diff --git a/CVE-2020/CVE-2020-157xx/CVE-2020-15795.json b/CVE-2020/CVE-2020-157xx/CVE-2020-15795.json index 486f1a0233d..dc5ab668d14 100644 --- a/CVE-2020/CVE-2020-157xx/CVE-2020-15795.json +++ b/CVE-2020/CVE-2020-157xx/CVE-2020-15795.json @@ -2,12 +2,12 @@ "id": "CVE-2020-15795", "sourceIdentifier": "productcert@siemens.com", "published": "2021-04-22T21:15:09.090", - "lastModified": "2022-04-29T01:52:01.693", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-08T10:15:11.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Nucleus NET (All versions < V5.2), Nucleus Source Code (Versions including affected DNS modules). The DNS domain name label parsing functionality does not properly validate the names in DNS-responses. The parsing of malformed responses could result in a write past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to execute code in the context of the current process or cause a denial-of-service condition." + "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions < V5.2), Nucleus Source Code (Versions including affected DNS modules), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS domain name label parsing functionality does not properly validate the names in DNS-responses. The parsing of malformed responses could result in a write past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to execute code in the context of the current process or cause a denial-of-service condition." }, { "lang": "es", @@ -35,6 +35,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -109,20 +129,16 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-185699.pdf", "source": "productcert@siemens.com", "tags": [ "Vendor Advisory" ] - }, - { - "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-04", - "source": "productcert@siemens.com", - "tags": [ - "Third Party Advisory", - "US Government Resource" - ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-270xx/CVE-2020-27009.json b/CVE-2020/CVE-2020-270xx/CVE-2020-27009.json index c469aeb38a2..0630d97a30a 100644 --- a/CVE-2020/CVE-2020-270xx/CVE-2020-27009.json +++ b/CVE-2020/CVE-2020-270xx/CVE-2020-27009.json @@ -2,12 +2,12 @@ "id": "CVE-2020-27009", "sourceIdentifier": "productcert@siemens.com", "published": "2021-04-22T21:15:09.220", - "lastModified": "2022-08-05T17:13:46.700", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-08T10:15:11.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Nucleus NET (All versions < V5.2), Nucleus Source Code (Versions including affected DNS modules). The DNS domain name record decompression functionality does not properly validate the pointer offset values. The parsing of malformed responses could result in a write past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to execute code in the context of the current process or cause a denial-of-service condition." + "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions < V5.2), Nucleus Source Code (Versions including affected DNS modules), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS domain name record decompression functionality does not properly validate the pointer offset values. The parsing of malformed responses could result in a write past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to execute code in the context of the current process or cause a denial-of-service condition." }, { "lang": "es", @@ -35,6 +35,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -109,20 +129,16 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-185699.pdf", "source": "productcert@siemens.com", "tags": [ "Vendor Advisory" ] - }, - { - "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-04", - "source": "productcert@siemens.com", - "tags": [ - "Third Party Advisory", - "US Government Resource" - ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-277xx/CVE-2020-27736.json b/CVE-2020/CVE-2020-277xx/CVE-2020-27736.json index c506983025a..a216b487b5b 100644 --- a/CVE-2020/CVE-2020-277xx/CVE-2020-27736.json +++ b/CVE-2020/CVE-2020-277xx/CVE-2020-27736.json @@ -2,12 +2,12 @@ "id": "CVE-2020-27736", "sourceIdentifier": "productcert@siemens.com", "published": "2021-04-22T21:15:09.250", - "lastModified": "2022-08-05T17:13:32.757", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-08T10:15:11.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0). The DNS domain name label parsing functionality does not properly validate the null-terminated name in DNS-responses. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the read memory." + "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS domain name label parsing functionality does not properly validate the null-terminated name in DNS-responses. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the read memory." }, { "lang": "es", @@ -35,6 +35,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 4.2 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.2 } ], "cvssMetricV2": [ @@ -149,6 +169,10 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2020/CVE-2020-277xx/CVE-2020-27737.json b/CVE-2020/CVE-2020-277xx/CVE-2020-27737.json index d0685f44301..80576f2d4e3 100644 --- a/CVE-2020/CVE-2020-277xx/CVE-2020-27737.json +++ b/CVE-2020/CVE-2020-277xx/CVE-2020-27737.json @@ -2,12 +2,12 @@ "id": "CVE-2020-27737", "sourceIdentifier": "productcert@siemens.com", "published": "2021-04-22T21:15:09.280", - "lastModified": "2022-04-29T02:03:50.717", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-08T10:15:11.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0). The DNS response parsing functionality does not properly validate various length and counts of the records. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the memory past the allocated structure." + "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS response parsing functionality does not properly validate various length and counts of the records. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the memory past the allocated structure." }, { "lang": "es", @@ -35,6 +35,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 4.2 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.2 } ], "cvssMetricV2": [ @@ -149,6 +169,10 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2020/CVE-2020-277xx/CVE-2020-27738.json b/CVE-2020/CVE-2020-277xx/CVE-2020-27738.json index 30725658035..268ff1a0211 100644 --- a/CVE-2020/CVE-2020-277xx/CVE-2020-27738.json +++ b/CVE-2020/CVE-2020-277xx/CVE-2020-27738.json @@ -2,12 +2,12 @@ "id": "CVE-2020-27738", "sourceIdentifier": "productcert@siemens.com", "published": "2021-04-22T21:15:09.313", - "lastModified": "2022-04-22T19:44:09.450", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-08T10:15:12.050", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0). The DNS domain name record decompression functionality does not properly validate the pointer offset values. The parsing of malformed responses could result in a read access past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition." + "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS domain name record decompression functionality does not properly validate the pointer offset values. The parsing of malformed responses could result in a read access past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition." }, { "lang": "es", @@ -35,6 +35,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.2 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.2 } ], "cvssMetricV2": [ @@ -65,22 +85,22 @@ }, "weaknesses": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-788" + "value": "CWE-119" } ] }, { - "source": "nvd@nist.gov", + "source": "productcert@siemens.com", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-788" } ] } @@ -149,6 +169,10 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2020/CVE-2020-283xx/CVE-2020-28388.json b/CVE-2020/CVE-2020-283xx/CVE-2020-28388.json index bb27f4fd353..7379c1b67e9 100644 --- a/CVE-2020/CVE-2020-283xx/CVE-2020-28388.json +++ b/CVE-2020/CVE-2020-283xx/CVE-2020-28388.json @@ -2,12 +2,12 @@ "id": "CVE-2020-28388", "sourceIdentifier": "productcert@siemens.com", "published": "2021-02-09T18:15:34.590", - "lastModified": "2022-12-13T16:15:13.087", + "lastModified": "2023-08-08T10:15:12.203", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in