Auto-Update: 2024-01-17T19:00:25.032103+00:00

This commit is contained in:
cad-safe-bot 2024-01-17 19:00:28 +00:00
parent 5c2aba0a07
commit edf3598f87
74 changed files with 4120 additions and 582 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-32919",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:47.173",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:23:36.687",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,88 @@
"value": "El problema se solucion\u00f3 mejorando el manejo de la interfaz de usuario. Este problema se solucion\u00f3 en iOS 16.2 y iPadOS 16.2, macOS Ventura 13.1. Visitar un sitio web que enmarque contenido malicioso puede provocar una suplantaci\u00f3n de la interfaz de usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1021"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.2",
"matchCriteriaId": "89495791-675B-413C-A86D-ECBADF4EDC4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.2",
"matchCriteriaId": "6B1B6657-43F5-4F0E-BE5C-5D828DEE066F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.1",
"matchCriteriaId": "D7457023-5C4E-4935-826D-A411B0324092"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213530",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213532",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-32931",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:47.240",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:10:19.543",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,68 @@
"value": "Este problema se solucion\u00f3 mejorando la protecci\u00f3n de datos. Este problema se solucion\u00f3 en macOS Ventura 13. Una aplicaci\u00f3n con privilegios de root puede acceder a informaci\u00f3n privada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.0",
"matchCriteriaId": "71E032AD-F827-4944-9699-BB1E6D4233FC"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213488",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-36418",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-17T16:15:45.817",
"lastModified": "2024-01-17T16:15:45.817",
"vulnStatus": "Received",
"lastModified": "2024-01-17T17:35:08.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-38141",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-17T16:15:46.033",
"lastModified": "2024-01-17T16:15:46.033",
"vulnStatus": "Received",
"lastModified": "2024-01-17T17:35:08.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-40203",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-17T16:15:46.230",
"lastModified": "2024-01-17T16:15:46.230",
"vulnStatus": "Received",
"lastModified": "2024-01-17T17:35:08.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-40702",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-17T17:15:09.120",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Zorem Advanced Local Pickup for WooCommerce.This issue affects Advanced Local Pickup for WooCommerce: from n/a through 1.5.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/advanced-local-pickup-for-woocommerce/wordpress-advanced-local-pickup-for-woocommerce-plugin-1-5-2-broken-access-control?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-41619",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-17T17:15:09.333",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in SedLex Image Zoom.This issue affects Image Zoom: from n/a through 1.8.8.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/image-zoom/wordpress-image-zoom-plugin-1-8-8-multiple-broken-access-control-vulnerabilities?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-41695",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-17T17:15:09.550",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in SedLex Traffic Manager.This issue affects Traffic Manager: from n/a through 1.4.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/traffic-manager/wordpress-traffic-manager-plugin-1-4-5-multiple-vulnerabilities?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-41786",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-17T18:15:45.000",
"lastModified": "2024-01-17T18:15:45.000",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in WP Job Portal WP Job Portal \u2013 A Complete Job Board.This issue affects WP Job Portal \u2013 A Complete Job Board: from n/a through 2.0.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-job-portal/wordpress-wp-job-portal-plugin-1-1-9-unauthorized-plugin-settings-change-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-41790",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-17T18:15:45.207",
"lastModified": "2024-01-17T18:15:45.207",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in CodePeople WP Time Slots Booking Form.This issue affects WP Time Slots Booking Form: from n/a through 1.1.76.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-time-slots-booking-form/wordpress-wp-time-slots-booking-form-plugin-1-1-76-missing-authorization-leading-to-feedback-submission-vulnerability",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-41990",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-17T17:15:09.757",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Vinoj Cardoza 3D Tag Cloud allows Stored XSS.This issue affects 3D Tag Cloud: from n/a through 3.8.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cardoza-3d-tag-cloud/wordpress-3d-tag-cloud-plugin-3-8-stored-cross-site-scripting-xss-via-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42816",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:47.290",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:09:58.430",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,68 @@
"value": "Se abord\u00f3 una cuesti\u00f3n de l\u00f3gica con una mejor gesti\u00f3n estatal. Este problema se solucion\u00f3 en macOS Ventura 13. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.0",
"matchCriteriaId": "71E032AD-F827-4944-9699-BB1E6D4233FC"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213488",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42839",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:47.330",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:09:35.847",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,88 @@
"value": "Este problema se solucion\u00f3 mejorando la redacci\u00f3n de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en iOS 16.2 y iPadOS 16.2, macOS Ventura 13.1. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial de ubicaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.2",
"matchCriteriaId": "89495791-675B-413C-A86D-ECBADF4EDC4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.2",
"matchCriteriaId": "6B1B6657-43F5-4F0E-BE5C-5D828DEE066F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.1",
"matchCriteriaId": "D7457023-5C4E-4935-826D-A411B0324092"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213530",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213532",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46710",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:47.380",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T17:50:45.993",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,88 @@
"value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en iOS 16.2 y iPadOS 16.2, macOS Ventura 13.1. Los datos de Location se pueden compartir a trav\u00e9s de enlaces de iCloud incluso si los metadatos de Location est\u00e1n deshabilitados a trav\u00e9s de Share Sheet."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.2",
"matchCriteriaId": "89495791-675B-413C-A86D-ECBADF4EDC4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.2",
"matchCriteriaId": "6B1B6657-43F5-4F0E-BE5C-5D828DEE066F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.1",
"matchCriteriaId": "D7457023-5C4E-4935-826D-A411B0324092"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213530",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213532",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46721",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:47.430",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T17:40:40.553",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,68 @@
