Auto-Update: 2023-11-26T13:00:20.952055+00:00

This commit is contained in:
cad-safe-bot 2023-11-26 13:00:24 +00:00
parent a3bb63a63a
commit e1aec81f90
11 changed files with 143 additions and 95 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-27827",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-03-18T17:15:13.510",
"lastModified": "2023-11-07T03:21:02.557",
"lastModified": "2023-11-26T11:15:07.307",
"vulnStatus": "Modified",
"descriptions": [
{
@ -65,7 +65,7 @@
},
"weaknesses": [
{
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
@ -218,10 +218,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:simatic_hmi_unified_comfort_panels_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17",
"matchCriteriaId": "CAB60054-8FD0-45A4-B7DC-FFF061764B80"
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:simatic_hmi_unified_comfort_panels:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2921C017-7617-4789-9690-C81EAC4F469D"
}
]
},
@ -230,9 +229,10 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:simatic_hmi_unified_comfort_panels:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2921C017-7617-4789-9690-C81EAC4F469D"
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:simatic_hmi_unified_comfort_panels_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17",
"matchCriteriaId": "CAB60054-8FD0-45A4-B7DC-FFF061764B80"
}
]
}
@ -241,17 +241,6 @@
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1243-1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "238D992C-6158-4E31-AE0A-7A9C54B51963"
}
]
},
{
"operator": "OR",
"negate": false,
@ -262,23 +251,23 @@
"matchCriteriaId": "65278BA0-3C81-4D81-9801-D7BE3A1D7680"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2009C1FA-96D5-413C-9161-0DB55F841088"
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1243-1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "238D992C-6158-4E31-AE0A-7A9C54B51963"
}
]
},
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
@ -289,23 +278,23 @@
"matchCriteriaId": "350FD323-C876-4C7A-A2E7-4B0660C87F6C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F56E0C04-AEC3-45C8-93E7-FCA3B7F370F6"
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2009C1FA-96D5-413C-9161-0DB55F841088"
}
]
},
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
@ -316,23 +305,23 @@
"matchCriteriaId": "0602DEEA-AE39-4A44-9D78-6623943DDCD6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_irc_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F7747CD-757E-4B36-8F23-7588183948A7"
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F56E0C04-AEC3-45C8-93E7-FCA3B7F370F6"
}
]
},
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
@ -343,23 +332,23 @@
"matchCriteriaId": "C1EE2F10-A7A6-486F-AE5C-53AE25BAF200"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB5A494F-2EAB-4647-9A45-5CB0C382E099"
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_irc_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F7747CD-757E-4B36-8F23-7588183948A7"
}
]
},
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
@ -370,6 +359,17 @@
"matchCriteriaId": "F56C2BDC-928E-491A-8E7C-F976B3787C7A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB5A494F-2EAB-4647-9A45-5CB0C382E099"
}
]
}
]
},
@ -381,9 +381,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1543sp-1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98C894B9-C62A-4689-9DA4-D9A3795B8CE5"
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:simatic_net_cp_1543sp-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "783B50B8-2FB7-4982-88AA-B4F2AD094796"
}
]
},
@ -392,9 +392,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:simatic_net_cp_1543sp-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "783B50B8-2FB7-4982-88AA-B4F2AD094796"
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1543sp-1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98C894B9-C62A-4689-9DA4-D9A3795B8CE5"
}
]
}
@ -524,6 +524,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202311-16",
"source": "secalert@redhat.com"
},
{
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-07",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-35498",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-02-11T18:15:15.677",
"lastModified": "2023-11-07T03:21:55.877",
"lastModified": "2023-11-26T11:15:07.937",
"vulnStatus": "Modified",
"descriptions": [
{
@ -65,7 +65,7 @@
},
"weaknesses": [
{
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
@ -214,6 +214,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJ4DXFJWMZ325ECZXPZOSK7BOEDJZHPR/",
"source": "secalert@redhat.com"
},
{
"url": "https://security.gentoo.org/glsa/202311-16",
"source": "secalert@redhat.com"
},
{
"url": "https://www.debian.org/security/2021/dsa-4852",
"source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-36980",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-07-20T07:15:08.113",
"lastModified": "2021-07-28T19:48:38.940",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-26T11:15:08.053",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202311-16",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-3905",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-08-23T16:15:10.177",
"lastModified": "2022-08-27T02:01:53.313",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-26T11:15:08.147",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -143,6 +143,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202311-16",