APOGEE PXC Series (BACnet) (All versions < V3.5.5), APOGEE PXC Series (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions < V5.2), Nucleus ReadyStart V3 (All versions < V2012.12), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Series (BACnet) (All versions < V3.5.5). Initial Sequence Numbers (ISNs) for TCP connections are derived from an insufficiently random source. As a result, the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future ones." + "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions < V5.2), Nucleus ReadyStart V3 (All versions < V2012.12), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). Initial Sequence Numbers (ISNs) for TCP connections are derived from an insufficiently random source. As a result, the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future ones." }, { "lang": "es", @@ -35,6 +35,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ], "cvssMetricV2": [ @@ -65,22 +85,22 @@ }, "weaknesses": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-342" + "value": "NVD-CWE-Other" } ] }, { - "source": "nvd@nist.gov", + "source": "productcert@siemens.com", "type": "Secondary", "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-342" } ] } @@ -158,6 +178,10 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2021/CVE-2021-256xx/CVE-2021-25677.json b/CVE-2021/CVE-2021-256xx/CVE-2021-25677.json index 66a089aa2a8..2e6216b0dfd 100644 --- a/CVE-2021/CVE-2021-256xx/CVE-2021-25677.json +++ b/CVE-2021/CVE-2021-256xx/CVE-2021-25677.json @@ -2,12 +2,12 @@ "id": "CVE-2021-25677", "sourceIdentifier": "productcert@siemens.com", "published": "2021-04-22T21:15:10.207", - "lastModified": "2022-04-22T19:41:02.467", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-08T10:15:12.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions >= V0.5.0.0 < V1.0.0.0). The DNS client does not properly randomize DNS transaction IDs. That could allow an attacker to poison the DNS cache or spoof DNS resolving." + "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions >= V0.5.0.0 < V1.0.0.0), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS client does not properly randomize DNS transaction IDs. That could allow an attacker to poison the DNS cache or spoof DNS resolving." }, { "lang": "es", @@ -35,6 +35,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -149,6 +169,10 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2021/CVE-2021-415xx/CVE-2021-41544.json b/CVE-2021/CVE-2021-415xx/CVE-2021-41544.json new file mode 100644 index 00000000000..2e55968f56d --- /dev/null +++ b/CVE-2021/CVE-2021-415xx/CVE-2021-41544.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2021-41544", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:12.500", + "lastModified": "2023-08-08T10:15:12.500", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Siemens Software Center (All versions < V3.0). A DLL Hijacking vulnerability could allow a local attacker to execute code with elevated privileges by placing a malicious DLL in one of the directories on the DLL search path." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-188491.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39062.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39062.json new file mode 100644 index 00000000000..127016226f0 --- /dev/null +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39062.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-39062", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:12.657", + "lastModified": "2023-08-08T10:15:12.657", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in SICAM TOOLBOX II (All versions < V07.10). Affected applications do not properly set permissions for product folders. This could allow an authenticated attacker with low privileges to replace DLLs and conduct a privilege escalation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-975961.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40510.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40510.json new file mode 100644 index 00000000000..38f3f0935ee --- /dev/null +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40510.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2022-40510", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:12.757", + "lastModified": "2023-08-08T10:15:12.757", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption due to buffer copy without checking size of input in Audio while voice call with EVS vocoder." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45937.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45937.json index 807f43fab1f..fae28afe3c0 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45937.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45937.json @@ -2,12 +2,12 @@ "id": "CVE-2022-45937", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:24.893", - "lastModified": "2022-12-19T14:34:45.220", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-08T10:15:12.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in APOGEE PXC Series (BACnet) (All versions < V3.5.5), APOGEE PXC Series (P2 Ethernet) (All versions < V2.8.20), TALON TC Series (BACnet) (All versions < V3.5.5). A low privilege authenticated attacker with network access to the integrated web server could download sensitive information from the device containing user account credentials." + "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). A low privilege authenticated attacker with network access to the integrated web server could download sensitive information from the device containing user account credentials." } ], "metrics": { @@ -31,6 +31,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1207.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1207.json index 0d6ba2a9664..e9738dec6b8 100644 --- a/CVE-2023/CVE-2023-12xx/CVE-2023-1207.json +++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1207.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1207", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-15T13:15:10.303", - "lastModified": "2023-05-23T17:40:40.700", + "lastModified": "2023-08-08T11:45:03.967", "vulnStatus": "Analyzed", "descriptions": [ { @@ -55,9 +55,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:http_headers_project:http_headers:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:riverside:http_headers:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.18.8", - "matchCriteriaId": "90D4B3F3-D7F6-48F5-AE76-6478BA3C4037" + "matchCriteriaId": "CB2CFF3A-3BE6-4F5C-ABC4-713326446C93" } ] } diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1208.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1208.json index bbe20541ce9..7e4f9a4964f 100644 --- a/CVE-2023/CVE-2023-12xx/CVE-2023-1208.json +++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1208.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1208", "sourceIdentifier": "contact@wpscan.com", "published": "2023-07-10T16:15:48.833", - "lastModified": "2023-07-14T16:03:52.603", + "lastModified": "2023-08-08T11:45:03.967", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,9 +65,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:http_headers_project:http_headers:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:riverside:http_headers:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.18.11", - "matchCriteriaId": "FED725B0-1362-4123-B435-9493C4DD493F" + "matchCriteriaId": "16BF8BD6-584A-4682-A423-8B8657361E35" } ] } diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21625.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21625.json new file mode 100644 index 00000000000..f228d1722cf --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21625.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21625", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:13.057", + "lastModified": "2023-08-08T10:15:13.057", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Information disclosure in Network Services due to buffer over-read while the device receives DNS response." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21626.