xx/CVE-2023-39420.json | 46 +++++- CVE-2023/CVE-2023-395xx/CVE-2023-39584.json | 85 +++++++++- CVE-2023/CVE-2023-396xx/CVE-2023-39637.json | 32 ++++ CVE-2023/CVE-2023-396xx/CVE-2023-39676.json | 73 ++++++++- CVE-2023/CVE-2023-397xx/CVE-2023-39780.json | 4 +- CVE-2023/CVE-2023-399xx/CVE-2023-39956.json | 168 +++++++++++++++++++- CVE-2023/CVE-2023-400xx/CVE-2023-40032.json | 4 +- CVE-2023/CVE-2023-401xx/CVE-2023-40150.json | 4 +- CVE-2023/CVE-2023-402xx/CVE-2023-40218.json | 43 +++++ CVE-2023/CVE-2023-403xx/CVE-2023-40306.json | 16 +- CVE-2023/CVE-2023-403xx/CVE-2023-40308.json | 59 +++++++ CVE-2023/CVE-2023-403xx/CVE-2023-40309.json | 59 +++++++ CVE-2023/CVE-2023-403xx/CVE-2023-40392.json | 116 +++++++++++++- CVE-2023/CVE-2023-403xx/CVE-2023-40397.json | 71 ++++++++- CVE-2023/CVE-2023-404xx/CVE-2023-40440.json | 4 +- CVE-2023/CVE-2023-404xx/CVE-2023-40442.json | 4 +- CVE-2023/CVE-2023-405xx/CVE-2023-40591.json | 58 ++++++- CVE-2023/CVE-2023-406xx/CVE-2023-40611.json | 36 +++++ CVE-2023/CVE-2023-406xx/CVE-2023-40621.json | 59 +++++++ CVE-2023/CVE-2023-406xx/CVE-2023-40622.json | 59 +++++++ CVE-2023/CVE-2023-406xx/CVE-2023-40623.json | 59 +++++++ CVE-2023/CVE-2023-406xx/CVE-2023-40624.json | 59 +++++++ CVE-2023/CVE-2023-406xx/CVE-2023-40625.json | 59 +++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40712.json | 40 +++++ CVE-2023/CVE-2023-407xx/CVE-2023-40724.json | 55 +++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40725.json | 55 +++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40726.json | 55 +++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40727.json | 55 +++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40728.json | 55 +++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40729.json | 55 +++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40730.json | 55 +++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40731.json | 55 +++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40732.json | 55 +++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40784.json | 20 +++ CVE-2023/CVE-2023-408xx/CVE-2023-40834.json | 24 +++ CVE-2023/CVE-2023-409xx/CVE-2023-40944.json | 4 +- CVE-2023/CVE-2023-409xx/CVE-2023-40945.json | 4 +- CVE-2023/CVE-2023-409xx/CVE-2023-40946.json | 4 +- CVE-2023/CVE-2023-40xx/CVE-2023-4022.json | 4 +- CVE-2023/CVE-2023-40xx/CVE-2023-4060.json | 4 +- CVE-2023/CVE-2023-410xx/CVE-2023-41013.json | 24 +++ CVE-2023/CVE-2023-410xx/CVE-2023-41032.json | 55 +++++++ CVE-2023/CVE-2023-410xx/CVE-2023-41033.json | 55 +++++++ CVE-2023/CVE-2023-410xx/CVE-2023-41053.json | 73 ++++++++- CVE-2023/CVE-2023-410xx/CVE-2023-41061.json | 103 ++++++++++-- CVE-2023/CVE-2023-410xx/CVE-2023-41064.json | 124 ++++++++++++++- CVE-2023/CVE-2023-411xx/CVE-2023-41103.json | 4 +- CVE-2023/CVE-2023-412xx/CVE-2023-41256.json | 4 +- CVE-2023/CVE-2023-413xx/CVE-2023-41336.json | 4 +- CVE-2023/CVE-2023-413xx/CVE-2023-41367.json | 59 +++++++ CVE-2023/CVE-2023-413xx/CVE-2023-41368.json | 59 +++++++ CVE-2023/CVE-2023-413xx/CVE-2023-41369.json | 59 +++++++ CVE-2023/CVE-2023-415xx/CVE-2023-41594.json | 73 ++++++++- CVE-2023/CVE-2023-416xx/CVE-2023-41615.json | 73 ++++++++- CVE-2023/CVE-2023-418xx/CVE-2023-41846.json | 55 +++++++ CVE-2023/CVE-2023-418xx/CVE-2023-41879.json | 4 +- CVE-2023/CVE-2023-419xx/CVE-2023-41934.json | 70 +++++++- CVE-2023/CVE-2023-419xx/CVE-2023-41990.json | 4 +- CVE-2023/CVE-2023-424xx/CVE-2023-42472.json | 59 +++++++ CVE-2023/CVE-2023-42xx/CVE-2023-4270.json | 4 +- CVE-2023/CVE-2023-42xx/CVE-2023-4278.json | 4 +- CVE-2023/CVE-2023-42xx/CVE-2023-4294.json | 4 +- CVE-2023/CVE-2023-43xx/CVE-2023-4307.json | 4 +- CVE-2023/CVE-2023-43xx/CVE-2023-4314.json | 4 +- CVE-2023/CVE-2023-43xx/CVE-2023-4318.json | 4 +- CVE-2023/CVE-2023-46xx/CVE-2023-4685.json | 66 +++++++- CVE-2023/CVE-2023-47xx/CVE-2023-4759.json | 67 ++++++++ CVE-2023/CVE-2023-48xx/CVE-2023-4807.json | 14 +- CVE-2023/CVE-2023-48xx/CVE-2023-4809.json | 137 +++++++++++++++- CVE-2023/CVE-2023-48xx/CVE-2023-4815.json | 57 ++++++- CVE-2023/CVE-2023-48xx/CVE-2023-4840.json | 63 ++++++++ CVE-2023/CVE-2023-48xx/CVE-2023-4863.json | 24 +++ CVE-2023/CVE-2023-48xx/CVE-2023-4887.json | 59 +++++++ CVE-2023/CVE-2023-48xx/CVE-2023-4890.json | 63 ++++++++ CVE-2023/CVE-2023-48xx/CVE-2023-4893.json | 59 +++++++ CVE-2023/CVE-2023-48xx/CVE-2023-4897.json | 4 +- CVE-2023/CVE-2023-48xx/CVE-2023-4898.json | 4 +- CVE-2023/CVE-2023-48xx/CVE-2023-4899.json | 4 +- CVE-2023/CVE-2023-49xx/CVE-2023-4913.json | 59 +++++++ CVE-2023/CVE-2023-49xx/CVE-2023-4914.json | 59 +++++++ README.md | 83 ++++++---- 246 files changed, 7245 insertions(+), 1056 deletions(-) create mode 100644 CVE-2022/CVE-2022-240xx/CVE-2022-24093.json create mode 100644 CVE-2022/CVE-2022-484xx/CVE-2022-48474.json create mode 100644 CVE-2022/CVE-2022-484xx/CVE-2022-48475.json create mode 100644 CVE-2022/CVE-2022-48xx/CVE-2022-4896.json create mode 100644 CVE-2023/CVE-2023-20xx/CVE-2023-2071.json create mode 100644 CVE-2023/CVE-2023-255xx/CVE-2023-25519.json create mode 100644 CVE-2023/CVE-2023-261xx/CVE-2023-26142.json create mode 100644 CVE-2023/CVE-2023-271xx/CVE-2023-27169.json create mode 100644 CVE-2023/CVE-2023-288xx/CVE-2023-28831.json create mode 100644 CVE-2023/CVE-2023-30xx/CVE-2023-3039.json create mode 100644 CVE-2023/CVE-2023-320xx/CVE-2023-32005.json create mode 100644 CVE-2023/CVE-2023-325xx/CVE-2023-32558.json create mode 100644 CVE-2023/CVE-2023-374xx/CVE-2023-37489.json create mode 100644 CVE-2023/CVE-2023-378xx/CVE-2023-37875.json create mode 100644 CVE-2023/CVE-2023-378xx/CVE-2023-37878.json create mode 100644 CVE-2023/CVE-2023-378xx/CVE-2023-37879.json create mode 100644 CVE-2023/CVE-2023-378xx/CVE-2023-37881.json create mode 100644 CVE-2023/CVE-2023-380xx/CVE-2023-38070.json create mode 100644 CVE-2023/CVE-2023-380xx/CVE-2023-38071.json create mode 100644 CVE-2023/CVE-2023-380xx/CVE-2023-38072.json create mode 100644 CVE-2023/CVE-2023-380xx/CVE-2023-38073.json create mode 100644 CVE-2023/CVE-2023-380xx/CVE-2023-38074.json create mode 100644 CVE-2023/CVE-2023-380xx/CVE-2023-38075.json create mode 100644 CVE-2023/CVE-2023-380xx/CVE-2023-38076.json create mode 100644 CVE-2023/CVE-2023-391xx/CVE-2023-39150.json create mode 100644 CVE-2023/CVE-2023-396xx/CVE-2023-39637.json create mode 100644 CVE-2023/CVE-2023-402xx/CVE-2023-40218.json create mode 100644 CVE-2023/CVE-2023-403xx/CVE-2023-40308.json create mode 100644 CVE-2023/CVE-2023-403xx/CVE-2023-40309.json create mode 100644 CVE-2023/CVE-2023-406xx/CVE-2023-40611.json create mode 100644 CVE-2023/CVE-2023-406xx/CVE-2023-40621.json create mode 100644 CVE-2023/CVE-2023-406xx/CVE-2023-40622.json create mode 100644 CVE-2023/CVE-2023-406xx/CVE-2023-40623.json create mode 100644 CVE-2023/CVE-2023-406xx/CVE-2023-40624.json create mode 100644 CVE-2023/CVE-2023-406xx/CVE-2023-40625.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40712.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40724.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40725.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40726.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40727.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40728.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40729.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40730.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40731.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40732.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40784.json create mode 100644 CVE-2023/CVE-2023-408xx/CVE-2023-40834.json create mode 100644 CVE-2023/CVE-2023-410xx/CVE-2023-41013.json create mode 100644 CVE-2023/CVE-2023-410xx/CVE-2023-41032.json create mode 100644 CVE-2023/CVE-2023-410xx/CVE-2023-41033.json create mode 100644 CVE-2023/CVE-2023-413xx/CVE-2023-41367.json create mode 100644 CVE-2023/CVE-2023-413xx/CVE-2023-41368.json create mode 100644 CVE-2023/CVE-2023-413xx/CVE-2023-41369.json create mode 100644 CVE-2023/CVE-2023-418xx/CVE-2023-41846.json create mode 100644 CVE-2023/CVE-2023-424xx/CVE-2023-42472.json create mode 100644 CVE-2023/CVE-2023-47xx/CVE-2023-4759.json create mode 100644 CVE-2023/CVE-2023-48xx/CVE-2023-4840.json create mode 100644 CVE-2023/CVE-2023-48xx/CVE-2023-4863.json create mode 100644 CVE-2023/CVE-2023-48xx/CVE-2023-4887.json create mode 100644 CVE-2023/CVE-2023-48xx/CVE-2023-4890.json create mode 100644 CVE-2023/CVE-2023-48xx/CVE-2023-4893.json create mode 100644 CVE-2023/CVE-2023-49xx/CVE-2023-4913.json create mode 100644 CVE-2023/CVE-2023-49xx/CVE-2023-4914.json diff --git a/CVE-2013/CVE-2013-45xx/CVE-2013-4589.json b/CVE-2013/CVE-2013-45xx/CVE-2013-4589.json index 27cdf65371f..be5dc002293 100644 --- a/CVE-2013/CVE-2013-45xx/CVE-2013-4589.json +++ b/CVE-2013/CVE-2013-45xx/CVE-2013-4589.json @@ -2,7 +2,7 @@ "id": "CVE-2013-4589", "sourceIdentifier": "secalert@redhat.com", "published": "2013-11-23T11:55:04.773", - "lastModified": "2016-08-26T18:12:19.413", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Analyzed", "descriptions": [ { @@ -60,6 +60,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:novell:suse_studio_onsite:1.3:*:*:*:*:*:*:*", @@ -69,11 +74,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "matchCriteriaId": "B942E0F5-7FDC-4AE5-985D-25F4EA7406F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" } ] } @@ -321,6 +321,20 @@ "Third Party Advisory" ] }, + { + "url": "http://secunia.com/advisories/55288", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/55721", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://security.gentoo.org/glsa/glsa-201311-10.xml", "source": "secalert@redhat.com", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1505.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1505.json index 72c38ee82d2..88c3c1435f7 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1505.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1505.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1505", "sourceIdentifier": "security@mozilla.org", "published": "2014-03-19T10:55:06.490", - "lastModified": "2020-08-05T13:51:50.357", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Analyzed", "descriptions": [ { @@ -224,8 +224,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", - "matchCriteriaId": "7CFF27F5-1073-4BA0-8BEE-50A063089C4B" + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", + "matchCriteriaId": "2A1D7F64-5AE6-4F2D-A282-DFF61399DFBE" }, { "vulnerable": true, diff --git a/CVE-2014/CVE-2014-35xx/CVE-2014-3566.json b/CVE-2014/CVE-2014-35xx/CVE-2014-3566.json index 274ff876f1e..bc42769ee77 100644 --- a/CVE-2014/CVE-2014-35xx/CVE-2014-3566.json +++ b/CVE-2014/CVE-2014-35xx/CVE-2014-3566.json @@ -2,7 +2,7 @@ "id": "CVE-2014-3566", "sourceIdentifier": "secalert@redhat.com", "published": "2014-10-15T00:55:02.137", - "lastModified": "2023-02-13T00:40:46.353", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -253,6 +253,16 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", + "matchCriteriaId": "2A1D7F64-5AE6-4F2D-A282-DFF61399DFBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*", @@ -268,16 +278,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", - "matchCriteriaId": "7CFF27F5-1073-4BA0-8BEE-50A063089C4B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", @@ -1734,6 +1734,132 @@ "Third Party Advisory" ] }, + { + "url": "http://secunia.com/advisories/59627", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60056", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60206", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60792", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60859", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61019", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61130", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61303", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61316", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61345", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61359", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61782", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61810", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61819", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61825", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61827", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61926", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61995", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, { "url": "http://support.apple.com/HT204244", "source": "secalert@redhat.com", diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0405.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0405.json index 029cc2115bb..8c551d7342f 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0405.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0405.json @@ -2,7 +2,7 @@ "id": "CVE-2015-0405", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:00.077", - "lastModified": "2017-01-03T02:59:34.160", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "descriptions": [ { @@ -76,6 +76,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", + "matchCriteriaId": "2A1D7F64-5AE6-4F2D-A282-DFF61399DFBE" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*", @@ -90,11 +95,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:vmware:*:*:*", "matchCriteriaId": "0A8A6169-A94D-426B-AB66-4CE391A9ADA5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", - "matchCriteriaId": "7CFF27F5-1073-4BA0-8BEE-50A063089C4B" } ] } diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0423.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0423.json index 943256c1c94..3cbd4bd4767 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0423.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0423.json @@ -2,7 +2,7 @@ "id": "CVE-2015-0423", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:01.327", - "lastModified": "2017-01-03T02:59:35.427", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "descriptions": [ { @@ -107,6 +107,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", + "matchCriteriaId": "2A1D7F64-5AE6-4F2D-A282-DFF61399DFBE" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*", @@ -121,11 +126,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:vmware:*:*:*", "matchCriteriaId": "0A8A6169-A94D-426B-AB66-4CE391A9ADA5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", - "matchCriteriaId": "7CFF27F5-1073-4BA0-8BEE-50A063089C4B" } ] } diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0438.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0438.json index db4c871f0af..c5f046b2f05 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0438.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0438.json @@ -2,7 +2,7 @@ "id": "CVE-2015-0438", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:03.687", - "lastModified": "2017-01-03T02:59:36.363", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "descriptions": [ { @@ -76,6 +76,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", + "matchCriteriaId": "2A1D7F64-5AE6-4F2D-A282-DFF61399DFBE" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*", @@ -90,11 +95,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:vmware:*:*:*", "matchCriteriaId": "0A8A6169-A94D-426B-AB66-4CE391A9ADA5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", - "matchCriteriaId": "7CFF27F5-1073-4BA0-8BEE-50A063089C4B" } ] } diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2708.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2708.json index e9224a52e54..22e0038ae49 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2708.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2708.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2708", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:01.367", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -60,6 +60,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -70,11 +75,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2709.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2709.json index 9eedb5631ad..10b5e5d105a 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2709.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2709.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2709", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:02.337", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -76,6 +76,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -86,11 +91,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2710.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2710.json index 778d709fddb..3d0e272fa93 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2710.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2710.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2710", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:03.383", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -151,6 +151,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -161,11 +166,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2713.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2713.json index 9bba4a5e4cf..ce748050a30 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2713.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2713.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2713", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:06.240", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ @@ -61,6 +61,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -71,11 +76,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2716.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2716.json index f1f01761174..159dc4c1f83 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2716.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2716.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2716", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:09.117", - "lastModified": "2021-07-31T08:15:07.957", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -76,6 +76,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -86,11 +91,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2721.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2721.json index 6f36e82c605..b4727de6829 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2721.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2721.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2721", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:00:49.283", - "lastModified": "2018-01-05T02:30:03.773", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -55,12 +55,16 @@ ], "configurations": [ { - "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", @@ -105,11 +109,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" } ] } @@ -225,7 +224,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2722.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2722.json index e3e07b3e7d1..2f6252de446 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2722.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2722.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2722", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:00:54.953", - "lastModified": "2016-12-28T02:59:07.980", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ @@ -177,6 +177,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -191,11 +196,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" } ] } diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2724.