"source": "secalert@redhat.com"
},
{
"url": "https://ubuntu.com/security/CVE-2021-3905",
"source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-0813",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2022-03-10T17:44:57.003",
"lastModified": "2022-03-12T04:23:44.157",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-26T12:15:06.950",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -124,6 +124,10 @@
}
],
"references": [
{
"url": "https://security.gentoo.org/glsa/202311-17",
"source": "cve-coordination@incibe.es"
},
{
"url": "https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information",
"source": "cve-coordination@incibe.es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-23807",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-22T02:15:07.150",
"lastModified": "2022-01-27T14:24:01.360",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-26T12:15:07.127",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -102,6 +102,10 @@
}
],
"references": [
{
"url": "https://security.gentoo.org/glsa/202311-17",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpmyadmin.net/security/PMASA-2022-1/",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-23808",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-22T02:15:07.197",
"lastModified": "2023-04-29T18:15:39.057",
"lastModified": "2023-11-26T12:15:07.213",
"vulnStatus": "Modified",
"descriptions": [
{
@ -99,6 +99,10 @@
"url": "https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97",
"source": "cve@mitre.org"
},
{
"url": "https://security.gentoo.org/glsa/202311-17",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpmyadmin.net/security/PMASA-2022-2/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4337",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-01-10T22:15:13.933",
"lastModified": "2023-01-18T20:26:02.100",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-26T11:15:08.287",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -132,6 +132,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202311-16",
"source": "secalert@redhat.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5319",
"source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4338",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-01-10T22:15:14.007",
"lastModified": "2023-01-18T20:26:07.357",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-26T11:15:08.393",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -142,6 +142,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202311-16",
"source": "secalert@redhat.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5319",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1668",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-04-10T22:15:09.133",
"lastModified": "2023-11-07T04:04:33.040",
"lastModified": "2023-11-26T11:15:08.477",
"vulnStatus": "Modified",
"descriptions": [
{
@ -46,7 +46,7 @@
]
},
{
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
@ -167,17 +167,6 @@
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:fast_datapath:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A63D05D-BFAF-484B-BA49-5F5E399CDA02"
}
]
},
{
"operator": "OR",
"negate": false,
@ -193,6 +182,17 @@
"matchCriteriaId": "053C1B35-3869-41C2-9551-044182DE0A64"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:fast_datapath:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A63D05D-BFAF-484B-BA49-5F5E399CDA02"
}
]
}
]
}
@ -214,6 +214,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2GUNS3WSJG4TUDKZ5L7FXGJMVOD6EJZ/",
"source": "secalert@redhat.com"
},
{
"url": "https://security.gentoo.org/glsa/202311-16",
"source": "secalert@redhat.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5387",
"source": "secalert@redhat.com",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-26T11:01:01.859091+00:00
2023-11-26T13:00:20.952055+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-26T09:15:45.077000+00:00
2023-11-26T12:15:07.213000+00:00
```
### Last Data Feed Release
@ -40,10 +40,18 @@ Recently added CVEs: `0`
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `10`
* [CVE-2023-0950](CVE-2023/CVE-2023-09xx/CVE-2023-0950.json) (`2023-11-26T09:15:44.177`)
* [CVE-2023-2255](CVE-2023/CVE-2023-22xx/CVE-2023-2255.json) (`2023-11-26T09:15:45.077`)
* [CVE-2020-27827](CVE-2020/CVE-2020-278xx/CVE-2020-27827.json) (`2023-11-26T11:15:07.307`)
* [CVE-2020-35498](CVE-2020/CVE-2020-354xx/CVE-2020-35498.json) (`2023-11-26T11:15:07.937`)
* [CVE-2021-36980](CVE-2021/CVE-2021-369xx/CVE-2021-36980.json) (`2023-11-26T11:15:08.053`)
* [CVE-2021-3905](CVE-2021/CVE-2021-39xx/CVE-2021-3905.json) (`2023-11-26T11:15:08.147`)
* [CVE-2022-4337](CVE-2022/CVE-2022-43xx/CVE-2022-4337.json) (`2023-11-26T11:15:08.287`)
* [CVE-2022-4338](CVE-2022/CVE-2022-43xx/CVE-2022-4338.json) (`2023-11-26T11:15:08.393`)
* [CVE-2022-0813](CVE-2022/CVE-2022-08xx/CVE-2022-0813.json) (`2023-11-26T12:15:06.950`)
* [CVE-2022-23807](CVE-2022/CVE-2022-238xx/CVE-2022-23807.json) (`2023-11-26T12:15:07.127`)
* [CVE-2022-23808](CVE-2022/CVE-2022-238xx/CVE-2022-23808.json) (`2023-11-26T12:15:07.213`)
* [CVE-2023-1668](CVE-2023/CVE-2023-16xx/CVE-2023-1668.json) (`2023-11-26T11:15:08.477`)
## Download and Usage