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21626.json new file mode 100644 index 00000000000..589ea889782 --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21626.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21626", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:13.137", + "lastModified": "2023-08-08T10:15:13.137", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cryptographic issue in HLOS due to improper authentication while performing key velocity checks using more than one key." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21627.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21627.json new file mode 100644 index 00000000000..abc6d093e32 --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21627.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21627", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:13.220", + "lastModified": "2023-08-08T10:15:13.220", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in Trusted Execution Environment while calling service API with invalid address." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21643.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21643.json new file mode 100644 index 00000000000..1e2397085a6 --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21643.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21643", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:13.303", + "lastModified": "2023-08-08T10:15:13.303", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption due to untrusted pointer dereference in automotive during system call." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 5.3 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21647.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21647.json new file mode 100644 index 00000000000..b206500137b --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21647.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21647", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:13.393", + "lastModified": "2023-08-08T10:15:13.393", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Information disclosure in Bluetooth when an GATT packet is received due to improper input validation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21648.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21648.json new file mode 100644 index 00000000000..8864ca026bf --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21648.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21648", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:13.480", + "lastModified": "2023-08-08T10:15:13.480", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in RIL while trying to send apdu packet." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21649.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21649.json new file mode 100644 index 00000000000..acca414e3de --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21649.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21649", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:13.563", + "lastModified": "2023-08-08T10:15:13.563", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in WLAN while running doDriverCmd for an unspecific command." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21650.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21650.json new file mode 100644 index 00000000000..47be38b26bf --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21650.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21650", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:13.643", + "lastModified": "2023-08-08T10:15:13.643", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory Corruption in GPS HLOS Driver when injectFdclData receives data with invalid data length." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21651.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21651.json new file mode 100644 index 00000000000..7109b250f75 --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21651.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21651", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:13.727", + "lastModified": "2023-08-08T10:15:13.727", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory Corruption in Core due to incorrect type conversion or cast in secure_io_read/write function in TEE." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.5, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21652.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21652.json new file mode 100644 index 00000000000..df1e695543b --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21652.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21652", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:13.803", + "lastModified": "2023-08-08T10:15:13.803", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cryptographic issue in HLOS as derived keys used to encrypt/decrypt information is present on stack after use." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22666.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22666.json new file mode 100644 index 00000000000..538a498a210 --- /dev/null +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22666.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-22666", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:13.880", + "lastModified": "2023-08-08T10:15:13.880", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory Corruption in Audio while playing amrwbplus clips with modified content." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24845.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24845.json new file mode 100644 index 00000000000..3d6df25d3e6 --- /dev/null +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24845.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-24845", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:13.963", + "lastModified": "2023-08-08T10:15:13.963", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400F, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416F, RUGGEDCOM RS416NC, RUGGEDCOM RS416NC v2, RUGGEDCOM RS416P, RUGGEDCOM RS416PF, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNC v2, RUGGEDCOM RS416Pv2, RUGGEDCOM RS416v2, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900F, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GF, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPF, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GF, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100F, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PF, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200F, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300F, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PF, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488F, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. The affected products insufficiently block data from being forwarded over the mirror port into the mirrored network.\r\n\r\nAn attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-684" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-908185.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25957.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25957.json index 3cd03c266cd..b81c4754acd 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25957.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25957.json @@ -2,12 +2,12 @@ "id": "CVE-2023-25957", "sourceIdentifier": "productcert@siemens.com", "published": "2023-03-14T10:15:28.577", - "lastModified": "2023-06-13T09:15:16.340", + "lastModified": "2023-08-08T10:15:14.060", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions >= V1.16.4 < V1.17.3), Mendix SAML (Mendix 8 compatible) (All versions >= V2.2.0 < V2.3.0), Mendix SAML (Mendix 9 compatible, New Track) (All versions >= V3.1.9 < V3.3.1), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions >= V3.1.8 < V3.3.0). The affected versions of the module insufficiently verifies the SAML assertions. This could allow unauthenticated remote attackers to bypass authentication and get access to the application.