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2724.json index 513afcb4f8c..7a9e984b2c4 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2724.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2724.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2724", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:00:55.830", - "lastModified": "2016-12-28T02:59:08.103", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -160,6 +160,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", @@ -204,11 +209,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" } ] } diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2725.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2725.json index ec7c1fe4ef2..31365f66a3d 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2725.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2725.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2725", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:00:56.737", - "lastModified": "2016-12-28T02:59:08.213", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -60,6 +60,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -74,11 +79,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" } ] } diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2726.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2726.json index 8200e405533..b3472061672 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2726.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2726.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2726", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:00:57.627", - "lastModified": "2016-12-28T02:59:08.307", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -91,6 +91,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -105,11 +110,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" } ] } diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2730.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2730.json index 06cfec11cb1..ade844759c5 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2730.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2730.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2730", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:01.250", - "lastModified": "2016-12-28T02:59:08.747", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -55,12 +55,16 @@ ], "configurations": [ { - "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", @@ -85,11 +89,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" } ] } @@ -200,7 +199,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2735.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2735.json index 2d81823aa7a..e5bf4d88019 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2735.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2735.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2735", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:04.563", - "lastModified": "2016-12-28T02:59:09.183", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -177,6 +177,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", @@ -216,11 +221,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" } ] } diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2736.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2736.json index 3c868f63840..a2ca2d86911 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2736.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2736.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2736", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:05.343", - "lastModified": "2016-12-28T02:59:09.293", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -192,6 +192,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", @@ -236,11 +241,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" } ] } diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2739.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2739.json index af9cd0fe542..be665c98b10 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2739.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2739.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2739", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:07.937", - "lastModified": "2016-12-28T02:59:09.650", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -76,6 +76,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", @@ -110,11 +115,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" } ] } diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2740.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2740.json index 15b5220f611..52b982dc7e5 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2740.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2740.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2740", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:08.703", - "lastModified": "2016-12-28T02:59:09.793", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -161,6 +161,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", @@ -205,11 +210,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" } ] } diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2743.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2743.json index 6db888a0a09..01f0b2e3171 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2743.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2743.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2743", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:11.780", - "lastModified": "2016-12-28T02:59:10.043", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -176,6 +176,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -190,11 +195,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" } ] } diff --git a/CVE-2015/CVE-2015-44xx/CVE-2015-4495.json b/CVE-2015/CVE-2015-44xx/CVE-2015-4495.json index f27662bd12e..d0481421b44 100644 --- a/CVE-2015/CVE-2015-44xx/CVE-2015-4495.json +++ b/CVE-2015/CVE-2015-44xx/CVE-2015-4495.json @@ -2,7 +2,7 @@ "id": "CVE-2015-4495", "sourceIdentifier": "security@mozilla.org", "published": "2015-08-08T00:59:04.597", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "cisaExploitAdd": "2022-05-25", "cisaActionDue": "2022-06-15", @@ -116,6 +116,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", @@ -141,11 +146,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-68xx/CVE-2015-6815.json b/CVE-2015/CVE-2015-68xx/CVE-2015-6815.json index 13111001c17..7100186f2fb 100644 --- a/CVE-2015/CVE-2015-68xx/CVE-2015-6815.json +++ b/CVE-2015/CVE-2015-68xx/CVE-2015-6815.json @@ -2,7 +2,7 @@ "id": "CVE-2015-6815", "sourceIdentifier": "secalert@redhat.com", "published": "2020-01-31T22:15:11.277", - "lastModified": "2021-11-30T19:50:02.853", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Analyzed", "descriptions": [ { @@ -123,6 +123,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", + "matchCriteriaId": "2A1D7F64-5AE6-4F2D-A282-DFF61399DFBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*", @@ -162,21 +177,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", - "matchCriteriaId": "7CFF27F5-1073-4BA0-8BEE-50A063089C4B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" } ] } diff --git a/CVE-2015/CVE-2015-88xx/CVE-2015-8816.json b/CVE-2015/CVE-2015-88xx/CVE-2015-8816.json index e0b8a11a27d..a8b3ae4e8a7 100644 --- a/CVE-2015/CVE-2015-88xx/CVE-2015-8816.json +++ b/CVE-2015/CVE-2015-88xx/CVE-2015-8816.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8816", "sourceIdentifier": "cve@mitre.org", "published": "2016-04-27T17:59:03.147", - "lastModified": "2016-12-03T03:14:54.603", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ @@ -83,6 +83,16 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", @@ -128,16 +138,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-89xx/CVE-2015-8918.json b/CVE-2015/CVE-2015-89xx/CVE-2015-8918.json index b4ad3f3e859..e4c9a7bded2 100644 --- a/CVE-2015/CVE-2015-89xx/CVE-2015-8918.json +++ b/CVE-2015/CVE-2015-89xx/CVE-2015-8918.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8918", "sourceIdentifier": "cve@mitre.org", "published": "2016-09-20T14:15:04.400", - "lastModified": "2017-07-01T01:29:28.767", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "descriptions": [ { @@ -82,6 +82,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", @@ -91,11 +96,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" } ] } diff --git a/CVE-2015/CVE-2015-89xx/CVE-2015-8919.json b/CVE-2015/CVE-2015-89xx/CVE-2015-8919.json index 88572287ca1..d01491b3afe 100644 --- a/CVE-2015/CVE-2015-89xx/CVE-2015-8919.json +++ b/CVE-2015/CVE-2015-89xx/CVE-2015-8919.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8919", "sourceIdentifier": "cve@mitre.org", "published": "2016-09-20T14:15:05.463", - "lastModified": "2018-01-05T02:30:24.057", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "descriptions": [ { @@ -128,6 +128,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", @@ -137,11 +142,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" } ] } diff --git a/CVE-2015/CVE-2015-89xx/CVE-2015-8920.json b/CVE-2015/CVE-2015-89xx/CVE-2015-8920.json index ba4a106d6a0..60c9b30ff28 100644 --- a/CVE-2015/CVE-2015-89xx/CVE-2015-8920.json +++ b/CVE-2015/CVE-2015-89xx/CVE-2015-8920.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8920", "sourceIdentifier": "cve@mitre.org", "published": "2016-09-20T14:15:06.447", - "lastModified": "2018-01-05T02:30:24.117", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "descriptions": [ { @@ -82,6 +82,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", @@ -91,11 +96,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" } ] } diff --git a/CVE-2015/CVE-2015-89xx/CVE-2015-8921.json b/CVE-2015/CVE-2015-89xx/CVE-2015-8921.json index 25fd893267c..36f23ba0cfd 100644 --- a/CVE-2015/CVE-2015-89xx/CVE-2015-8921.json +++ b/CVE-2015/CVE-2015-89xx/CVE-2015-8921.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8921", "sourceIdentifier": "cve@mitre.org", "published": "2016-09-20T14:15:07.337", - "lastModified": "2018-01-05T02:30:24.197", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "descriptions": [ { @@ -82,6 +82,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", @@ -91,11 +96,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" } ] } diff --git a/CVE-2015/CVE-2015-89xx/CVE-2015-8922.json b/CVE-2015/CVE-2015-89xx/CVE-2015-8922.json index 85ab109eb79..1fa17ac5f17 100644 --- a/CVE-2015/CVE-2015-89xx/CVE-2015-8922.json +++ b/CVE-2015/CVE-2015-89xx/CVE-2015-8922.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8922", "sourceIdentifier": "cve@mitre.org", "published": "2016-09-20T14:15:08.277", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "descriptions": [ { @@ -98,6 +98,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", @@ -107,11 +112,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" } ] } diff --git a/CVE-2015/CVE-2015-89xx/CVE-2015-8923.json b/CVE-2015/CVE-2015-89xx/CVE-2015-8923.json index eb3dba84adc..8f7f693ff61 100644 --- a/CVE-2015/CVE-2015-89xx/CVE-2015-8923.json +++ b/CVE-2015/CVE-2015-89xx/CVE-2015-8923.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8923", "sourceIdentifier": "cve@mitre.org", "published": "2016-09-20T14:15:09.680", - "lastModified": "2018-01-05T02:30:24.353", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "descriptions": [ { @@ -98,6 +98,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", @@ -107,11 +112,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" } ] } diff --git a/CVE-2015/CVE-2015-89xx/CVE-2015-8924.json b/CVE-2015/CVE-2015-89xx/CVE-2015-8924.json index 06adaab3f76..21cbb46f8ca 100644 --- a/CVE-2015/CVE-2015-89xx/CVE-2015-8924.json +++ b/CVE-2015/CVE-2015-89xx/CVE-2015-8924.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8924", "sourceIdentifier": "cve@mitre.org", "published": "2016-09-20T14:15:10.743", - "lastModified": "2018-01-05T02:30:24.430", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "descriptions": [ { @@ -98,6 +98,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", @@ -107,11 +112,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" } ] } diff --git a/CVE-2016/CVE-2016-03xx/CVE-2016-0363.json b/CVE-2016/CVE-2016-03xx/CVE-2016-0363.json index d5f4be0437e..ecc7fd0b1d9 100644 --- a/CVE-2016/CVE-2016-03xx/CVE-2016-0363.json +++ b/CVE-2016/CVE-2016-03xx/CVE-2016-0363.json @@ -2,7 +2,7 @@ "id": "CVE-2016-0363", "sourceIdentifier": "psirt@us.ibm.com", "published": "2016-06-03T14:59:01.530", - "lastModified": "2019-06-24T14:25:00.687", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Analyzed", "descriptions": [ { @@ -167,6 +167,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*", @@ -197,21 +212,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-03xx/CVE-2016-0376.json b/CVE-2016/CVE-2016-03xx/CVE-2016-0376.json index c9d41ec9478..3a0cde45110 100644 --- a/CVE-2016/CVE-2016-03xx/CVE-2016-0376.json +++ b/CVE-2016/CVE-2016-03xx/CVE-2016-0376.json @@ -2,7 +2,7 @@ "id": "CVE-2016-0376", "sourceIdentifier": "psirt@us.ibm.com", "published": "2016-06-03T14:59:02.890", - "lastModified": "2019-06-24T16:48:18.120", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Analyzed", "evaluatorComment": "CWE-502: Deserialization of Untrusted Data", "descriptions": [ @@ -83,6 +83,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*", @@ -113,21 +128,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-15xx/CVE-2016-1583.json b/CVE-2016/CVE-2016-15xx/CVE-2016-1583.json index 7f913e9be04..ae7f1d205a1 100644 --- a/CVE-2016/CVE-2016-15xx/CVE-2016-1583.json +++ b/CVE-2016/CVE-2016-15xx/CVE-2016-1583.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1583", "sourceIdentifier": "security@ubuntu.com", "published": "2016-06-27T10:59:03.330", - "lastModified": "2023-01-17T21:40:33.620", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Analyzed", "descriptions": [ { @@ -118,6 +118,16 @@ "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -163,16 +173,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-21xx/CVE-2016-2184.json b/CVE-2016/CVE-2016-21xx/CVE-2016-2184.json index 1ddf33f456d..64e8111289e 100644 --- a/CVE-2016/CVE-2016-21xx/CVE-2016-2184.json +++ b/CVE-2016/CVE-2016-21xx/CVE-2016-2184.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2184", "sourceIdentifier": "secalert@redhat.com", "published": "2016-04-27T17:59:09.867", - "lastModified": "2017-09-08T01:29:53.717", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ @@ -114,6 +114,16 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -159,16 +169,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-21xx/CVE-2016-2185.json b/CVE-2016/CVE-2016-21xx/CVE-2016-2185.json index 558103f26fd..ddeb61dc208 100644 --- a/CVE-2016/CVE-2016-21xx/CVE-2016-2185.json +++ b/CVE-2016/CVE-2016-21xx/CVE-2016-2185.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2185", "sourceIdentifier": "secalert@redhat.com", "published": "2016-05-02T10:59:28.720", - "lastModified": "2016-12-01T03:08:52.527", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ @@ -114,6 +114,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -169,21 +184,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-21xx/CVE-2016-2186.json b/CVE-2016/CVE-2016-21xx/CVE-2016-2186.json index f2cbb67d4fe..b5c30e9808b 100644 --- a/CVE-2016/CVE-2016-21xx/CVE-2016-2186.json +++ b/CVE-2016/CVE-2016-21xx/CVE-2016-2186.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2186", "sourceIdentifier": "secalert@redhat.com", "published": "2016-05-02T10:59:29.863", - "lastModified": "2016-12-01T03:08:53.717", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ @@ -99,6 +99,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -154,21 +169,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-21xx/CVE-2016-2187.json b/CVE-2016/CVE-2016-21xx/CVE-2016-2187.json index bf8f8a59dcc..a9b3dfbff1f 100644 --- a/CVE-2016/CVE-2016-21xx/CVE-2016-2187.json +++ b/CVE-2016/CVE-2016-21xx/CVE-2016-2187.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2187", "sourceIdentifier": "secalert@redhat.com", "published": "2016-05-02T10:59:30.847", - "lastModified": "2016-11-28T20:03:44.510", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ @@ -129,6 +129,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", @@ -143,11 +148,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*", "matchCriteriaId": "095856BE-4E55-4FEA-BCAC-352C29083545" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" } ] } diff --git a/CVE-2016/CVE-2016-21xx/CVE-2016-2188.json b/CVE-2016/CVE-2016-21xx/CVE-2016-2188.json index 2af018b7d85..55f57aceb25 100644 --- a/CVE-2016/CVE-2016-21xx/CVE-2016-2188.json +++ b/CVE-2016/CVE-2016-21xx/CVE-2016-2188.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2188", "sourceIdentifier": "secalert@redhat.com", "published": "2016-05-02T10:59:32.080", - "lastModified": "2017-09-08T01:29:53.777", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ @@ -83,6 +83,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -138,21 +153,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2815.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2815.json index 8b9e5e2a659..6c65ac6b097 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2815.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2815.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2815", "sourceIdentifier": "security@mozilla.org", "published": "2016-06-13T10:59:00.120", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -128,6 +128,16 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -148,16 +158,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2818.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2818.json index f84046a83ec..ca502b7fa2e 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2818.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2818.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2818", "sourceIdentifier": "security@mozilla.org", "published": "2016-06-13T10:59:01.540", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -253,6 +253,16 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*", @@ -278,16 +288,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2834.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2834.json index 74cb0a6d333..d82b8b3a69a 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2834.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2834.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2834", "sourceIdentifier": "security@mozilla.org", "published": "2016-06-13T10:59:15.167", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -169,6 +169,16 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -188,16 +198,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2847.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2847.json index 1095d9c865f..65b2781313d 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2847.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2847.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2847", "sourceIdentifier": "secalert@redhat.com", "published": "2016-04-27T17:59:21.947", - "lastModified": "2023-02-12T23:17:47.467", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -98,6 +98,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -153,21 +168,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-31xx/CVE-2016-3134.json b/CVE-2016/CVE-2016-31xx/CVE-2016-3134.json index 3ab5582d3b7..1bf35aafe38 100644 --- a/CVE-2016/CVE-2016-31xx/CVE-2016-3134.json +++ b/CVE-2016/CVE-2016-31xx/CVE-2016-3134.json @@ -2,7 +2,7 @@ "id": "CVE-2016-3134", "sourceIdentifier": "meissner@suse.de", "published": "2016-04-27T17:59:22.883", - "lastModified": "2018-01-05T02:30:41.087", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -82,6 +82,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -132,21 +147,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-31xx/CVE-2016-3136.json b/CVE-2016/CVE-2016-31xx/CVE-2016-3136.json index 7153d6488a0..46e6bc42bf4 100644 --- a/CVE-2016/CVE-2016-31xx/CVE-2016-3136.json +++ b/CVE-2016/CVE-2016-31xx/CVE-2016-3136.json @@ -2,7 +2,7 @@ "id": "CVE-2016-3136", "sourceIdentifier": "meissner@suse.de", "published": "2016-05-02T10:59:35.520", - "lastModified": "2017-09-08T01:29:55.137", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ @@ -99,6 +99,16 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -134,16 +144,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-31xx/CVE-2016-3137.json b/CVE-2016/CVE-2016-31xx/CVE-2016-3137.json index a9a77217de4..f63de417098 100644 --- a/CVE-2016/CVE-2016-31xx/CVE-2016-3137.json +++ b/CVE-2016/CVE-2016-31xx/CVE-2016-3137.json @@ -2,7 +2,7 @@ "id": "CVE-2016-3137", "sourceIdentifier": "meissner@suse.de", "published": "2016-05-02T10:59:36.737", - "lastModified": "2016-12-01T03:09:46.443", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ @@ -83,6 +83,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -138,21 +153,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-31xx/CVE-2016-3138.json b/CVE-2016/CVE-2016-31xx/CVE-2016-3138.json index 8e127a250cd..6d67ec719f6 100644 --- a/CVE-2016/CVE-2016-31xx/CVE-2016-3138.json +++ b/CVE-2016/CVE-2016-31xx/CVE-2016-3138.json @@ -2,7 +2,7 @@ "id": "CVE-2016-3138", "sourceIdentifier": "meissner@suse.de", "published": "2016-05-02T10:59:37.910", - "lastModified": "2016-12-01T03:09:47.600", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ @@ -114,6 +114,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -169,21 +184,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-31xx/CVE-2016-3139.json b/CVE-2016/CVE-2016-31xx/CVE-2016-3139.json index 456510453e9..016c989a619 100644 --- a/CVE-2016/CVE-2016-31xx/CVE-2016-3139.json +++ b/CVE-2016/CVE-2016-31xx/CVE-2016-3139.json @@ -2,7 +2,7 @@ "id": "CVE-2016-3139", "sourceIdentifier": "meissner@suse.de", "published": "2016-04-27T17:59:24.993", - "lastModified": "2017-09-08T01:29:55.200", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -82,6 +82,16 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -127,16 +137,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-31xx/CVE-2016-3140.json b/CVE-2016/CVE-2016-31xx/CVE-2016-3140.json index 7f8bc6709c6..7ec8d7d57f7 100644 --- a/CVE-2016/CVE-2016-31xx/CVE-2016-3140.json +++ b/CVE-2016/CVE-2016-31xx/CVE-2016-3140.json @@ -2,7 +2,7 @@ "id": "CVE-2016-3140", "sourceIdentifier": "meissner@suse.de", "published": "2016-05-02T10:59:39.520", - "lastModified": "2017-09-08T01:29:55.293", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ @@ -119,6 +119,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -174,21 +189,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-31xx/CVE-2016-3156.json b/CVE-2016/CVE-2016-31xx/CVE-2016-3156.json index 5655c04102b..caba027e7e9 100644 --- a/CVE-2016/CVE-2016-31xx/CVE-2016-3156.json +++ b/CVE-2016/CVE-2016-31xx/CVE-2016-3156.json @@ -2,7 +2,7 @@ "id": "CVE-2016-3156", "sourceIdentifier": "cve@mitre.org", "published": "2016-04-27T17:59:26.430", - "lastModified": "2018-01-05T02:30:41.353", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -82,6 +82,16 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -127,16 +137,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-36xx/CVE-2016-3672.json b/CVE-2016/CVE-2016-36xx/CVE-2016-3672.json index 5233db40aed..5659c9b54ad 100644 --- a/CVE-2016/CVE-2016-36xx/CVE-2016-3672.json +++ b/CVE-2016/CVE-2016-36xx/CVE-2016-3672.json @@ -2,7 +2,7 @@ "id": "CVE-2016-3672", "sourceIdentifier": "cve@mitre.org", "published": "2016-04-27T17:59:27.397", - "lastModified": "2018-10-09T19:59:50.740", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -107,6 +107,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -132,11 +137,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-36xx/CVE-2016-3689.json b/CVE-2016/CVE-2016-36xx/CVE-2016-3689.json index cc37a0a709a..acec05b5083 100644 --- a/CVE-2016/CVE-2016-36xx/CVE-2016-3689.json +++ b/CVE-2016/CVE-2016-36xx/CVE-2016-3689.json @@ -2,7 +2,7 @@ "id": "CVE-2016-3689", "sourceIdentifier": "secalert@redhat.com", "published": "2016-05-02T10:59:40.503", - "lastModified": "2017-09-03T01:29:07.390", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ @@ -83,6 +83,16 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -118,16 +128,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-44xx/CVE-2016-4482.json b/CVE-2016/CVE-2016-44xx/CVE-2016-4482.json index 55bee97fae6..2f588b6cec6 100644 --- a/CVE-2016/CVE-2016-44xx/CVE-2016-4482.json +++ b/CVE-2016/CVE-2016-44xx/CVE-2016-4482.json @@ -2,7 +2,7 @@ "id": "CVE-2016-4482", "sourceIdentifier": "cve@mitre.org", "published": "2016-05-23T10:59:00.113", - "lastModified": "2016-11-28T20:18:21.197", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -128,6 +128,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -178,21 +193,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-44xx/CVE-2016-4485.json b/CVE-2016/CVE-2016-44xx/CVE-2016-4485.json index b492f69feea..23ee4f70ca1 100644 --- a/CVE-2016/CVE-2016-44xx/CVE-2016-4485.json +++ b/CVE-2016/CVE-2016-44xx/CVE-2016-4485.json @@ -2,7 +2,7 @@ "id": "CVE-2016-4485", "sourceIdentifier": "cve@mitre.org", "published": "2016-05-23T10:59:01.220", - "lastModified": "2016-11-28T20:18:22.350", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "descriptions": [ { @@ -82,6 +82,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", @@ -96,11 +101,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*", "matchCriteriaId": "095856BE-4E55-4FEA-BCAC-352C29083545" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" } ] } diff --git a/CVE-2016/CVE-2016-44xx/CVE-2016-4486.json b/CVE-2016/CVE-2016-44xx/CVE-2016-4486.json index bb8d200ab8e..fe02b759039 100644 --- a/CVE-2016/CVE-2016-44xx/CVE-2016-4486.json +++ b/CVE-2016/CVE-2016-44xx/CVE-2016-4486.json @@ -2,7 +2,7 @@ "id": "CVE-2016-4486", "sourceIdentifier": "cve@mitre.org", "published": "2016-05-23T10:59:02.707", - "lastModified": "2018-12-20T11:29:00.290", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -82,6 +82,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -132,21 +147,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-45xx/CVE-2016-4569.json b/CVE-2016/CVE-2016-45xx/CVE-2016-4569.json index c0181650c0e..1f628b25ea7 100644 --- a/CVE-2016/CVE-2016-45xx/CVE-2016-4569.json +++ b/CVE-2016/CVE-2016-45xx/CVE-2016-4569.json @@ -2,7 +2,7 @@ "id": "CVE-2016-4569", "sourceIdentifier": "cve@mitre.org", "published": "2016-05-23T10:59:08.097", - "lastModified": "2018-01-05T02:30:55.227", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -128,6 +128,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -178,21 +193,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-49xx/CVE-2016-4913.json b/CVE-2016/CVE-2016-49xx/CVE-2016-4913.json index 963e88a0c8f..850b7c0e510 100644 --- a/CVE-2016/CVE-2016-49xx/CVE-2016-4913.json +++ b/CVE-2016/CVE-2016-49xx/CVE-2016-4913.json @@ -2,7 +2,7 @@ "id": "CVE-2016-4913", "sourceIdentifier": "security@debian.org", "published": "2016-05-23T10:59:14.723", - "lastModified": "2023-01-17T21:17:28.117", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Analyzed", "descriptions": [ { @@ -199,6 +199,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", + "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", @@ -213,11 +218,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "ADE9D807-6690-4D67-A6B3-68BBC9B50153" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F1E42F04-5E14-4CF6-BD26-C54A4ECD99CF" } ] } diff --git a/CVE-2016/CVE-2016-49xx/CVE-2016-4997.json b/CVE-2016/CVE-2016-49xx/CVE-2016-4997.json index cc0a2f263ae..8850b84f08d 100644 --- a/CVE-2016/CVE-2016-49xx/CVE-2016-4997.json +++ b/CVE-2016/CVE-2016-49xx/CVE-2016-4997.json @@ -2,7 +2,7 @@ "id": "CVE-2016-4997", "sourceIdentifier": "secalert@redhat.com", "published": "2016-07-03T21:59:16.057", - "lastModified": "2023-02-12T23:22:40.897", + "lastModified": "2023-09-12T14:55:31.563", "vulnStatus": "Modified", "descriptions": [ { @@ -185,6 +185,16 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", @@ -220,16 +230,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E85AFCCA-8B55-4F7C-A282-691CCA624D79" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-77xx/CVE-2016-7796.json b/CVE-2016/CVE-2016-77xx/CVE-2016-7796.json index 859c8ec3157..9f625783187 100644 --- a/CVE-2016/CVE-2016-77xx/CVE-2016-7796.json +++ b/CVE-2016/CVE-2016-77xx/CVE-2016-7796.json @@ -2,7 +2,7 @@ "id": "CVE-2016-7796", "sourceIdentifier": "cve@mitre.org", "published": "2016-10-13T14:59:14.567", - "lastModified": "2017-07-28T01:29:06.737", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "descriptions": [ { @@ -112,6 +112,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", @@ -131,11 +136,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server_for_sap:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1CAEB29-5FEF-4713-847F-0059E6BD843E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" } ] } diff --git a/CVE-2016/CVE-2016-99xx/CVE-2016-9960.json b/CVE-2016/CVE-2016-99xx/CVE-2016-9960.json index 605070f8cf5..f51c1d09a8c 100644 --- a/CVE-2016/CVE-2016-99xx/CVE-2016-9960.json +++ b/CVE-2016/CVE-2016-99xx/CVE-2016-9960.json @@ -2,7 +2,7 @@ "id": "CVE-2016-9960", "sourceIdentifier": "security@debian.org", "published": "2017-06-06T18:29:00.497", - "lastModified": "2018-10-30T16:27:33.013", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "descriptions": [ { @@ -138,6 +138,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", @@ -163,11 +168,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp2:*:*:*:*:raspberry_pi:*", "matchCriteriaId": "94D97B8B-6A52-4A4C-9E21-42EEE4DF7AA7" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp2:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-99xx/CVE-2016-9961.json b/CVE-2016/CVE-2016-99xx/CVE-2016-9961.json index 7a4de8561fc..ebba129dc7d 100644 --- a/CVE-2016/CVE-2016-99xx/CVE-2016-9961.json +++ b/CVE-2016/CVE-2016-99xx/CVE-2016-9961.json @@ -2,7 +2,7 @@ "id": "CVE-2016-9961", "sourceIdentifier": "security@debian.org", "published": "2017-06-06T18:29:00.557", - "lastModified": "2018-10-30T16:27:33.013", + "lastModified": "2023-09-12T14:45:07.473", "vulnStatus": "Modified", "descriptions": [ { @@ -138,6 +138,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", @@ -163,11 +168,6 @@ "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp2:*:*:*:*:raspberry_pi:*", "matchCriteriaId": "94D97B8B-6A52-4A4C-9E21-42EEE4DF7AA7" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "F5A10CB2-3AB0-4ADB-A072-A2E18B1DC642" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp2:*:*:*:*:*:*", diff --git a/CVE-2020/CVE-2020-193xx/CVE-2020-19319.json b/CVE-2020/CVE-2020-193xx/CVE-2020-19319.json index 36b64c2f6d7..84442ed87bb 100644 --- a/CVE-2020/CVE-2020-193xx/CVE-2020-19319.json +++ b/CVE-2020/CVE-2020-193xx/CVE-2020-19319.json @@ -2,8 +2,8 @@ "id": "CVE-2020-19319", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T19:15:41.250", - "lastModified": "2023-09-11T19:15:41.250", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:22.703", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-193xx/CVE-2020-19320.json b/CVE-2020/CVE-2020-193xx/CVE-2020-19320.json index 4123febcd9e..247ecb61b96 100644 --- a/CVE-2020/CVE-2020-193xx/CVE-2020-19320.json +++ b/CVE-2020/CVE-2020-193xx/CVE-2020-19320.json @@ -2,8 +2,8 @@ "id": "CVE-2020-19320", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T19:15:41.367", - "lastModified": "2023-09-11T19:15:41.367", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:22.703", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-193xx/CVE-2020-19323.json b/CVE-2020/CVE-2020-193xx/CVE-2020-19323.json index a98c36cdd48..3e11fac52a1 100644 --- a/CVE-2020/CVE-2020-193xx/CVE-2020-19323.json +++ b/CVE-2020/CVE-2020-193xx/CVE-2020-19323.json @@ -2,8 +2,8 @@ "id": "CVE-2020-19323", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T19:15:41.437", - "lastModified": "2023-09-11T19:15:41.437", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:22.703", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-195xx/CVE-2020-19559.json b/CVE-2020/CVE-2020-195xx/CVE-2020-19559.json index 2d499168c33..1d44561834b 100644 --- a/CVE-2020/CVE-2020-195xx/CVE-2020-19559.json +++ b/CVE-2020/CVE-2020-195xx/CVE-2020-19559.json @@ -2,8 +2,8 @@ "id": "CVE-2020-19559", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T19:15:41.500", - "lastModified": "2023-09-11T19:15:41.500", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:22.703", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-210xx/CVE-2021-21088.json b/CVE-2021/CVE-2021-210xx/CVE-2021-21088.json index f7ea3de6cef..a64dff5fbb1 100644 --- a/CVE-2021/CVE-2021-210xx/CVE-2021-21088.json +++ b/CVE-2021/CVE-2021-210xx/CVE-2021-21088.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21088", "sourceIdentifier": "psirt@adobe.com", "published": "2023-09-06T14:15:08.053", - "lastModified": "2023-09-07T01:10:21.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T13:37:54.643", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,7 +13,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -31,6 +31,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -46,10 +66,84 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30180", + "versionEndExcluding": "17.011.30190", + "matchCriteriaId": "1823787E-E1F3-4AC6-976D-D90EAF030ACB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.001.30020", + "matchCriteriaId": "BEE5B07B-477D-4A72-83A9-18389934697B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "21.001.20135", + "matchCriteriaId": "BDF96AFA-EF1D-4677-81D4-2775CFE39E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30180", + "versionEndExcluding": "17.011.30190", + "matchCriteriaId": "957DB783-FE3C-4202-9EE1-43ADA2A160CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.001.30020", + "matchCriteriaId": "F91DD5E6-B165-4462-9E8E-C6C773A62188" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "21.001.20135", + "matchCriteriaId": "0C26D048-87CF-463E-9666-DD9FBD507C91" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb21-09.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-286xx/CVE-2021-28644.json b/CVE-2021/CVE-2021-286xx/CVE-2021-28644.json index e75a437723e..4a8edc2ec0a 100644 --- a/CVE-2021/CVE-2021-286xx/CVE-2021-28644.json +++ b/CVE-2021/CVE-2021-286xx/CVE-2021-28644.json @@ -2,8 +2,8 @@ "id": "CVE-2021-28644", "sourceIdentifier": "psirt@adobe.com", "published": "2023-09-06T14:15:08.390", - "lastModified": "2023-09-07T01:10:21.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T14:11:58.857", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,10 +46,84 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30180", + "versionEndExcluding": "17.011.30199", + "matchCriteriaId": "E96C30E4-DBB4-4C88-9E71-4459A11859DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.004.30006", + "matchCriteriaId": "D434CD4B-0BB9-4F5F-9001-836A3620FD8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "21.005.20058", + "matchCriteriaId": "48A31AA5-A68F-4CA9-B192-B29C80AE58F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30180", + "versionEndExcluding": "17.011.30199", + "matchCriteriaId": "C0444DF8-F6C9-4608-9D09-F0474B7D0E30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.004.30006", + "matchCriteriaId": "776F4421-5C68-4878-8E63-E2AA02F04815" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "21.005.20058", + "matchCriteriaId": "5DFEFCD7-5267-49A9-87EB-A05D54EB23C4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb21-51.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-359xx/CVE-2021-35980.json b/CVE-2021/CVE-2021-359xx/CVE-2021-35980.json index bbb9eb5301e..77762922503 100644 --- a/CVE-2021/CVE-2021-359xx/CVE-2021-35980.json +++ b/CVE-2021/CVE-2021-359xx/CVE-2021-35980.json @@ -2,8 +2,8 @@ "id": "CVE-2021-35980", "sourceIdentifier": "psirt@adobe.com", "published": "2023-09-06T14:15:08.593", - "lastModified": "2023-09-07T01:10:21.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T14:24:43.123", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,10 +46,84 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30180", + "versionEndExcluding": "17.011.30199", + "matchCriteriaId": "E96C30E4-DBB4-4C88-9E71-4459A11859DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.004.30006", + "matchCriteriaId": "D434CD4B-0BB9-4F5F-9001-836A3620FD8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "21.005.20058", + "matchCriteriaId": "48A31AA5-A68F-4CA9-B192-B29C80AE58F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30180", + "versionEndExcluding": "17.011.30199", + "matchCriteriaId": "C0444DF8-F6C9-4608-9D09-F0474B7D0E30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.004.30006", + "matchCriteriaId": "776F4421-5C68-4878-8E63-E2AA02F04815" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "21.005.20058", + "matchCriteriaId": "5DFEFCD7-5267-49A9-87EB-A05D54EB23C4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb21-51.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-398xx/CVE-2021-39859.json b/CVE-2021/CVE-2021-398xx/CVE-2021-39859.json index 56d2228fa78..e6f0b7d33be 100644 --- a/CVE-2021/CVE-2021-398xx/CVE-2021-39859.json +++ b/CVE-2021/CVE-2021-398xx/CVE-2021-39859.json @@ -2,8 +2,8 @@ "id": "CVE-2021-39859", "sourceIdentifier": "psirt@adobe.com", "published": "2023-09-06T14:15:09.477", - "lastModified": "2023-09-07T01:10:21.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T14:38:54.530", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,10 +46,142 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndIncluding": "21.005.20060", + "matchCriteriaId": "CF7CE88B-935B-47AA-B351-B232E72E851C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndIncluding": "21.005.20060", + "matchCriteriaId": "92248FB9-6322-4DCC-A904-21C88EFE9E87" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndIncluding": "21.005.20058", + "matchCriteriaId": "A8FDCFE4-9D35-40E2-B771-D948FE26FF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndIncluding": "21.005.20058", + "matchCriteriaId": "1664B219-4DA0-481C-BE2E-9BECB75C2D44" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30180", + "versionEndExcluding": "17.011.30202", + "matchCriteriaId": "5DF67B6D-9F64-4F63-BFB6-A5F79C16CBD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.004.30015", + "matchCriteriaId": "9760647E-33E4-44AD-9169-E2FF7EFCA395" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30180", + "versionEndExcluding": "17.011.30202", + "matchCriteriaId": "EF9D60AA-B708-43F1-A90B-119AAE407800" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndExcluding": "20.004.30015", + "matchCriteriaId": "07430451-D6E3-4F3A-8C31-B2C2C2E2DD27" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb21-55.