\r\n\r\nFor compatibility reasons, fix versions still contain this issue, but only when the recommended, default configuration option `'Use Encryption'` is disabled." + "value": "A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions >= V1.16.4 < V1.17.3), Mendix SAML (Mendix 8 compatible) (All versions >= V2.2.0 < V2.3.0), Mendix SAML (Mendix 9 latest compatible, New Track) (All versions >= V3.1.9 < V3.3.1), Mendix SAML (Mendix 9 latest compatible, Upgrade Track) (All versions >= V3.1.8 < V3.3.0), Mendix SAML (Mendix 9.6 compatible, New Track) (All versions >= V3.1.9 < V3.2.7), Mendix SAML (Mendix 9.6 compatible, Upgrade Track) (All versions >= V3.1.8 < V3.2.6). The affected versions of the module insufficiently verify the SAML assertions. This could allow unauthenticated remote attackers to bypass authentication and get access to the application.\r\n\r\nFor compatibility reasons, fix versions still contain this issue, but only when the recommended, default configuration option `'Use Encryption'` is disabled." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27411.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27411.json new file mode 100644 index 00000000000..15b8510a304 --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27411.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27411", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:14.183", + "lastModified": "2023-08-08T10:15:14.183", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in RUGGEDCOM CROSSBOW (All versions < V5.4). The affected applications is vulnerable to SQL injection. This could allow an authenticated remote attackers to execute arbitrary SQL queries on the server database and escalate privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-472630.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27412.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27412.json new file mode 100644 index 00000000000..dee34a34e88 --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27412.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27412", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-08-08T11:15:09.953", + "lastModified": "2023-08-08T11:15:09.953", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Everest themes Mocho Blog theme <=\u00a01.0.4 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/mocho-blog/wordpress-mocho-blog-theme-1-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27416.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27416.json new file mode 100644 index 00000000000..aacbec6b5e8 --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27416.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27416", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-08-08T11:15:10.287", + "lastModified": "2023-08-08T11:15:10.287", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Decon Digital Decon WP SMS plugin <=\u00a01.1 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/decon-wp-sms/wordpress-decon-wp-sms-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27421.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27421.json new file mode 100644 index 00000000000..1c7e0498f29 --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27421.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27421", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-08-08T11:15:10.520", + "lastModified": "2023-08-08T11:15:10.520", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Everest themes Everest News theme <=\u00a01.1.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/everest-news/wordpress-everest-news-theme-1-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27422.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27422.json new file mode 100644 index 00000000000..0b1a9c3bd0b --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27422.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27422", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-08-08T11:15:10.737", + "lastModified": "2023-08-08T11:15:10.737", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in NsThemes NS Coupon To Become Customer plugin <=\u00a01.2.2 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ns-coupon-to-become-customer/wordpress-ns-coupon-to-become-customer-plugin-1-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28537.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28537.json new file mode 100644 index 00000000000..5dab484f502 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28537.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28537", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:14.287", + "lastModified": "2023-08-08T10:15:14.287", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while allocating memory in COmxApeDec module in Audio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28555.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28555.json new file mode 100644 index 00000000000..9dae4eb5b67 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28555.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28555", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:14.373", + "lastModified": "2023-08-08T10:15:14.373", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS in Audio while remapping channel buffer in media codec decoding." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28561.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28561.json new file mode 100644 index 00000000000..489d6c930d5 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28561.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28561", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:14.447", + "lastModified": "2023-08-08T10:15:14.447", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in QESL while processing payload from external ESL device to firmware." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28575.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28575.json new file mode 100644 index 00000000000..93ff9da68c1 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28575.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28575", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:14.537", + "lastModified": "2023-08-08T10:15:14.537", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The cam_get_device_priv function does not check the type of handle being returned (device/session/link). This would lead to invalid type usage if a wrong handle is passed to it." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28576.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28576.json new file mode 100644 index 00000000000..00cd051204d --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28576.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28576", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:14.640", + "lastModified": "2023-08-08T10:15:14.640", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28577.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28577.json new file mode 100644 index 00000000000..fb4c7c31a63 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28577.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28577", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-08-08T10:15:14.760", + "lastModified": "2023-08-08T10:15:14.760", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28830.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28830.json new file mode 100644 index 00000000000..7dea9b1ab63 --- /dev/null +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28830.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28830", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:14.847", + "lastModified": "2023-08-08T10:15:14.847", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in JT2Go (All versions < V14.2.0.5), Solid Edge SE2022 (All versions < V222.0 Update 13), Solid Edge SE2023 (All versions < V223.0 Update 4), Teamcenter Visualization V13.2 (All versions < V13.2.0.15), Teamcenter Visualization V13.3 (All versions < V13.3.0.11), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.5). The affected application contains a use-after-free vulnerability that could be triggered while parsing specially crafted ASM file. An attacker could leverage this vulnerability to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-131450.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29099.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29099.json new file mode 100644 index 00000000000..b88cb24d0cc --- /dev/null +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29099.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-29099", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-08-08T11:15:10.900", + "lastModified": "2023-08-08T11:15:10.900", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Elegant themes Divi theme <=\u00a04.20.2 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/divi/wordpress-divi-theme-4-20-2-contributor-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29129.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29129.json index 55c8b2c8a78..9ce2cf7f54a 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29129.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29129.json @@ -2,12 +2,12 @@ "id": "CVE-2023-29129", "sourceIdentifier": "productcert@siemens.com", "published": "2023-06-13T09:15:16.767", - "lastModified": "2023-07-05T17:02:50.873", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-08T10:15:14.957", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions >= V1.17.3 < V1.18.0), Mendix SAML (Mendix 7 compatible) (All versions >= V1.16.4 < V1.17.3), Mendix SAML (Mendix 8 compatible) (All versions >= V2.3.0 < V2.4.0), Mendix SAML (Mendix 8 compatible) (All versions >= V2.2.0 < V2.3.0), Mendix SAML (Mendix 9 compatible, New Track) (All versions >= V3.3.1 < V3.6.1), Mendix SAML (Mendix 9 compatible, New Track) (All versions >= V3.1.9 < V3.3.1), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions >= V3.3.0 < V3.6.0), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions >= V3.1.8 < V3.3.0). The affected versions of the module insufficiently verifies the SAML assertions. This could allow unauthenticated remote attackers to bypass authentication and get access to the application.\r\n\r\nThis CVE entry describes the incomplete fix for CVE-2023-25957 in a specific non default configuration." + "value": "A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions >= V1.17.3 < V1.18.0), Mendix SAML (Mendix 7 compatible) (All versions >= V1.16.4 < V1.17.3), Mendix SAML (Mendix 8 compatible) (All versions >= V2.3.0 < V2.4.0), Mendix SAML (Mendix 8 compatible) (All versions >= V2.2.0 < V2.3.0), Mendix SAML (Mendix 9 latest compatible, New Track) (All versions >= V3.3.1 < V3.6.1), Mendix SAML (Mendix 9 latest compatible, New Track) (All versions >= V3.1.9 < V3.3.1), Mendix SAML (Mendix 9 latest compatible, Upgrade Track) (All versions >= V3.3.0 < V3.6.0), Mendix SAML (Mendix 9 latest compatible, Upgrade Track) (All versions >= V3.1.8 < V3.3.0), Mendix SAML (Mendix 9.12/9.18 compatible, New Track) (All versions >= V3.3.1 < V3.3.15), Mendix SAML (Mendix 9.12/9.18 compatible, Upgrade Track) (All versions >= V3.3.0 < V3.3.14), Mendix SAML (Mendix 9.6 compatible, New Track) (All versions >= V3.1.9 < V3.2.7), Mendix SAML (Mendix 9.6 compatible, Upgrade Track) (All versions >= V3.1.8 < V3.2.6). The affected versions of the module insufficiently verify the SAML assertions. This could allow unauthenticated remote attackers to bypass authentication and get access to the application.\r\n\r\nThis CVE entry describes the incomplete fix for CVE-2023-25957 in a specific non default configuration." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30795.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30795.json new file mode 100644 index 00000000000..d6ecfe3ff14 --- /dev/null +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30795.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-30795", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:15.067", + "lastModified": "2023-08-08T10:15:15.067", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in JT Open (All versions < V11.4), JT Utilities (All versions < V13.4), Parasolid V34.0 (All versions < V34.0.253), Parasolid V34.1 (All versions < V34.1.243), Parasolid V35.0 (All versions < V35.0.177), Parasolid V35.1 (All versions < V35.1.073). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-001569.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30796.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30796.json new file mode 100644 index 00000000000..dce6c6cfd68 --- /dev/null +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30796.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-30796", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:15.153", + "lastModified": "2023-08-08T10:15:15.153", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in JT Open (All versions < V11.4), JT Utilities (All versions < V13.4). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-001569.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30985.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30985.json index 450052d11b0..7907d2a4b20 100644 --- a/CVE-2023/CVE-2023-309xx/CVE-2023-30985.json +++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30985.json @@ -2,12 +2,12 @@ "id": "CVE-2023-30985", "sourceIdentifier": "productcert@siemens.com", "published": "2023-05-09T13:15:18.267", - "lastModified": "2023-05-17T18:38:56.983", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-08T10:15:15.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Solid Edge SE2023 (All versions < VX.223.0 Update 3), Solid Edge SE2023 (All versions < VX.223.0 Update 2). Affected applications contain an out of bounds read past the end of an allocated buffer while parsing a specially crafted OBJ file. This vulnerability could allow an attacker to disclose sensitive information. (ZDI-CAN-19426)" + "value": "A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 3), Solid Edge SE2023 (All versions < V223.0 Update 2). Affected applications contain an out of bounds read past the end of an allocated buffer while parsing a specially crafted OBJ file. This vulnerability could allow an attacker to disclose sensitive information. (ZDI-CAN-19426)" } ], "metrics": { @@ -57,7 +57,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30986.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30986.json index 341fb4d8b38..a08d5d183d5 100644 --- a/CVE-2023/CVE-2023-309xx/CVE-2023-30986.json +++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30986.json @@ -2,19 +2,19 @@ "id": "CVE-2023-30986", "sourceIdentifier": "productcert@siemens.com", "published": "2023-05-09T13:15:18.350", - "lastModified": "2023-05-17T18:37:02.453", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-08T10:15:15.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Solid Edge SE2023 (All versions < VX.223.0 Update 3), Solid Edge SE2023 (All versions < VX.223.0 Update 2). Affected applications contain a memory corruption vulnerability while parsing specially crafted STP files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19561)" + "value": "A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 3), Solid Edge SE2023 (All versions < V223.0 Update 2). Affected applications contain a memory corruption vulnerability while parsing specially crafted STP files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19561)" } ], "metrics": { "cvssMetricV31": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32503.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32503.json new file mode 100644 index 00000000000..03a749eb144 --- /dev/null +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32503.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32503", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-08-08T11:15:11.173", + "lastModified": "2023-08-08T11:15:11.173", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in GTmetrix GTmetrix for WordPress plugin <=\u00a00.4.6 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/gtmetrix-for-wordpress/wordpress-gtmetrix-for-wordpress-plugin-0-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36692.