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-403xx/CVE-2021-40365.json b/CVE-2021/CVE-2021-403xx/CVE-2021-40365.json index 6c22f72f6cb..97785ad3e42 100644 --- a/CVE-2021/CVE-2021-403xx/CVE-2021-40365.json +++ b/CVE-2021/CVE-2021-403xx/CVE-2021-40365.json @@ -2,18 +2,18 @@ "id": "CVE-2021-40365", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:14.650", - "lastModified": "2023-07-11T16:15:09.590", + "lastModified": "2023-09-12T10:15:08.130", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SIMATIC Drive Controller CPU 1504D TF, SIMATIC Drive Controller CPU 1507D TF, SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants), SIMATIC S7-1200 CPU family (incl. SIPLUS variants), SIMATIC S7-1500 CPU 1510SP F-1 PN, SIMATIC S7-1500 CPU 1510SP-1 PN, SIMATIC S7-1500 CPU 1511-1 PN, SIMATIC S7-1500 CPU 1511-1 PN, SIMATIC S7-1500 CPU 1511C-1 PN, SIMATIC S7-1500 CPU 1511C-1 PN, SIMATIC S7-1500 CPU 1511F-1 PN, SIMATIC S7-1500 CPU 1511F-1 PN, SIMATIC S7-1500 CPU 1511T-1 PN, SIMATIC S7-1500 CPU 1511TF-1 PN, SIMATIC S7-1500 CPU 1512C-1 PN, SIMATIC S7-1500 CPU 1512C-1 PN, SIMATIC S7-1500 CPU 1512SP F-1 PN, SIMATIC S7-1500 CPU 1512SP-1 PN, SIMATIC S7-1500 CPU 1513-1 PN, SIMATIC S7-1500 CPU 1513-1 PN, SIMATIC S7-1500 CPU 1513F-1 PN, SIMATIC S7-1500 CPU 1513F-1 PN, SIMATIC S7-1500 CPU 1513R-1 PN, SIMATIC S7-1500 CPU 1515-2 PN, SIMATIC S7-1500 CPU 1515-2 PN, SIMATIC S7-1500 CPU 1515F-2 PN, SIMATIC S7-1500 CPU 1515F-2 PN, SIMATIC S7-1500 CPU 1515R-2 PN, SIMATIC S7-1500 CPU 1515T-2 PN, SIMATIC S7-1500 CPU 1515TF-2 PN, SIMATIC S7-1500 CPU 1516-3 PN/DP, SIMATIC S7-1500 CPU 1516-3 PN/DP, SIMATIC S7-1500 CPU 1516F-3 PN/DP, SIMATIC S7-1500 CPU 1516F-3 PN/DP, SIMATIC S7-1500 CPU 1516T-3 PN/DP, SIMATIC S7-1500 CPU 1516TF-3 PN/DP, SIMATIC S7-1500 CPU 1517-3 PN/DP, SIMATIC S7-1500 CPU 1517F-3 PN/DP, SIMATIC S7-1500 CPU 1517H-3 PN, SIMATIC S7-1500 CPU 1517T-3 PN/DP, SIMATIC S7-1500 CPU 1517TF-3 PN/DP, SIMATIC S7-1500 CPU 1518-4 PN/DP, SIMATIC S7-1500 CPU 1518-4 PN/DP MFP, SIMATIC S7-1500 CPU 1518F-4 PN/DP, SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP, SIMATIC S7-1500 CPU 1518HF-4 PN, SIMATIC S7-1500 CPU 1518T-4 PN/DP, SIMATIC S7-1500 CPU 1518TF-4 PN/DP, SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK, SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN, SIMATIC S7-1500 Software Controller, SIMATIC S7-PLCSIM Advanced, SIPLUS ET 200SP CPU 1510SP F-1 PN, SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1510SP-1 PN, SIPLUS ET 200SP CPU 1510SP-1 PN, SIPLUS ET 200SP CPU 1510SP-1 PN RAIL, SIPLUS ET 200SP CPU 1510SP-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP F-1 PN, SIPLUS ET 200SP CPU 1512SP F-1 PN, SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP-1 PN, SIPLUS ET 200SP CPU 1512SP-1 PN, SIPLUS ET 200SP CPU 1512SP-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP-1 PN RAIL, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL, SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL, SIPLUS S7-1500 CPU 1511-1 PN TX RAIL, SIPLUS S7-1500 CPU 1511-1 PN TX RAIL, SIPLUS S7-1500 CPU 1511F-1 PN, SIPLUS S7-1500 CPU 1511F-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513F-1 PN, SIPLUS S7-1500 CPU 1513F-1 PN, SIPLUS S7-1500 CPU 1515F-2 PN, SIPLUS S7-1500 CPU 1515F-2 PN, SIPLUS S7-1500 CPU 1515F-2 PN RAIL, SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL, SIPLUS S7-1500 CPU 1515R-2 PN, SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL, SIPLUS S7-1500 CPU 1516F-3 PN/DP, SIPLUS S7-1500 CPU 1516F-3 PN/DP, SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1517H-3 PN, SIPLUS S7-1500 CPU 1518-4 PN/DP, SIPLUS S7-1500 CPU 1518-4 PN/DP MFP, SIPLUS S7-1500 CPU 1518F-4 PN/DP, SIPLUS S7-1500 CPU 1518HF-4 PN, SIPLUS TIM 1531 IRC, TIM 1531 IRC. Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device" + "value": "Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device." } ], "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "productcert@siemens.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -33,7 +33,7 @@ "impactScore": 3.6 }, { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", @@ -56,22 +56,22 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "productcert@siemens.com", "type": "Primary", "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-20" } ] }, { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-20" + "value": "NVD-CWE-noinfo" } ] } diff --git a/CVE-2021/CVE-2021-406xx/CVE-2021-40698.json b/CVE-2021/CVE-2021-406xx/CVE-2021-40698.json index a0679ee32ce..dc593cfdcbf 100644 --- a/CVE-2021/CVE-2021-406xx/CVE-2021-40698.json +++ b/CVE-2021/CVE-2021-406xx/CVE-2021-40698.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40698", "sourceIdentifier": "psirt@adobe.com", "published": "2023-09-07T13:15:07.160", - "lastModified": "2023-09-07T13:42:46.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T11:57:47.193", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,7 +13,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -31,6 +31,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 3.7 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 3.7 } ] }, @@ -46,10 +66,91 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2018", + "matchCriteriaId": "1280A922-1722-4AEC-9D84-275B6FC91C80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*", + "matchCriteriaId": "3B54B2B0-B1E1-4B4E-A529-D0BD3B5DEEF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*", + "matchCriteriaId": "EDB126BF-E09D-4E58-A39F-1190407D1CAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update10:*:*:*:*:*:*", + "matchCriteriaId": "8DDD85DF-69A0-476F-8365-CD67C75CF0CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*", + "matchCriteriaId": "59649177-81EE-43C3-BFA5-E56E65B486DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*", + "matchCriteriaId": "453B96ED-738A-4642-B461-C5216CF45CA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*", + "matchCriteriaId": "58D32489-627B-4E49-9329-8A3B8F8E4903" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update5:*:*:*:*:*:*", + "matchCriteriaId": "6D5860E1-D293-48FE-9796-058B78B2D571" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update6:*:*:*:*:*:*", + "matchCriteriaId": "9F9336CC-E38F-4BCB-83CD-805EC7FEF806" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update7:*:*:*:*:*:*", + "matchCriteriaId": "97964507-047A-4CC8-8D2B-0EA0C7F9BD50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update8:*:*:*:*:*:*", + "matchCriteriaId": "82208628-F32A-4380-9B0F-DC8507E7701D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update9:*:*:*:*:*:*", + "matchCriteriaId": "1563CE5E-A4F7-40A4-A050-BB96E332D8DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*", + "matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/coldfusion/apsb21-75.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-406xx/CVE-2021-40699.json b/CVE-2021/CVE-2021-406xx/CVE-2021-40699.json index 59e63e20056..479ee43307e 100644 --- a/CVE-2021/CVE-2021-406xx/CVE-2021-40699.json +++ b/CVE-2021/CVE-2021-406xx/CVE-2021-40699.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40699", "sourceIdentifier": "psirt@adobe.com", "published": "2023-09-07T13:15:07.300", - "lastModified": "2023-09-07T13:42:46.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T11:56:32.567", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,7 +13,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -31,13 +31,43 @@ }, "exploitabilityScore": 3.1, "impactScore": 3.7 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 3.7 } ] }, "weaknesses": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +76,91 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2018", + "matchCriteriaId": "1280A922-1722-4AEC-9D84-275B6FC91C80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*", + "matchCriteriaId": "3B54B2B0-B1E1-4B4E-A529-D0BD3B5DEEF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*", + "matchCriteriaId": "EDB126BF-E09D-4E58-A39F-1190407D1CAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update10:*:*:*:*:*:*", + "matchCriteriaId": "8DDD85DF-69A0-476F-8365-CD67C75CF0CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*", + "matchCriteriaId": "59649177-81EE-43C3-BFA5-E56E65B486DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*", + "matchCriteriaId": "453B96ED-738A-4642-B461-C5216CF45CA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*", + "matchCriteriaId": "58D32489-627B-4E49-9329-8A3B8F8E4903" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update5:*:*:*:*:*:*", + "matchCriteriaId": "6D5860E1-D293-48FE-9796-058B78B2D571" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update6:*:*:*:*:*:*", + "matchCriteriaId": "9F9336CC-E38F-4BCB-83CD-805EC7FEF806" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update7:*:*:*:*:*:*", + "matchCriteriaId": "97964507-047A-4CC8-8D2B-0EA0C7F9BD50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update8:*:*:*:*:*:*", + "matchCriteriaId": "82208628-F32A-4380-9B0F-DC8507E7701D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2018:update9:*:*:*:*:*:*", + "matchCriteriaId": "1563CE5E-A4F7-40A4-A050-BB96E332D8DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*", + "matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/coldfusion/apsb21-75.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-407xx/CVE-2021-40723.json b/CVE-2021/CVE-2021-407xx/CVE-2021-40723.json index bb721e1fb78..a39e9c607a6 100644 --- a/CVE-2021/CVE-2021-407xx/CVE-2021-40723.json +++ b/CVE-2021/CVE-2021-407xx/CVE-2021-40723.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40723", "sourceIdentifier": "psirt@adobe.com", "published": "2023-09-07T13:15:07.393", - "lastModified": "2023-09-07T13:42:46.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T11:55:36.473", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,10 +46,80 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionEndExcluding": "2020.001.30020", + "matchCriteriaId": "EE9E49CD-2265-4628-9E43-678ABDF5224F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "2020", + "versionEndExcluding": "2020.001.30020", + "matchCriteriaId": "E85C1624-1F47-4C62-A79E-4DCFEDC83A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionEndExcluding": "2021.001.20135", + "matchCriteriaId": "A698CE4D-E900-4490-A707-F4A5576D0761" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionEndExcluding": "2017.011.30190", + "matchCriteriaId": "6AE4B0AC-4293-453B-9717-AB32F6E7B6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "2020", + "versionEndExcluding": "2020.001.30020", + "matchCriteriaId": "401DDBF5-756F-4D4A-A488-166AF838520B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionEndExcluding": "2021.001.20135", + "matchCriteriaId": "DBB43106-DEBF-4F46-ADAC-33E394295C67" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb21-09.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-427xx/CVE-2021-42734.json b/CVE-2021/CVE-2021-427xx/CVE-2021-42734.json index 2987fa91f37..3044d3c4ca7 100644 --- a/CVE-2021/CVE-2021-427xx/CVE-2021-42734.json +++ b/CVE-2021/CVE-2021-427xx/CVE-2021-42734.json @@ -2,8 +2,8 @@ "id": "CVE-2021-42734", "sourceIdentifier": "psirt@adobe.com", "published": "2023-09-07T13:15:07.883", - "lastModified": "2023-09-07T13:42:46.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T14:16:38.867", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,7 +13,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -31,6 +31,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -46,10 +66,48 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*", + "versionEndIncluding": "22.5.1", + "matchCriteriaId": "EB5EE5D2-7CC5-4D1E-A18F-A37265904105" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/photoshop/apsb21-109.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-430xx/CVE-2021-43018.json b/CVE-2021/CVE-2021-430xx/CVE-2021-43018.json index 6daddc3839e..d6cbaed9432 100644 --- a/CVE-2021/CVE-2021-430xx/CVE-2021-43018.json +++ b/CVE-2021/CVE-2021-430xx/CVE-2021-43018.json @@ -2,8 +2,8 @@ "id": "CVE-2021-43018", "sourceIdentifier": "psirt@adobe.com", "published": "2023-09-07T13:15:07.973", - "lastModified": "2023-09-07T13:42:46.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T14:15:24.477", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,10 +46,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "22.0", + "versionEndExcluding": "22.5.4", + "matchCriteriaId": "12091466-A5F1-49E9-8D3F-E19D64FE3AE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "23.0.0", + "versionEndExcluding": "23.0.2", + "matchCriteriaId": "24B3FCD4-4504-4DA9-936E-197D45BCA1CC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/photoshop/apsb21-113.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-437xx/CVE-2021-43753.json b/CVE-2021/CVE-2021-437xx/CVE-2021-43753.json index 02c919536b1..57899ca2fa9 100644 --- a/CVE-2021/CVE-2021-437xx/CVE-2021-43753.json +++ b/CVE-2021/CVE-2021-437xx/CVE-2021-43753.json @@ -2,8 +2,8 @@ "id": "CVE-2021-43753", "sourceIdentifier": "psirt@adobe.com", "published": "2023-09-07T13:15:08.230", - "lastModified": "2023-09-07T13:42:46.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T14:16:36.873", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", @@ -46,10 +66,35 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/lightroom/apsb21-119.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-446xx/CVE-2021-44693.json b/CVE-2021/CVE-2021-446xx/CVE-2021-44693.json index 3d18b5214cc..70aeb1b79cf 100644 --- a/CVE-2021/CVE-2021-446xx/CVE-2021-44693.json +++ b/CVE-2021/CVE-2021-446xx/CVE-2021-44693.json @@ -2,39 +2,19 @@ "id": "CVE-2021-44693", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:14.750", - "lastModified": "2023-07-11T16:15:10.583", + "lastModified": "2023-09-12T10:15:11.263", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SIMATIC Drive Controller CPU 1504D TF, SIMATIC Drive Controller CPU 1507D TF, SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants), SIMATIC S7-1200 CPU family (incl. SIPLUS variants), SIMATIC S7-1500 CPU 1510SP F-1 PN, SIMATIC S7-1500 CPU 1510SP-1 PN, SIMATIC S7-1500 CPU 1511-1 PN, SIMATIC S7-1500 CPU 1511-1 PN, SIMATIC S7-1500 CPU 1511C-1 PN, SIMATIC S7-1500 CPU 1511C-1 PN, SIMATIC S7-1500 CPU 1511F-1 PN, SIMATIC S7-1500 CPU 1511F-1 PN, SIMATIC S7-1500 CPU 1511T-1 PN, SIMATIC S7-1500 CPU 1511TF-1 PN, SIMATIC S7-1500 CPU 1512C-1 PN, SIMATIC S7-1500 CPU 1512C-1 PN, SIMATIC S7-1500 CPU 1512SP F-1 PN, SIMATIC S7-1500 CPU 1512SP-1 PN, SIMATIC S7-1500 CPU 1513-1 PN, SIMATIC S7-1500 CPU 1513-1 PN, SIMATIC S7-1500 CPU 1513F-1 PN, SIMATIC S7-1500 CPU 1513F-1 PN, SIMATIC S7-1500 CPU 1513R-1 PN, SIMATIC S7-1500 CPU 1515-2 PN, SIMATIC S7-1500 CPU 1515-2 PN, SIMATIC S7-1500 CPU 1515F-2 PN, SIMATIC S7-1500 CPU 1515F-2 PN, SIMATIC S7-1500 CPU 1515R-2 PN, SIMATIC S7-1500 CPU 1515T-2 PN, SIMATIC S7-1500 CPU 1515TF-2 PN, SIMATIC S7-1500 CPU 1516-3 PN/DP, SIMATIC S7-1500 CPU 1516-3 PN/DP, SIMATIC S7-1500 CPU 1516F-3 PN/DP, SIMATIC S7-1500 CPU 1516F-3 PN/DP, SIMATIC S7-1500 CPU 1516T-3 PN/DP, SIMATIC S7-1500 CPU 1516TF-3 PN/DP, SIMATIC S7-1500 CPU 1517-3 PN/DP, SIMATIC S7-1500 CPU 1517F-3 PN/DP, SIMATIC S7-1500 CPU 1517H-3 PN, SIMATIC S7-1500 CPU 1517T-3 PN/DP, SIMATIC S7-1500 CPU 1517TF-3 PN/DP, SIMATIC S7-1500 CPU 1518-4 PN/DP, SIMATIC S7-1500 CPU 1518-4 PN/DP MFP, SIMATIC S7-1500 CPU 1518F-4 PN/DP, SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP, SIMATIC S7-1500 CPU 1518HF-4 PN, SIMATIC S7-1500 CPU 1518T-4 PN/DP, SIMATIC S7-1500 CPU 1518TF-4 PN/DP, SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK, SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN, SIMATIC S7-1500 Software Controller, SIMATIC S7-PLCSIM Advanced, SIPLUS ET 200SP CPU 1510SP F-1 PN, SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1510SP-1 PN, SIPLUS ET 200SP CPU 1510SP-1 PN, SIPLUS ET 200SP CPU 1510SP-1 PN RAIL, SIPLUS ET 200SP CPU 1510SP-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP F-1 PN, SIPLUS ET 200SP CPU 1512SP F-1 PN, SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP-1 PN, SIPLUS ET 200SP CPU 1512SP-1 PN, SIPLUS ET 200SP CPU 1512SP-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP-1 PN RAIL, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL, SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL, SIPLUS S7-1500 CPU 1511-1 PN TX RAIL, SIPLUS S7-1500 CPU 1511-1 PN TX RAIL, SIPLUS S7-1500 CPU 1511F-1 PN, SIPLUS S7-1500 CPU 1511F-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513F-1 PN, SIPLUS S7-1500 CPU 1513F-1 PN, SIPLUS S7-1500 CPU 1515F-2 PN, SIPLUS S7-1500 CPU 1515F-2 PN, SIPLUS S7-1500 CPU 1515F-2 PN RAIL, SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL, SIPLUS S7-1500 CPU 1515R-2 PN, SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL, SIPLUS S7-1500 CPU 1516F-3 PN/DP, SIPLUS S7-1500 CPU 1516F-3 PN/DP, SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1517H-3 PN, SIPLUS S7-1500 CPU 1518-4 PN/DP, SIPLUS S7-1500 CPU 1518-4 PN/DP MFP, SIPLUS S7-1500 CPU 1518F-4 PN/DP, SIPLUS S7-1500 CPU 1518HF-4 PN, SIPLUS TIM 1531 IRC, TIM 1531 IRC. Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device" + "value": "Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device." } ], "metrics": { "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - }, { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", @@ -51,12 +31,32 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "productcert@siemens.com", "type": "Primary", "description": [ { @@ -66,7 +66,7 @@ ] }, { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { diff --git a/CVE-2021/CVE-2021-446xx/CVE-2021-44694.json b/CVE-2021/CVE-2021-446xx/CVE-2021-44694.json index 96dc122b8fa..3af8385d898 100644 --- a/CVE-2021/CVE-2021-446xx/CVE-2021-44694.json +++ b/CVE-2021/CVE-2021-446xx/CVE-2021-44694.json @@ -2,39 +2,19 @@ "id": "CVE-2021-44694", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:14.840", - "lastModified": "2023-07-11T16:15:11.067", + "lastModified": "2023-09-12T10:15:13.027", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SIMATIC Drive Controller CPU 1504D TF, SIMATIC Drive Controller CPU 1507D TF, SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants), SIMATIC S7-1200 CPU family (incl. SIPLUS variants), SIMATIC S7-1500 CPU 1510SP F-1 PN, SIMATIC S7-1500 CPU 1510SP-1 PN, SIMATIC S7-1500 CPU 1511-1 PN, SIMATIC S7-1500 CPU 1511-1 PN, SIMATIC S7-1500 CPU 1511C-1 PN, SIMATIC S7-1500 CPU 1511C-1 PN, SIMATIC S7-1500 CPU 1511F-1 PN, SIMATIC S7-1500 CPU 1511F-1 PN, SIMATIC S7-1500 CPU 1511T-1 PN, SIMATIC S7-1500 CPU 1511TF-1 PN, SIMATIC S7-1500 CPU 1512C-1 PN, SIMATIC S7-1500 CPU 1512C-1 PN, SIMATIC S7-1500 CPU 1512SP F-1 PN, SIMATIC S7-1500 CPU 1512SP-1 PN, SIMATIC S7-1500 CPU 1513-1 PN, SIMATIC S7-1500 CPU 1513-1 PN, SIMATIC S7-1500 CPU 1513F-1 PN, SIMATIC S7-1500 CPU 1513F-1 PN, SIMATIC S7-1500 CPU 1513R-1 PN, SIMATIC S7-1500 CPU 1515-2 PN, SIMATIC S7-1500 CPU 1515-2 PN, SIMATIC S7-1500 CPU 1515F-2 PN, SIMATIC S7-1500 CPU 1515F-2 PN, SIMATIC S7-1500 CPU 1515R-2 PN, SIMATIC S7-1500 CPU 1515T-2 PN, SIMATIC S7-1500 CPU 1515TF-2 PN, SIMATIC S7-1500 CPU 1516-3 PN/DP, SIMATIC S7-1500 CPU 1516-3 PN/DP, SIMATIC S7-1500 CPU 1516F-3 PN/DP, SIMATIC S7-1500 CPU 1516F-3 PN/DP, SIMATIC S7-1500 CPU 1516T-3 PN/DP, SIMATIC S7-1500 CPU 1516TF-3 PN/DP, SIMATIC S7-1500 CPU 1517-3 PN/DP, SIMATIC S7-1500 CPU 1517F-3 PN/DP, SIMATIC S7-1500 CPU 1517H-3 PN, SIMATIC S7-1500 CPU 1517T-3 PN/DP, SIMATIC S7-1500 CPU 1517TF-3 PN/DP, SIMATIC S7-1500 CPU 1518-4 PN/DP, SIMATIC S7-1500 CPU 1518-4 PN/DP MFP, SIMATIC S7-1500 CPU 1518F-4 PN/DP, SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP, SIMATIC S7-1500 CPU 1518HF-4 PN, SIMATIC S7-1500 CPU 1518T-4 PN/DP, SIMATIC S7-1500 CPU 1518TF-4 PN/DP, SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK, SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN, SIMATIC S7-1500 Software Controller, SIMATIC S7-PLCSIM Advanced, SIPLUS ET 200SP CPU 1510SP F-1 PN, SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1510SP-1 PN, SIPLUS ET 200SP CPU 1510SP-1 PN, SIPLUS ET 200SP CPU 1510SP-1 PN RAIL, SIPLUS ET 200SP CPU 1510SP-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP F-1 PN, SIPLUS ET 200SP CPU 1512SP F-1 PN, SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP-1 PN, SIPLUS ET 200SP CPU 1512SP-1 PN, SIPLUS ET 200SP CPU 1512SP-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP-1 PN RAIL, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL, SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL, SIPLUS S7-1500 CPU 1511-1 PN TX RAIL, SIPLUS S7-1500 CPU 1511-1 PN TX RAIL, SIPLUS S7-1500 CPU 1511F-1 PN, SIPLUS S7-1500 CPU 1511F-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513F-1 PN, SIPLUS S7-1500 CPU 1513F-1 PN, SIPLUS S7-1500 CPU 1515F-2 PN, SIPLUS S7-1500 CPU 1515F-2 PN, SIPLUS S7-1500 CPU 1515F-2 PN RAIL, SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL, SIPLUS S7-1500 CPU 1515R-2 PN, SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL, SIPLUS S7-1500 CPU 1516F-3 PN/DP, SIPLUS S7-1500 CPU 1516F-3 PN/DP, SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1517H-3 PN, SIPLUS S7-1500 CPU 1518-4 PN/DP, SIPLUS S7-1500 CPU 1518-4 PN/DP MFP, SIPLUS S7-1500 CPU 1518F-4 PN/DP, SIPLUS S7-1500 CPU 1518HF-4 PN, SIPLUS TIM 1531 IRC, TIM 1531 IRC. Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device" + "value": "Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device." } ], "metrics": { "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - }, { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", @@ -51,27 +31,47 @@ }, "exploitabilityScore": 1.2, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "productcert@siemens.com", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-1287" } ] }, { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-1287" + "value": "CWE-20" } ] } diff --git a/CVE-2021/CVE-2021-446xx/CVE-2021-44695.json b/CVE-2021/CVE-2021-446xx/CVE-2021-44695.json index 0275dd387bb..c38f7e0114c 100644 --- a/CVE-2021/CVE-2021-446xx/CVE-2021-44695.json +++ b/CVE-2021/CVE-2021-446xx/CVE-2021-44695.json @@ -2,39 +2,19 @@ "id": "CVE-2021-44695", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:14.907", - "lastModified": "2023-07-11T16:15:11.530", + "lastModified": "2023-09-12T10:15:14.650", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SIMATIC Drive Controller CPU 1504D TF, SIMATIC Drive Controller CPU 1507D TF, SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants), SIMATIC S7-1200 CPU family (incl. SIPLUS variants), SIMATIC S7-1500 CPU 1510SP F-1 PN, SIMATIC S7-1500 CPU 1510SP-1 PN, SIMATIC S7-1500 CPU 1511-1 PN, SIMATIC S7-1500 CPU 1511-1 PN, SIMATIC S7-1500 CPU 1511C-1 PN, SIMATIC S7-1500 CPU 1511C-1 PN, SIMATIC S7-1500 CPU 1511F-1 PN, SIMATIC S7-1500 CPU 1511F-1 PN, SIMATIC S7-1500 CPU 1511T-1 PN, SIMATIC S7-1500 CPU 1511TF-1 PN, SIMATIC S7-1500 CPU 1512C-1 PN, SIMATIC S7-1500 CPU 1512C-1 PN, SIMATIC S7-1500 CPU 1512SP F-1 PN, SIMATIC S7-1500 CPU 1512SP-1 PN, SIMATIC S7-1500 CPU 1513-1 PN, SIMATIC S7-1500 CPU 1513-1 PN, SIMATIC S7-1500 CPU 1513F-1 PN, SIMATIC S7-1500 CPU 1513F-1 PN, SIMATIC S7-1500 CPU 1513R-1 PN, SIMATIC S7-1500 CPU 1515-2 PN, SIMATIC S7-1500 CPU 1515-2 PN, SIMATIC S7-1500 CPU 1515F-2 PN, SIMATIC S7-1500 CPU 1515F-2 PN, SIMATIC S7-1500 CPU 1515R-2 PN, SIMATIC S7-1500 CPU 1515T-2 PN, SIMATIC S7-1500 CPU 1515TF-2 PN, SIMATIC S7-1500 CPU 1516-3 PN/DP, SIMATIC S7-1500 CPU 1516-3 PN/DP, SIMATIC S7-1500 CPU 1516F-3 PN/DP, SIMATIC S7-1500 CPU 1516F-3 PN/DP, SIMATIC S7-1500 CPU 1516T-3 PN/DP, SIMATIC S7-1500 CPU 1516TF-3 PN/DP, SIMATIC S7-1500 CPU 1517-3 PN/DP, SIMATIC S7-1500 CPU 1517F-3 PN/DP, SIMATIC S7-1500 CPU 1517H-3 PN, SIMATIC S7-1500 CPU 1517T-3 PN/DP, SIMATIC S7-1500 CPU 1517TF-3 PN/DP, SIMATIC S7-1500 CPU 1518-4 PN/DP, SIMATIC S7-1500 CPU 1518-4 PN/DP MFP, SIMATIC S7-1500 CPU 1518F-4 PN/DP, SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP, SIMATIC S7-1500 CPU 1518HF-4 PN, SIMATIC S7-1500 CPU 1518T-4 PN/DP, SIMATIC S7-1500 CPU 1518TF-4 PN/DP, SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK, SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN, SIMATIC S7-1500 Software Controller, SIMATIC S7-PLCSIM Advanced, SIPLUS ET 200SP CPU 1510SP F-1 PN, SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1510SP-1 PN, SIPLUS ET 200SP CPU 1510SP-1 PN, SIPLUS ET 200SP CPU 1510SP-1 PN RAIL, SIPLUS ET 200SP CPU 1510SP-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP F-1 PN, SIPLUS ET 200SP CPU 1512SP F-1 PN, SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP-1 PN, SIPLUS ET 200SP CPU 1512SP-1 PN, SIPLUS ET 200SP CPU 1512SP-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP-1 PN RAIL, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL, SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL, SIPLUS S7-1500 CPU 1511-1 PN TX RAIL, SIPLUS S7-1500 CPU 1511-1 PN TX RAIL, SIPLUS S7-1500 CPU 1511F-1 PN, SIPLUS S7-1500 CPU 1511F-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513F-1 PN, SIPLUS S7-1500 CPU 1513F-1 PN, SIPLUS S7-1500 CPU 1515F-2 PN, SIPLUS S7-1500 CPU 1515F-2 PN, SIPLUS S7-1500 CPU 1515F-2 PN RAIL, SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL, SIPLUS S7-1500 CPU 1515R-2 PN, SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL, SIPLUS S7-1500 CPU 1516F-3 PN/DP, SIPLUS S7-1500 CPU 1516F-3 PN/DP, SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1517H-3 PN, SIPLUS S7-1500 CPU 1518-4 PN/DP, SIPLUS S7-1500 CPU 1518-4 PN/DP MFP, SIPLUS S7-1500 CPU 1518F-4 PN/DP, SIPLUS S7-1500 CPU 1518HF-4 PN, SIPLUS TIM 1531 IRC, TIM 1531 IRC. Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device" + "value": "Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device." } ], "metrics": { "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - }, { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", @@ -51,27 +31,47 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "productcert@siemens.com", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-1286" } ] }, { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-1286" + "value": "CWE-20" } ] } diff --git a/CVE-2022/CVE-2022-14xx/CVE-2022-1415.json b/CVE-2022/CVE-2022-14xx/CVE-2022-1415.json index baf2cf944cf..1f07dd63f28 100644 --- a/CVE-2022/CVE-2022-14xx/CVE-2022-1415.json +++ b/CVE-2022/CVE-2022-14xx/CVE-2022-1415.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1415", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-11T21:15:41.483", - "lastModified": "2023-09-11T21:15:41.483", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-240xx/CVE-2022-24093.json b/CVE-2022/CVE-2022-240xx/CVE-2022-24093.json new file mode 100644 index 00000000000..b70bacd3902 --- /dev/null +++ b/CVE-2022/CVE-2022-240xx/CVE-2022-24093.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-24093", + "sourceIdentifier": "078d4453-3bcd-4900-85e6-15281da43538", + "published": "2023-09-12T08:15:12.960", + "lastModified": "2023-09-12T11:52:00.047", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability. Exploitation of this issue does not require user interaction and could result in a post-authentication arbitrary code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "078d4453-3bcd-4900-85e6-15281da43538", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "078d4453-3bcd-4900-85e6-15281da43538", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/magento/apsb22-13.html", + "source": "078d4453-3bcd-4900-85e6-15281da43538" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-256xx/CVE-2022-25645.json b/CVE-2022/CVE-2022-256xx/CVE-2022-25645.json index c113b9d4af8..28245feaa05 100644 --- a/CVE-2022/CVE-2022-256xx/CVE-2022-25645.json +++ b/CVE-2022/CVE-2022-256xx/CVE-2022-25645.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25645", "sourceIdentifier": "report@snyk.io", "published": "2022-05-01T16:15:08.547", - "lastModified": "2022-05-11T16:18:33.043", - "vulnStatus": "Analyzed", + "lastModified": "2023-09-12T08:15:13.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -120,6 +120,10 @@ "Broken Link" ] }, + { + "url": "https://github.com/lukeed/dset/pull/38", + "source": "report@snyk.io" + }, { "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2431974", "source": "report@snyk.io", diff --git a/CVE-2022/CVE-2022-259xx/CVE-2022-25901.json b/CVE-2022/CVE-2022-259xx/CVE-2022-25901.json index e513e4310b0..9f19219843b 100644 --- a/CVE-2022/CVE-2022-259xx/CVE-2022-25901.json +++ b/CVE-2022/CVE-2022-259xx/CVE-2022-25901.json @@ -1,13 +1,13 @@ { "id": "CVE-2022-25901", - "sourceIdentifier": "report@snyk.io", + "sourceIdentifier": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "published": "2023-01-18T05:15:11.860", - "lastModified": "2023-01-25T18:21:09.810", - "vulnStatus": "Analyzed", + "lastModified": "2023-09-12T03:15:10.087", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression." + "value": "Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression.\r\r" } ], "metrics": { @@ -33,7 +33,7 @@ "impactScore": 3.6 }, { - "source": "report@snyk.io", + "source": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "type": "Secondary", "cvssData": { "version": "3.1", @@ -87,14 +87,14 @@ "references": [ { "url": "https://github.com/bmeck/node-cookiejar/blob/master/cookiejar.js%23L73", - "source": "report@snyk.io", + "source": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "tags": [ "Broken Link" ] }, { "url": "https://github.com/bmeck/node-cookiejar/pull/39", - "source": "report@snyk.io", + "source": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "tags": [ "Patch", "Third Party Advisory" @@ -102,15 +102,19 @@ }, { "url": "https://github.com/bmeck/node-cookiejar/pull/39/commits/eaa00021caf6ae09449dde826108153b578348e5", - "source": "report@snyk.io", + "source": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "tags": [ "Patch", "Third Party Advisory" ] }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00008.html", + "source": "bae035ff-b466-4ff4-94d0-fc9efd9e1730" + }, { "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3176681", - "source": "report@snyk.io", + "source": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "tags": [ "Exploit", "Third Party Advisory" @@ -118,7 +122,7 @@ }, { "url": "https://security.snyk.io/vuln/SNYK-JS-COOKIEJAR-3149984", - "source": "report@snyk.io", + "source": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "tags": [ "Exploit", "Third Party Advisory" diff --git a/CVE-2022/CVE-2022-391xx/CVE-2022-39158.json b/CVE-2022/CVE-2022-391xx/CVE-2022-39158.json index 845234e3fef..3a4223c5d6b 100644 --- a/CVE-2022/CVE-2022-391xx/CVE-2022-39158.json +++ b/CVE-2022/CVE-2022-391xx/CVE-2022-39158.json @@ -2,12 +2,12 @@ "id": "CVE-2022-39158", "sourceIdentifier": "productcert@siemens.com", "published": "2022-09-13T10:15:12.087", - "lastModified": "2023-04-11T10:15:16.527", + "lastModified": "2023-09-12T10:15:19.500", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400F, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416F, RUGGEDCOM RS416NC, RUGGEDCOM RS416NC v2, RUGGEDCOM RS416P, RUGGEDCOM RS416PF, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNC v2, RUGGEDCOM RS416Pv2, RUGGEDCOM RS416v2, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900F, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GF, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPF, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GF, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100F, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PF, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200F, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300F, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PF, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488F, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. Affected devices improperly handle partial HTTP requests which makes them vulnerable to slowloris attacks. \r\n\r\nThis could allow a remote attacker to create a denial of service condition that persists until the attack ends." + "value": "A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400F, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416F, RUGGEDCOM RS416NC, RUGGEDCOM RS416NC v2, RUGGEDCOM RS416NC v2, RUGGEDCOM RS416P, RUGGEDCOM RS416PF, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNC v2, RUGGEDCOM RS416PNC v2, RUGGEDCOM RS416Pv2, RUGGEDCOM RS416v2, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900F, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GF, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPF, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GF, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100F, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PF, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200F, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300F, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PF, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488F, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. Affected devices improperly handle partial HTTP requests which makes them vulnerable to slowloris attacks. \r\n\r\nThis could allow a remote attacker to create a denial of service condition that persists until the attack ends." }, { "lang": "es", diff --git a/CVE-2022/CVE-2022-439xx/CVE-2022-43958.json b/CVE-2022/CVE-2022-439xx/CVE-2022-43958.json index c98da5bef8d..56c5bc3cd11 100644 --- a/CVE-2022/CVE-2022-439xx/CVE-2022-43958.json +++ b/CVE-2022/CVE-2022-439xx/CVE-2022-43958.json @@ -2,19 +2,39 @@ "id": "CVE-2022-43958", "sourceIdentifier": "productcert@siemens.com", "published": "2022-11-08T11:15:12.193", - "lastModified": "2022-11-09T17:19:20.887", - "vulnStatus": "Analyzed", + "lastModified": "2023-09-12T10:15:21.017", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in QMS Automotive (All versions). User credentials are stored in plaintext in the database. This could allow an attacker to gain access to credentials and impersonate other users." + "value": "A vulnerability has been identified in QMS Automotive (All versions < V12.39), QMS Automotive (All versions < V12.39). User credentials are stored in plaintext in the database without any hashing mechanism. This could allow an attacker to gain access to credentials and impersonate other users." } ], "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "productcert@siemens.com", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", @@ -36,22 +56,22 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "productcert@siemens.com", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-312" + "value": "CWE-256" } ] }, { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-316" + "value": "CWE-312" } ] } @@ -74,6 +94,10 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-587547.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2022/CVE-2022-450xx/CVE-2022-45044.json b/CVE-2022/CVE-2022-450xx/CVE-2022-45044.json index ac6a3f65821..e25fa73d64d 100644 --- a/CVE-2022/CVE-2022-450xx/CVE-2022-45044.json +++ b/CVE-2022/CVE-2022-450xx/CVE-2022-45044.json @@ -2,12 +2,12 @@ "id": "CVE-2022-45044", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:24.617", - "lastModified": "2023-05-09T13:15:15.893", + "lastModified": "2023-09-12T10:15:21.413", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.50), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.50), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.50), SIPROTEC 5 6MD89 (CP300) (All versions), SIPROTEC 5 6MU85 (CP300) (All versions < V9.50), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.50), SIPROTEC 5 7SA84 (CP200) (All versions), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.50), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.50), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.50), SIPROTEC 5 7SD84 (CP200) (All versions), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.50), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.50), SIPROTEC 5 7SJ81 (CP100) (All versions), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.50), SIPROTEC 5 7SJ82 (CP100) (All versions), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.50), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.50), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.50), SIPROTEC 5 7SK82 (CP100) (All versions), SIPROTEC 5 7SK82 (CP150) (All versions < V9.50), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.50), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.50), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.50), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.50), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.50), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions), SIPROTEC 5 7ST86 (CP300) (All versions), SIPROTEC 5 7SX82 (CP150) (All versions < V9.50), SIPROTEC 5 7SX85 (CP300) (All versions < V9.50), SIPROTEC 5 7UM85 (CP300) (All versions < V9.50), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.50), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.50), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.50), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.50), SIPROTEC 5 7VE85 (CP300) (All versions < V9.50), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.50), SIPROTEC 5 7VU85 (CP300) (All versions < V9.50), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions < V9.50 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions installed on CP100 and CP200 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions < V9.50 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions installed on CP100 and CP200 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.50), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.50). Affected devices do not properly restrict secure client-initiated renegotiations within the SSL and TLS protocols. This could allow an attacker to create a denial of service condition on the ports 443/tcp and 4443/tcp for the duration of the attack." + "value": "A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.50), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.50), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.50), SIPROTEC 5 6MD89 (CP300) (All versions < V9.60), SIPROTEC 5 6MU85 (CP300) (All versions < V9.50), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V9.60), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.50), SIPROTEC 5 7SA84 (CP200) (All versions), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.50), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.50), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.50), SIPROTEC 5 7SD84 (CP200) (All versions), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.50), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.50), SIPROTEC 5 7SJ81 (CP100) (All versions), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.50), SIPROTEC 5 7SJ82 (CP100) (All versions), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.50), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.50), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.50), SIPROTEC 5 7SK82 (CP100) (All versions), SIPROTEC 5 7SK82 (CP150) (All versions < V9.50), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.50), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.50), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.50), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.50), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.50), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V9.60), SIPROTEC 5 7ST86 (CP300) (All versions < V9.60), SIPROTEC 5 7SX82 (CP150) (All versions < V9.50), SIPROTEC 5 7SX85 (CP300) (All versions < V9.50), SIPROTEC 5 7UM85 (CP300) (All versions < V9.50), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.50), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.50), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.50), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.50), SIPROTEC 5 7VE85 (CP300) (All versions < V9.50), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.50), SIPROTEC 5 7VU85 (CP300) (All versions < V9.50), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions < V9.50 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions installed on CP100 and CP200 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions < V9.50 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions installed on CP100 and CP200 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.50), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.50). Affected devices do not properly restrict secure client-initiated renegotiations within the SSL and TLS protocols. This could allow an attacker to create a denial of service condition on the ports 443/tcp and 4443/tcp for the duration of the attack." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48474.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48474.json new file mode 100644 index 00000000000..8734864c269 --- /dev/null +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48474.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-48474", + "sourceIdentifier": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516", + "published": "2023-09-12T08:15:13.473", + "lastModified": "2023-09-12T11:52:00.047", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Control de Ciber, in its 1.650 version, is affected by a Denial of Service condition through the version function. Sending a malicious request could cause the server to check if an unrecognized component is up to date, causing a memory failure error that shuts down the process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-control-de-ciber", + "source": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48475.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48475.json new file mode 100644 index 00000000000..e7ac8209e34 --- /dev/null +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48475.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-48475", + "sourceIdentifier": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516", + "published": "2023-09-12T08:15:13.573", + "lastModified": "2023-09-12T11:52:00.047", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability in Control de Ciber version 1.650, in the printing function. Sending a modified request by the attacker could cause a Buffer Overflow when the adminitrator tries to accept or delete the print query created by the request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-control-de-ciber", + "source": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4896.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4896.json new file mode 100644 index 00000000000..c29279b8103 --- /dev/null +++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4896.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-4896", + "sourceIdentifier": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516", + "published": "2023-09-12T08:15:13.657", + "lastModified": "2023-09-12T11:52:00.047", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cyber Control, in its 1.650 version, is affected by a vulnerability\u00a0in the generation on the server of pop-up windows with the messages \"PNTMEDIDAS\", \"PEDIR\", \"HAYDISCOA\" or \"SPOOLER\". A complete denial of service can be achieved by sending multiple requests simultaneously on a core." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-control-de-ciber", + "source": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2071.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2071.json new file mode 100644 index 00000000000..4e23400aa56 --- /dev/null +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2071.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-2071", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2023-09-12T14:15:09.663", + "lastModified": "2023-09-12T14:47:07.713", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\nRockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user\u2019s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets. \u00a0The device has the functionality, through a CIP class, to execute exported functions from libraries. \u00a0There is a routine that restricts it to execute specific functions from two dynamic link library files. \u00a0By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140724", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-255xx/CVE-2023-25519.json b/CVE-2023/CVE-2023-255xx/CVE-2023-25519.json new file mode 100644 index 00000000000..d50ae8e1ded --- /dev/null +++ b/CVE-2023/CVE-2023-255xx/CVE-2023-25519.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25519", + "sourceIdentifier": "9576f279-3576-44b5-a4af-b9a8644b2de6", + "published": "2023-09-12T02:15:10.173", + "lastModified": "2023-09-12T11:52:05.517", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\nNVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.\u00a0 \n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "9576f279-3576-44b5-a4af-b9a8644b2de6", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "9576f279-3576-44b5-a4af-b9a8644b2de6", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-286" + } + ] + } + ], + "references": [ + { + "url": "https://https://nvidia.custhelp.com/app/answers/detail/a_id/5479", + "source": "9576f279-3576-44b5-a4af-b9a8644b2de6" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26142.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26142.json new file mode 100644 index 00000000000..a47f6adf018 --- /dev/null +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26142.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2023-26142", + "sourceIdentifier": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", + "published": "2023-09-12T05:15:41.467", + "lastModified": "2023-09-12T11:52:00.047", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \\r\\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://gist.github.com/dellalibera/9247769cc90ed96c0d72ddbcba88c65c", + "source": "bae035ff-b466-4ff4-94d0-fc9efd9e1730" + }, + { + "url": "https://security.snyk.io/vuln/SNYK-UNMANAGED-CROW-5665556", + "source": "bae035ff-b466-4ff4-94d0-fc9efd9e1730" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27169.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27169.json new file mode 100644 index 00000000000..33d6b658c5f --- /dev/null +++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27169.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-27169", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-09-12T12:15:07.580", + "lastModified": "2023-09-12T14:47:07.713", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Xpand IT Write-back manager v2.3.1 uses a hardcoded salt in license class configuration which leads to the generation of a hardcoded and predictable symmetric encryption keys for license generation and validation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://balwurk.com", + "source": "cve@mitre.org" + }, + { + "url": "https://balwurk.com/cve-use-of-hard-coded-cryptographic-key/", + "source": "cve@mitre.org" + }, + { + "url": "https://writeback4t.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.xpand-it.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2705.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2705.json index 41661b10ece..939aa62903a 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2705.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2705.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2705", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-11T20:15:08.537", - "lastModified": "2023-09-11T20:15:08.537", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:17.333", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28766.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28766.json index 3e39a1ff328..45505b523cb 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28766.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28766.json @@ -2,12 +2,12 @@ "id": "CVE-2023-28766", "sourceIdentifier": "productcert@siemens.com", "published": "2023-04-11T10:15:18.337", - "lastModified": "2023-05-09T13:15:16.957", + "lastModified": "2023-09-12T10:15:23.957", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SIPROTEC 5 6MD85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 6MD86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 6MD89 (CP300) (All versions >= V7.80), SIPROTEC 5 6MU85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7KE85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.40), SIPROTEC 5 7SA86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SA87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.40), SIPROTEC 5 7SD86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SD87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SJ81 (CP100) (All versions), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.40), SIPROTEC 5 7SJ82 (CP100) (All versions), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.40), SIPROTEC 5 7SJ85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SJ86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SK82 (CP100) (All versions), SIPROTEC 5 7SK82 (CP150) (All versions < V9.40), SIPROTEC 5 7SK85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.40), SIPROTEC 5 7SL86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SL87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SS85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7ST85 (CP300) (All versions >= V7.80), SIPROTEC 5 7ST86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SX82 (CP150) (All versions < V9.40), SIPROTEC 5 7SX85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UM85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.40), SIPROTEC 5 7UT85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VE85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VK87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VU85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions < V9.40), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions < V9.40), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.40), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.40). Affected devices lack proper validation of http request parameters of the hosted web service.\r\nAn unauthenticated remote attacker could send specially crafted packets that could cause denial of service condition of the target device." + "value": "A vulnerability has been identified in SIPROTEC 5 6MD85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 6MD86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 6MD89 (CP300) (All versions >= V7.80 < V9.60), SIPROTEC 5 6MU85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7KE85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.40), SIPROTEC 5 7SA86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SA87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.40), SIPROTEC 5 7SD86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SD87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SJ81 (CP100) (All versions), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.40), SIPROTEC 5 7SJ82 (CP100) (All versions), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.40), SIPROTEC 5 7SJ85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SJ86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SK82 (CP100) (All versions), SIPROTEC 5 7SK82 (CP150) (All versions < V9.40), SIPROTEC 5 7SK85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.40), SIPROTEC 5 7SL86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SL87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SS85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7ST85 (CP300) (All versions >= V7.80 < V9.60), SIPROTEC 5 7ST86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SX82 (CP150) (All versions < V9.40), SIPROTEC 5 7SX85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UM85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.40), SIPROTEC 5 7UT85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VE85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VK87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VU85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions < V9.40), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions < V9.40), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.40), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.40). Affected devices lack proper validation of http request parameters of the hosted web service.\r\nAn unauthenticated remote attacker could send specially crafted packets that could cause denial of service condition of the target device." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28831.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28831.json new file mode 100644 index 00000000000..b17a51ae7d6 --- /dev/null +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28831.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28831", + "sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "published": "2023-09-12T10:15:27.230", + "lastModified": "2023-09-12T11:52:00.047", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The ANSI C OPC UA SDK contains an integer overflow vulnerability that could cause the application to run into an infinite loop during certificate validation.\r\n\r\nThis could allow an unauthenticated remote attacker to create a denial of service condition by sending a specially crafted certificate." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-711309.pdf", + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-308xx/CVE-2023-30800.json b/CVE-2023/CVE-2023-308xx/CVE-2023-30800.json index d4847e7252c..0cfae1756cd 100644 --- a/CVE-2023/CVE-2023-308xx/CVE-2023-30800.json +++ b/CVE-2023/CVE-2023-308xx/CVE-2023-30800.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30800", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2023-09-07T16:15:07.670", - "lastModified": "2023-09-07T16:25:45.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T14:18:05.673", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "disclosure@vulncheck.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "disclosure@vulncheck.com", "type": "Secondary", @@ -46,10 +76,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mikrotik:routeros:*:*:*:*:-:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.49.10", + "matchCriteriaId": "3C171D42-9A4F-43E0-BF7C-13A7FEC2F049" + } + ] + } + ] + } + ], "references": [ { "url": "https://vulncheck.com/advisories/mikrotik-jsproxy-dos", - "source": "disclosure@vulncheck.com" + "source": "disclosure@vulncheck.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3039.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3039.json new file mode 100644 index 00000000000..6480f953210 --- /dev/null +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3039.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-3039", + "sourceIdentifier": "c550e75a-17ff-4988-97f0-544cde3820fe", + "published": "2023-09-12T07:15:08.183", + "lastModified": "2023-09-12T11:52:00.047", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\nSD ROM Utility, versions prior to 1.0.2.0 contain an Improper Access Control vulnerability. A low-privileged malicious user may potentially exploit this vulnerability to perform arbitrary code execution with limited access.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "c550e75a-17ff-4988-97f0-544cde3820fe", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "c550e75a-17ff-4988-97f0-544cde3820fe", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000216282/dsa-2023-274", + "source": "c550e75a-17ff-4988-97f0-544cde3820fe" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31067.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31067.json index eb7688c2818..d75e237f812 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31067.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31067.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31067", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T19:15:41.873", - "lastModified": "2023-09-11T19:15:41.873", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:22.703", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31068.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31068.json index 53a7ad83e6d..301bd00ba57 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31068.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31068.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31068", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T19:15:41.927", - "lastModified": "2023-09-11T19:15:41.927", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:22.703", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31069.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31069.json index 28ec0bbadbe..05d63410487 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31069.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31069.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31069", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T19:15:41.983", - "lastModified": "2023-09-11T19:15:41.983", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:22.703", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31468.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31468.json index 45e15e583f3..ca265688cba 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31468.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31468.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31468", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T19:15:42.173", - "lastModified": "2023-09-11T19:15:42.173", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:22.703", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3169.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3169.json index 5baeb7ca3f5..61e441f3fad 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3169.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3169.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3169", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-11T20:15:09.713", - "lastModified": "2023-09-11T20:15:09.713", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:17.333", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3170.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3170.json index 7ed72725a3a..3e8f4096a76 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3170.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3170.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3170", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-11T20:15:09.883", - "lastModified": "2023-09-11T20:15:09.883", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:17.333", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32005.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32005.json new file mode 100644 index 00000000000..15bdd69649a --- /dev/null +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32005.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-32005", + "sourceIdentifier": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", + "published": "2023-09-12T02:15:11.863", + "lastModified": "2023-09-12T11:52:05.517", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Node.js version 20, affecting users of the experimental permission model when the --allow-fs-read flag is used with a non-* argument.\n\nThis flaw arises from an inadequate permission model that fails to restrict file stats through the `fs.statfs` API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to.\n\nThis vulnerability affects all users using the experimental permission model in Node.js 20.\n\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://hackerone.com/reports/2051224", + "source": "36234546-b8fa-4601-9d6f-f4e334aa8ea1" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32558.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32558.json new file mode 100644 index 00000000000..1fd02aa2217 --- /dev/null +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32558.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-32558", + "sourceIdentifier": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", + "published": "2023-09-12T02:15:12.067", + "lastModified": "2023-09-12T11:52:05.517", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The use of the deprecated API `process.binding()` can bypass the permission model through path traversal. \n\nThis vulnerability affects all users using the experimental permission model in Node.js 20.x.\n\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://hackerone.com/reports/2051257", + "source": "36234546-b8fa-4601-9d6f-f4e334aa8ea1" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32672.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32672.json index 0241bec1fc3..1f5eaa5a527 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32672.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32672.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32672", "sourceIdentifier": "security@apache.org", "published": "2023-09-06T14:15:10.297", - "lastModified": "2023-09-07T01:10:21.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T14:45:56.303", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security@apache.org", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.1.0", + "matchCriteriaId": "A5C7318E-1118-457F-A2BC-8B9400AE7C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/ococ6nlj80f0okkwfwpjczy3q84j3wkp", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-334xx/CVE-2023-33466.json b/CVE-2023/CVE-2023-334xx/CVE-2023-33466.json index 85607111582..2daa6656513 100644 --- a/CVE-2023/CVE-2023-334xx/CVE-2023-33466.json +++ b/CVE-2023/CVE-2023-334xx/CVE-2023-33466.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33466", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-29T15:15:09.483", - "lastModified": "2023-08-09T20:15:10.200", + "lastModified": "2023-09-12T11:15:07.650", "vulnStatus": "Modified", "descriptions": [ { @@ -73,6 +73,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00009.html", + "source": "cve@mitre.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5473", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34357.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34357.json index 92a39650626..9e53ff21362 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34357.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34357.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34357", "sourceIdentifier": "twcert@cert.org.tw", "published": "2023-09-07T03:15:08.263", - "lastModified": "2023-09-07T12:50:36.973", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T11:59:33.197", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:scshr:hr_portal:7.3.2023.0510:*:*:*:*:*:*:*", + "matchCriteriaId": "7B4925F6-A93D-405C-A152-3E6753255964" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:scshr:hr_portal:7.3.2023.0705:*:*:*:*:*:*:*", + "matchCriteriaId": "398FFD5F-CF3E-4159-A46D-F8D706A25F79" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-7347-2653e-1.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35658.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35658.json index 6c80eee10e8..a61f2684c46 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35658.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35658.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35658", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:41.660", - "lastModified": "2023-09-11T21:15:41.660", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35664.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35664.json index ee5e169e0d0..4fc7690de86 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35664.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35664.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35664", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:41.727", - "lastModified": "2023-09-11T21:15:41.727", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35665.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35665.json index d646bb19acc..1c7b32b239d 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35665.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35665.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35665", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:41.787", - "lastModified": "2023-09-11T21:15:41.787", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35666.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35666.json index 6a5c6e3bed1..f435083814c 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35666.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35666.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35666", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:41.847", - "lastModified": "2023-09-11T21:15:41.847", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35667.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35667.json index ca00e21e689..0b5e14731d5 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35667.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35667.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35667", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:41.903", - "lastModified": "2023-09-11T21:15:41.903", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35669.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35669.json index 1d308ae5f9a..65295e0a3d9 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35669.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35669.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35669", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:41.960", - "lastModified": "2023-09-11T21:15:41.960", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35670.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35670.json index 8dbd9f9dee6..8d9ed3300a2 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35670.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35670.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35670", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.020", - "lastModified": "2023-09-11T21:15:42.020", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35671.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35671.json index 87d420087d0..48e062f3816 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35671.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35671.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35671", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.080", - "lastModified": "2023-09-11T21:15:42.080", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35673.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35673.json index a1fd6a03097..88b3bfd866e 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35673.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35673.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35673", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.137", - "lastModified": "2023-09-11T21:15:42.137", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35674.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35674.json index db2221018d9..1e10ee9298d 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35674.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35674.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35674", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.193", - "lastModified": "2023-09-11T21:15:42.193", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35675.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35675.json index 3f836becdd1..c8551c81a34 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35675.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35675.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35675", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.253", - "lastModified": "2023-09-11T21:15:42.253", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35676.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35676.json index b487e8992a6..654779786d1 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35676.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35676.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35676", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.313", - "lastModified": "2023-09-11T21:15:42.313", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35677.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35677.json index 7928c7fdd31..da2f65e86e0 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35677.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35677.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35677", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.367", - "lastModified": "2023-09-11T21:15:42.367", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35679.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35679.json index 0452f0d3e75..e9007b41f6f 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35679.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35679.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35679", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.427", - "lastModified": "2023-09-11T21:15:42.427", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35680.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35680.json index a565597b3b2..cb2dc1b5830 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35680.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35680.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35680", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.490", - "lastModified": "2023-09-11T21:15:42.490", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35681.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35681.json index f15dc30fe23..79b66ee672c 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35681.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35681.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35681", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.543", - "lastModified": "2023-09-11T21:15:42.543", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35682.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35682.json index a3fd5c4c859..d18d7bf895d 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35682.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35682.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35682", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.597", - "lastModified": "2023-09-11T21:15:42.597", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35683.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35683.json index 5fd9eb87e36..428c2b9b7ea 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35683.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35683.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35683", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.660", - "lastModified": "2023-09-11T21:15:42.660", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35684.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35684.json index 623534ca4ed..7d71793f974 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35684.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35684.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35684", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.717", - "lastModified": "2023-09-11T21:15:42.717", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:10.097", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35687.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35687.json index 7afcfe7f0ab..00ef243ce95 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35687.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35687.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35687", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.773", - "lastModified": "2023-09-11T21:15:42.773", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:05.517", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3510.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3510.json index 3291465552d..98d811f78b6 100644 --- a/CVE-2023/CVE-2023-35xx/CVE-2023-3510.json +++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3510.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3510", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-11T20:15:10.040", - "lastModified": "2023-09-11T20:15:10.040", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:17.333", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36497.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36497.json index 30f3f08b60a..dfe13164ceb 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36497.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36497.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36497", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-09-11T20:15:09.017", - "lastModified": "2023-09-11T20:15:09.017", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:17.333", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36635.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36635.json index 81d6baae3aa..906a0c44a0e 100644 --- a/CVE-2023/CVE-2023-366xx/CVE-2023-36635.json +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36635.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36635", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-09-07T13:15:08.433", - "lastModified": "2023-09-07T13:42:46.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T14:26:21.927", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,63 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5B4A6B0D-1614-443B-8EBA-A8FBC2E1A832" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "331A1766-4EBA-4519-A8ED-E0DD68A187E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2B73D78B-2270-45B7-854E-F985B8D88F3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "469E9E1C-154C-41CB-AC83-FBE5E6FA83EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "959248C7-DC92-4968-87F9-2A2CDF84F7BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-22-174", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Not Applicable", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3612.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3612.json index fa93d27c7e0..26ab1d0361c 100644 --- a/CVE-2023/CVE-2023-36xx/CVE-2023-3612.json +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3612.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3612", "sourceIdentifier": "incident@nbu.gov.sk", "published": "2023-09-11T10:15:07.603", - "lastModified": "2023-09-11T12:41:46.007", + "lastModified": "2023-09-12T08:15:13.753", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -48,7 +48,7 @@ ], "references": [ { - "url": "https://www.sk-cert.sk/sk/threat/sk-cert-bezpecnostne-varovanie-v20230811-10", + "url": "https://www.sk-cert.sk/threat/sk-cert-bezpecnostne-varovanie-v20230811-10", "source": "incident@nbu.gov.sk" } ] diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37489.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37489.json new file mode 100644 index 00000000000..bd461b9f7b8 --- /dev/null +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37489.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37489", + "sourceIdentifier": "e4686d1a-f260-4930-ac4c-2f5c992778dd", + "published": "2023-09-12T02:15:12.160", + "lastModified": "2023-09-12T11:52:05.517", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Due to the lack of validation, SAP BusinessObjects Business Intelligence Platform (Version Management System) - version 403, permits an unauthenticated user to read the code snippet through the UI, which leads to low impact on confidentiality and no impact on the application's availability or integrity.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "e4686d1a-f260-4930-ac4c-2f5c992778dd", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "e4686d1a-f260-4930-ac4c-2f5c992778dd", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3352453", + "source": "e4686d1a-f260-4930-ac4c-2f5c992778dd" + }, + { + "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", + "source": "e4686d1a-f260-4930-ac4c-2f5c992778dd" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-377xx/CVE-2023-37798.json b/CVE-2023/CVE-2023-377xx/CVE-2023-37798.json index ef4e4192acb..fca609efefb 100644 --- a/CVE-2023/CVE-2023-377xx/CVE-2023-37798.json +++ b/CVE-2023/CVE-2023-377xx/CVE-2023-37798.json @@ -2,27 +2,90 @@ "id": "CVE-2023-37798", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-07T19:15:47.510", - "lastModified": "2023-09-07T20:17:06.