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36692.json new file mode 100644 index 00000000000..47c1e126623 --- /dev/null +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36692.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-36692", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-08-08T11:15:11.427", + "lastModified": "2023-08-08T11:15:11.427", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Christian Kramer & Hendrik Thole WP-Cirrus plugin <=\u00a00.6.11 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-cirrus/wordpress-wp-cirrus-plugin-0-6-11-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37372.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37372.json new file mode 100644 index 00000000000..63ad89af764 --- /dev/null +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37372.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-37372", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:15.440", + "lastModified": "2023-08-08T10:15:15.440", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in RUGGEDCOM CROSSBOW (All versions < V5.4). The affected applications is vulnerable to SQL injection. This could allow an unauthenticated remote attackers to execute arbitrary SQL queries on the server database." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-472630.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37373.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37373.json new file mode 100644 index 00000000000..22168e91915 --- /dev/null +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37373.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-37373", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:15.520", + "lastModified": "2023-08-08T10:15:15.520", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in RUGGEDCOM CROSSBOW (All versions < V5.4). The affected applications accept unauthenticated file write messages. An unauthenticated remote attacker could write arbitrary files to the affected application's file system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-472630.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3717.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3717.json new file mode 100644 index 00000000000..72d643b7642 --- /dev/null +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3717.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-3717", + "sourceIdentifier": "cve@usom.gov.tr", + "published": "2023-08-08T11:15:11.763", + "lastModified": "2023-08-08T11:15:11.763", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Farmakom Remote Administration Console allows SQL Injection.This issue affects Remote Administration Console: before 1.02.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-23-0441", + "source": "cve@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38524.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38524.json new file mode 100644 index 00000000000..7fe5680fd7d --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38524.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38524", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:15.627", + "lastModified": "2023-08-08T10:15:15.627", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.171), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions). The affected applications contain null pointer dereference while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38525.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38525.json new file mode 100644 index 00000000000..8abc99c6cb6 --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38525.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38525", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:15.723", + "lastModified": "2023-08-08T10:15:15.723", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.171), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38526.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38526.json new file mode 100644 index 00000000000..5d4a54ab832 --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38526.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38526", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:15.817", + "lastModified": "2023-08-08T10:15:15.817", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.171), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38527.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38527.json new file mode 100644 index 00000000000..20030685e1a --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38527.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38527", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:15.923", + "lastModified": "2023-08-08T10:15:15.923", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38528.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38528.json new file mode 100644 index 00000000000..f3c35efecc3 --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38528.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38528", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:16.023", + "lastModified": "2023-08-08T10:15:16.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.197), Parasolid V35.1 (All versions < V35.1.184), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted X_T file. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38529.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38529.json new file mode 100644 index 00000000000..3fc21502aaf --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38529.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38529", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:16.127", + "lastModified": "2023-08-08T10:15:16.127", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.184), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38530.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38530.json new file mode 100644 index 00000000000..c3ae3a81fcd --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38530.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38530", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:16.220", + "lastModified": "2023-08-08T10:15:16.220", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.171), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38531.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38531.json new file mode 100644 index 00000000000..49777fa21a7 --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38531.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38531", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:16.317", + "lastModified": "2023-08-08T10:15:16.317", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.184), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38532.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38532.json new file mode 100644 index 00000000000..8c67834d879 --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38532.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38532", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:16.403", + "lastModified": "2023-08-08T10:15:16.403", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.171), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions). The affected application contains a stack exhaustion vulnerability while parsing a specially crafted X_T file. This could allow an attacker to cause denial of service condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38641.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38641.json new file mode 100644 index 00000000000..fcbd86d1f25 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38641.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38641", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:16.493", + "lastModified": "2023-08-08T10:15:16.493", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in SICAM TOOLBOX II (All versions < V07.10). The affected application's database service is executed as `NT AUTHORITY\\SYSTEM`.\r\nThis could allow a local attacker to execute operating system commands with elevated privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-975961.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38679.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38679.json new file mode 100644 index 00000000000..25186684e70 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38679.