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T13:02:44.157", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the new REDCap project creation function of Vanderbilt REDCap 13.1.35 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the project title parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vanderbilt:redcap:*:*:*:*:*:*:*:*", + "versionEndIncluding": "13.1.35", + "matchCriteriaId": "40893ACC-652C-4691-8BEB-D3AFBBDE63FD" + } + ] + } + ] + } + ], "references": [ { "url": "http://redcap.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://vanderbilt.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.cyderes.com/blog/cve-2023-37798-stored-cross-site-scripting-in-vanderbilt-redcap/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-378xx/CVE-2023-37875.json b/CVE-2023/CVE-2023-378xx/CVE-2023-37875.json new file mode 100644 index 00000000000..950e1ec5399 --- /dev/null +++ b/CVE-2023/CVE-2023-378xx/CVE-2023-37875.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-37875", + "sourceIdentifier": "455daabc-a392-441d-aa46-37d35189897c", + "published": "2023-09-12T09:15:07.807", + "lastModified": "2023-09-12T11:52:00.047", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper encoding or escaping of output in Wing FTP Server (User Web Client) allows Cross-Site Scripting (XSS).This issue affects Wing FTP Server: <= 7.2.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "455daabc-a392-441d-aa46-37d35189897c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.0, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "455daabc-a392-441d-aa46-37d35189897c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://www.wftpserver.com/serverhistory.htm", + "source": "455daabc-a392-441d-aa46-37d35189897c" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-378xx/CVE-2023-37878.json b/CVE-2023/CVE-2023-378xx/CVE-2023-37878.json new file mode 100644 index 00000000000..c21cf3e2aef --- /dev/null +++ b/CVE-2023/CVE-2023-378xx/CVE-2023-37878.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-37878", + "sourceIdentifier": "455daabc-a392-441d-aa46-37d35189897c", + "published": "2023-09-12T09:15:08.223", + "lastModified": "2023-09-12T11:52:00.047", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Insecure default permissions in Wing FTP Server (Admin Web Client) allows for privilege escalation.This issue affects Wing FTP Server: <= 7.2.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "455daabc-a392-441d-aa46-37d35189897c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "455daabc-a392-441d-aa46-37d35189897c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.wftpserver.com/serverhistory.htm", + "source": "455daabc-a392-441d-aa46-37d35189897c" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-378xx/CVE-2023-37879.json b/CVE-2023/CVE-2023-378xx/CVE-2023-37879.json new file mode 100644 index 00000000000..b50723f5d3a --- /dev/null +++ b/CVE-2023/CVE-2023-378xx/CVE-2023-37879.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-37879", + "sourceIdentifier": "455daabc-a392-441d-aa46-37d35189897c", + "published": "2023-09-12T09:15:08.313", + "lastModified": "2023-09-12T11:52:00.047", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Insecure storage of sensitive information in Wing FTP Server (User Web Client) allows information elicitation.This issue affects Wing FTP Server: <= 7.2.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "455daabc-a392-441d-aa46-37d35189897c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "455daabc-a392-441d-aa46-37d35189897c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "references": [ + { + "url": "https://www.wftpserver.com/serverhistory.htm", + "source": "455daabc-a392-441d-aa46-37d35189897c" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-378xx/CVE-2023-37881.json b/CVE-2023/CVE-2023-378xx/CVE-2023-37881.json new file mode 100644 index 00000000000..2094ed59cd2 --- /dev/null +++ b/CVE-2023/CVE-2023-378xx/CVE-2023-37881.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-37881", + "sourceIdentifier": "455daabc-a392-441d-aa46-37d35189897c", + "published": "2023-09-12T09:15:08.397", + "lastModified": "2023-09-12T11:52:00.047", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Weak access control in Wing FTP Server (Admin Web Client) allows for privilege escalation.This issue affects Wing FTP Server: <= 7.2.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "455daabc-a392-441d-aa46-37d35189897c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "455daabc-a392-441d-aa46-37d35189897c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.wftpserver.com/serverhistory.htm", + "source": "455daabc-a392-441d-aa46-37d35189897c" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37941.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37941.json index c4895291747..91f55f33f5d 100644 --- a/CVE-2023/CVE-2023-379xx/CVE-2023-37941.json +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37941.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37941", "sourceIdentifier": "security@apache.org", "published": "2023-09-06T14:15:10.483", - "lastModified": "2023-09-07T01:10:21.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T14:53:13.953", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security@apache.org", "type": "Secondary", @@ -46,10 +66,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.5.0", + "versionEndIncluding": "2.1.0", + "matchCriteriaId": "194D69D9-4F2A-4F75-BFFF-134E4F2352D6" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/6qk1zscc06yogxxfgz2bh2bvz6vh9g7h", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38070.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38070.json new file mode 100644 index 00000000000..ff7e563c361 --- /dev/null +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38070.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38070", + "sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "published": "2023-09-12T10:15:27.460", + "lastModified": "2023-09-12T11:51:54.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1). The affected application is vulnerable to stack-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20818)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf", + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38071.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38071.json new file mode 100644 index 00000000000..9eaea559c0e --- /dev/null +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38071.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38071", + "sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "published": "2023-09-12T10:15:27.767", + "lastModified": "2023-09-12T11:51:54.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20824)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf", + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38072.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38072.json new file mode 100644 index 00000000000..d0d47b3661d --- /dev/null +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38072.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38072", + "sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "published": "2023-09-12T10:15:27.863", + "lastModified": "2023-09-12T11:51:54.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20825)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf", + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38073.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38073.json new file mode 100644 index 00000000000..178a67858d4 --- /dev/null +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38073.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38073", + "sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "published": "2023-09-12T10:15:28.113", + "lastModified": "2023-09-12T11:51:54.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1). The affected application contains a type confusion vulnerability while parsing WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20826)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf", + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38074.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38074.json new file mode 100644 index 00000000000..49669ec6ea4 --- /dev/null +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38074.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38074", + "sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "published": "2023-09-12T10:15:28.367", + "lastModified": "2023-09-12T11:51:54.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1). The affected application contains a type confusion vulnerability while parsing WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20840)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf", + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38075.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38075.json new file mode 100644 index 00000000000..3ab7471b766 --- /dev/null +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38075.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38075", + "sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "published": "2023-09-12T10:15:28.630", + "lastModified": "2023-09-12T11:51:54.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1). The affected application contains a use-after-free vulnerability that could be triggered while parsing specially crafted WRL files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-20842)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf", + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38076.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38076.json new file mode 100644 index 00000000000..bdd546b1f58 --- /dev/null +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38076.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38076", + "sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "published": "2023-09-12T10:15:28.727", + "lastModified": "2023-09-12T11:51:54.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21041)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf", + "source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38256.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38256.json index c6c4fd41765..dce3e0bd396 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38256.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38256.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38256", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-09-11T20:15:09.307", - "lastModified": "2023-09-11T20:15:09.307", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:17.333", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38605.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38605.json index f700377e71a..ae1437ea6e7 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38605.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38605.json @@ -2,27 +2,111 @@ "id": "CVE-2023-38605", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T21:15:12.783", - "lastModified": "2023-09-09T22:15:09.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T12:59:06.820", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.5. An app may be able to determine a user\u2019s current location." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.7.8", + "matchCriteriaId": "5E276423-4032-4E12-AB11-88F7047E35EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.7.8", + "matchCriteriaId": "8635FA0F-1876-4E3A-B02D-31AEA459C38E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.6.8", + "matchCriteriaId": "470A3D9B-5DD1-4708-8291-F6DEDE5618E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.5", + "matchCriteriaId": "3D701507-146E-4E5B-8C32-60E797E46627" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213843", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT213842", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT213844", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38616.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38616.json index 606f9a80895..7de0cab0aba 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38616.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38616.json @@ -2,19 +2,76 @@ "id": "CVE-2023-38616", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T21:15:13.063", - "lastModified": "2023-09-07T01:10:21.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T12:57:45.157", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A race condition was addressed with improved state handling. This issue is fixed in macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.5", + "matchCriteriaId": "7FB2CB0B-A635-4057-98B8-AF71F9CB0171" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213843", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-387xx/CVE-2023-38743.json b/CVE-2023/CVE-2023-387xx/CVE-2023-38743.json index 82f22e4ecc3..fb9747dcb66 100644 --- a/CVE-2023/CVE-2023-387xx/CVE-2023-38743.json +++ b/CVE-2023/CVE-2023-387xx/CVE-2023-38743.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38743", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T19:15:42.890", - "lastModified": "2023-09-11T19:15:42.890", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:22.703", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38829.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38829.json index 83f0581b39d..18f1f312afb 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38829.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38829.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38829", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T19:15:42.957", - "lastModified": "2023-09-11T19:15:42.957", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:22.703", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38878.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38878.json index 16d22caaa63..07ea10ec288 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38878.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38878.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38878", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T22:15:08.023", - "lastModified": "2023-09-11T22:15:08.023", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:05.517", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39063.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39063.json index d12384a63e6..85951a07d41 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39063.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39063.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39063", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T19:15:43.013", - "lastModified": "2023-09-11T19:15:43.013", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:22.703", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39068.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39068.json index 336a35e1815..8ade3f8fed0 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39068.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39068.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39068", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T19:15:43.070", - "lastModified": "2023-09-11T19:15:43.070", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:22.703", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39069.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39069.json index b15d850b154..05df5587869 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39069.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39069.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39069", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T23:15:07.480", - "lastModified": "2023-09-11T23:15:07.480", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:05.517", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39070.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39070.json index 1fcf68948ef..37813be8945 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39070.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39070.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39070", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-11T19:15:43.127", - "lastModified": "2023-09-11T19:15:43.127", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:22.703", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39150.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39150.json new file mode 100644 index 00000000000..e9cd03c64ce --- /dev/null +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39150.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-39150", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-09-12T13:15:07.897", + "lastModified": "2023-09-12T14:47:07.713", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "ConEmu before commit 230724 does not sanitize title responses correctly for control characters, potentially leading to arbitrary code execution. This is related to an incomplete fix for CVE-2022-46387." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/dgl/081cf503dc635df39d844e058a6d4c88", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Maximus5/ConEmu/commit/60683a186628ffaa7689fcb64b3c38ced69287c1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39227.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39227.json index 262067c868d..962af588a23 100644 --- a/CVE-2023/CVE-2023-392xx/CVE-2023-39227.json +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39227.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39227", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-09-11T20:15:09.493", - "lastModified": "2023-09-11T20:15:09.493", - "vulnStatus": "Received", + "lastModified": "2023-09-12T11:52:17.333", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39265.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39265.json index f40c64057dd..666fb87bdb8 100644 --- a/CVE-2023/CVE-2023-392xx/CVE-2023-39265.json +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39265.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39265", "sourceIdentifier": "security@apache.org", "published": "2023-09-06T14:15:10.687", - "lastModified": "2023-09-07T01:10:21.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T15:09:15.800", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + }, { "source": "security@apache.org", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.1.0", + "matchCriteriaId": "A5C7318E-1118-457F-A2BC-8B9400AE7C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/pwdzsdmv4g5g1n2h9m7ortfnxmhr7nfy", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39318.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39318.json index a06c4a90a32..78d7ab655fb 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39318.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39318.json @@ -2,16 +2,49 @@ "id": "CVE-2023-39318", "sourceIdentifier": "security@golang.org", "published": "2023-09-08T17:15:27.823", - "lastModified": "2023-09-08T17:36:26.487", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T15:09:57.040", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The html/template package does not properly handle HTML-like \"\" comment tokens, nor hashbang \"#!\" comment tokens, in