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38679", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:16.583", + "lastModified": "2023-08-08T10:15:16.583", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0002). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21106)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-764801.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38680.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38680.json new file mode 100644 index 00000000000..00f034f2952 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38680.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38680", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:16.677", + "lastModified": "2023-08-08T10:15:16.677", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0002). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21132)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-764801.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38681.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38681.json new file mode 100644 index 00000000000..ce65187d879 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38681.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38681", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:16.783", + "lastModified": "2023-08-08T10:15:16.783", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0002). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted IGS file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21270)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-764801.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38682.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38682.json new file mode 100644 index 00000000000..3a10c38d24c --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38682.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38682", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:16.887", + "lastModified": "2023-08-08T10:15:16.887", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in JT2Go (All versions < V14.2.0.5), Teamcenter Visualization V13.2 (All versions < V13.2.0.14), Teamcenter Visualization V14.1 (All versions < V14.1.0.10), Teamcenter Visualization V14.2 (All versions < V14.2.0.5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted TIFF files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-131450.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38683.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38683.json new file mode 100644 index 00000000000..93bca1ea649 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38683.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38683", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:16.983", + "lastModified": "2023-08-08T10:15:16.983", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in JT2Go (All versions < V14.2.0.5), Teamcenter Visualization V13.2 (All versions < V13.2.0.14), Teamcenter Visualization V14.1 (All versions < V14.1.0.10), Teamcenter Visualization V14.2 (All versions < V14.2.0.5). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted TIFF file. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-131450.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39181.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39181.json new file mode 100644 index 00000000000..9b5db83b963 --- /dev/null +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39181.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39181", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:17.080", + "lastModified": "2023-08-08T10:15:17.080", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39182.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39182.json new file mode 100644 index 00000000000..45f8ab1e5d2 --- /dev/null +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39182.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39182", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:17.223", + "lastModified": "2023-08-08T10:15:17.223", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted DFT files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39183.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39183.json new file mode 100644 index 00000000000..1c2769c1d94 --- /dev/null +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39183.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39183", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:17.320", + "lastModified": "2023-08-08T10:15:17.320", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PSM files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39184.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39184.json new file mode 100644 index 00000000000..4ac51264e3e --- /dev/null +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39184.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39184", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:17.423", + "lastModified": "2023-08-08T10:15:17.423", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PSM files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39185.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39185.json new file mode 100644 index 00000000000..78031ad1c83 --- /dev/null +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39185.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39185", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:18.320", + "lastModified": "2023-08-08T10:15:18.320", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39186.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39186.json new file mode 100644 index 00000000000..1cce2d3b0a8 --- /dev/null +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39186.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39186", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:19.023", + "lastModified": "2023-08-08T10:15:19.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted DFT files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39187.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39187.json new file mode 100644 index 00000000000..dabe66860bb --- /dev/null +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39187.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39187", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:19.933", + "lastModified": "2023-08-08T10:15:19.933", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted DFT files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39188.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39188.json new file mode 100644 index 00000000000..928312917ae --- /dev/null +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39188.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39188", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:20.910", + "lastModified": "2023-08-08T10:15:20.910", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted DFT files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39269.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39269.json new file mode 100644 index 00000000000..6e61baa6477 --- /dev/null +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39269.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39269", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:21.967", + "lastModified": "2023-08-08T10:15:21.967", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400F, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416F, RUGGEDCOM RS416NC, RUGGEDCOM RS416NC v2, RUGGEDCOM RS416P, RUGGEDCOM RS416PF, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNC v2, RUGGEDCOM RS416Pv2, RUGGEDCOM RS416v2, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900F, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GF, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPF, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GF, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100F, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PF, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200F, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300F, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PF, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488F, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. The web server of the affected devices contains a vulnerability that may lead to a denial of service condition.\r\nAn attacker may cause total loss of availability of the web server, which might recover after the attack is over." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-770902.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39419.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39419.json new file mode 100644 index 00000000000..81477b62b0e --- /dev/null +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39419.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39419", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:22.077", + "lastModified": "2023-08-08T10:15:22.077", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected applications contain an out of bounds write past the end of an allocated structure while parsing specially crafted DFT files. This could allow an attacker to execute code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39549.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39549.json new file mode 100644 index 00000000000..b9210ad22ae --- /dev/null +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39549.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39549", + "sourceIdentifier": "productcert@siemens.com", + "published": "2023-08-08T10:15:22.167", + "lastModified": "2023-08-08T10:15:22.167", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 2). The affected application contains a use-after-free vulnerability that could be triggered while parsing specially crafted DWG file. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-19562)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-932528.pdf", + "source": "productcert@siemens.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4202.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4202.json new file mode 100644 index 00000000000..17c0d17ee05 --- /dev/null +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4202.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-4202", + "sourceIdentifier": "office@cyberdanube.com", + "published": "2023-08-08T11:15:11.980", + "lastModified": "2023-08-08T11:15:11.980", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stored Cross-Site Scripting vulnerability, which can be triggered by authenticated users in the device name field of the web-interface.\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://cyberdanube.com/en/en-st-polten-uas-multiple-vulnerabilities-in-advantech-eki-15xx-series/", + "source": "office@cyberdanube.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4203.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4203.json new file mode 100644 index 00000000000..dbfeaa9e983 --- /dev/null +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4203.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-4203", + "sourceIdentifier": "office@cyberdanube.com", + "published": "2023-08-08T11:15:12.143", + "lastModified": "2023-08-08T11:15:12.143", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stored Cross-Site Scripting vulnerability, which can be triggered by authenticated users in the ping tool of the web-interface.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://cyberdanube.com/en/en-st-polten-uas-multiple-vulnerabilities-in-advantech-eki-15xx-series/", + "source": "office@cyberdanube.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ce5c27f0a05..357b9bad7f9 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-08T10:00:25.007885+00:00 +2023-08-08T12:00:28.939630+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-08T09:15:11.023000+00:00 +2023-08-08T11:45:03.967000+00:00 ``` ### Last Data Feed Release @@ -29,24 +29,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -221884 +221947 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `63` -* [CVE-2023-37569](CVE-2023/CVE-2023-375xx/CVE-2023-37569.json) (`2023-08-08T09:15:10.620`) -* [CVE-2023-37570](CVE-2023/CVE-2023-375xx/CVE-2023-37570.json) (`2023-08-08T09:15:10.783`) -* [CVE-2023-3898](CVE-2023/CVE-2023-38xx/CVE-2023-3898.json) (`2023-08-08T09:15:10.880`) -* [CVE-2023-4009](CVE-2023/CVE-2023-40xx/CVE-2023-4009.json) (`2023-08-08T09:15:11.023`) +* [CVE-2023-38680](CVE-2023/CVE-2023-386xx/CVE-2023-38680.json) (`2023-08-08T10:15:16.677`) +* [CVE-2023-38681](CVE-2023/CVE-2023-386xx/CVE-2023-38681.json) (`2023-08-08T10:15:16.783`) +* [CVE-2023-38682](CVE-2023/CVE-2023-386xx/CVE-2023-38682.json) (`2023-08-08T10:15:16.887`) +* [CVE-2023-38683](CVE-2023/CVE-2023-386xx/CVE-2023-38683.json) (`2023-08-08T10:15:16.983`) +* [CVE-2023-39181](CVE-2023/CVE-2023-391xx/CVE-2023-39181.json) (`2023-08-08T10:15:17.080`) +* [CVE-2023-39182](CVE-2023/CVE-2023-391xx/CVE-2023-39182.json) (`2023-08-08T10:15:17.223`) +* [CVE-2023-39183](CVE-2023/CVE-2023-391xx/CVE-2023-39183.json) (`2023-08-08T10:15:17.320`) +* [CVE-2023-39184](CVE-2023/CVE-2023-391xx/CVE-2023-39184.json) (`2023-08-08T10:15:17.423`) +* [CVE-2023-39185](CVE-2023/CVE-2023-391xx/CVE-2023-39185.json) (`2023-08-08T10:15:18.320`) +* [CVE-2023-39186](CVE-2023/CVE-2023-391xx/CVE-2023-39186.json) (`2023-08-08T10:15:19.023`) +* [CVE-2023-39187](CVE-2023/CVE-2023-391xx/CVE-2023-39187.json) (`2023-08-08T10:15:19.933`) +* [CVE-2023-39188](CVE-2023/CVE-2023-391xx/CVE-2023-39188.json) (`2023-08-08T10:15:20.910`) +* [CVE-2023-39269](CVE-2023/CVE-2023-392xx/CVE-2023-39269.json) (`2023-08-08T10:15:21.967`) +* [CVE-2023-39419](CVE-2023/CVE-2023-394xx/CVE-2023-39419.json) (`2023-08-08T10:15:22.077`) +* [CVE-2023-39549](CVE-2023/CVE-2023-395xx/CVE-2023-39549.json) (`2023-08-08T10:15:22.167`) +* [CVE-2023-27412](CVE-2023/CVE-2023-274xx/CVE-2023-27412.json) (`2023-08-08T11:15:09.953`) +* [CVE-2023-27416](CVE-2023/CVE-2023-274xx/CVE-2023-27416.json) (`2023-08-08T11:15:10.287`) +* [CVE-2023-27421](CVE-2023/CVE-2023-274xx/CVE-2023-27421.json) (`2023-08-08T11:15:10.520`) +* [CVE-2023-27422](CVE-2023/CVE-2023-274xx/CVE-2023-27422.json) (`2023-08-08T11:15:10.737`) +* [CVE-2023-29099](CVE-2023/CVE-2023-290xx/CVE-2023-29099.json) (`2023-08-08T11:15:10.900`) +* [CVE-2023-32503](CVE-2023/CVE-2023-325xx/CVE-2023-32503.json) (`2023-08-08T11:15:11.173`) +* [CVE-2023-36692](CVE-2023/CVE-2023-366xx/CVE-2023-36692.json) (`2023-08-08T11:15:11.427`) +* [CVE-2023-3717](CVE-2023/CVE-2023-37xx/CVE-2023-3717.json) (`2023-08-08T11:15:11.763`) +* [CVE-2023-4202](CVE-2023/CVE-2023-42xx/CVE-2023-4202.json) (`2023-08-08T11:15:11.980`) +* [CVE-2023-4203](CVE-2023/CVE-2023-42xx/CVE-2023-4203.json) (`2023-08-08T11:15:12.143`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `14` -* [CVE-2023-2329](CVE-2023/CVE-2023-23xx/CVE-2023-2329.json) (`2023-08-08T09:15:09.873`) +* [CVE-2020-15795](CVE-2020/CVE-2020-157xx/CVE-2020-15795.json) (`2023-08-08T10:15:11.090`) +* [CVE-2020-27009](CVE-2020/CVE-2020-270xx/CVE-2020-27009.json) (`2023-08-08T10:15:11.637`) +* [CVE-2020-27736](CVE-2020/CVE-2020-277xx/CVE-2020-27736.json) (`2023-08-08T10:15:11.780`) +* [CVE-2020-27737](CVE-2020/CVE-2020-277xx/CVE-2020-27737.json) (`2023-08-08T10:15:11.927`) +* [CVE-2020-27738](CVE-2020/CVE-2020-277xx/CVE-2020-27738.json) (`2023-08-08T10:15:12.050`) +* [CVE-2020-28388](CVE-2020/CVE-2020-283xx/CVE-2020-28388.json) (`2023-08-08T10:15:12.203`) +* [CVE-2021-25677](CVE-2021/CVE-2021-256xx/CVE-2021-25677.json) (`2023-08-08T10:15:12.367`) +* [CVE-2022-45937](CVE-2022/CVE-2022-459xx/CVE-2022-45937.json) (`2023-08-08T10:15:12.850`) +* [CVE-2023-25957](CVE-2023/CVE-2023-259xx/CVE-2023-25957.json) (`2023-08-08T10:15:14.060`) +* [CVE-2023-29129](CVE-2023/CVE-2023-291xx/CVE-2023-29129.json) (`2023-08-08T10:15:14.957`) +* [CVE-2023-30985](CVE-2023/CVE-2023-309xx/CVE-2023-30985.json) (`2023-08-08T10:15:15.240`) +* [CVE-2023-30986](CVE-2023/CVE-2023-309xx/CVE-2023-30986.json) (`2023-08-08T10:15:15.343`) +* [CVE-2023-1207](CVE-2023/CVE-2023-12xx/CVE-2023-1207.json) (`2023-08-08T11:45:03.967`) +* [CVE-2023-1208](CVE-2023/CVE-2023-12xx/CVE-2023-1208.json) (`2023-08-08T11:45:03.967`) ## Download and Usage