"value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Ventura 13. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario con privilegios del kernel."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.0",
"matchCriteriaId": "71E032AD-F827-4944-9699-BB1E6D4233FC"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213488",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47915",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:47.473",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T17:42:27.767",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,68 @@
"value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Ventura 13. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario con privilegios del kernel."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.0",
"matchCriteriaId": "71E032AD-F827-4944-9699-BB1E6D4233FC"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213488",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47965",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:47.523",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T17:51:14.667",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,68 @@
"value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Ventura 13. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario con privilegios del kernel."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.0",
"matchCriteriaId": "71E032AD-F827-4944-9699-BB1E6D4233FC"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213488",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48504",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:47.563",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T17:53:36.217",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,68 @@
"value": "El problema se solucion\u00f3 mejorando el manejo de los cach\u00e9s. Este problema se solucion\u00f3 en macOS Ventura 13. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.0",
"matchCriteriaId": "71E032AD-F827-4944-9699-BB1E6D4233FC"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213488",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48577",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:47.610",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T17:59:46.343",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,68 @@
"value": "Se solucion\u00f3 un problema de acceso mejorando las restricciones de acceso. Este problema se solucion\u00f3 en macOS Ventura 13. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.0",
"matchCriteriaId": "71E032AD-F827-4944-9699-BB1E6D4233FC"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213488",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-20257",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-01-17T17:15:09.960",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct cross-site scripting attacks. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by submitting malicious input containing script or HTML content within requests that would stored within the application interface. A successful exploit could allow the attacker to conduct cross-site scripting attacks against other users of the affected application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-20258",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-01-17T17:15:10.147",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. This vulnerability is due to improper processing of serialized Java objects by the affected application. An attacker could exploit this vulnerability by uploading a document containing malicious serialized Java objects to be processed by the affected application. A successful exploit could allow the attacker to cause the application to execute arbitrary commands."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-20260",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-01-17T17:15:10.323",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the application CLI of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper processing of command line arguments to application scripts. An attacker could exploit this vulnerability by issuing a command on the CLI with malicious options. A successful exploit could allow the attacker to gain the escalated privileges of the root user on the underlying operating system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-20271",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-01-17T17:15:10.540",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain and modify sensitive information that is stored in the underlying database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23882",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-17T17:15:10.720",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Brainstorm Force Ultimate Addons for Beaver Builder \u2013 Lite.This issue affects Ultimate Addons for Beaver Builder \u2013 Lite: from n/a through 1.5.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ultimate-addons-for-beaver-builder-lite/wordpress-ultimate-addons-for-beaver-builder-lite-plugin-1-5-5-broken-access-control-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23896",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-17T17:15:10.913",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in MyThemeShop URL Shortener by MyThemeShop.This issue affects URL Shortener by MyThemeShop: from n/a through 1.0.17.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mts-url-shortener/wordpress-url-shortener-by-mythemeshop-plugin-1-0-16-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34379",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-17T16:15:46.427",
"lastModified": "2024-01-17T16:15:46.427",
"vulnStatus": "Received",
"lastModified": "2024-01-17T17:35:08.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38607",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:48.310",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:08:51.370",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,68 @@
"value": "El problema se solucion\u00f3 mejorando el manejo de los cach\u00e9s. Este problema se solucion\u00f3 en macOS Sonoma 14. Es posible que una aplicaci\u00f3n pueda modificar la configuraci\u00f3n de la impresora."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.0",
"matchCriteriaId": "7A5DD3D5-FB4F-4313-B873-DCED87FC4605"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213940",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40393",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:48.550",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:30:39.897",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,68 @@
"value": "Se solucion\u00f3 un problema de autenticaci\u00f3n con una gesti\u00f3n de estado mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14. Las fotos de Hidden Photos Album se pueden ver sin autenticaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.0",
"matchCriteriaId": "7A5DD3D5-FB4F-4313-B873-DCED87FC4605"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213940",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40433",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:48.787",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:52:03.727",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,68 @@
"value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en macOS Ventura 13.3. Una aplicaci\u00f3n puede omitir las comprobaciones de Gatekeeper."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.3",
"matchCriteriaId": "F58DAF22-8807-445A-AD05-8510829526CB"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-41056",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-01-10T16:15:46.557",
"lastModified": "2024-01-10T16:59:53.407",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T17:34:53.767",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4."
},
{
"lang": "es",
"value": "Redis es una base de datos en memoria que persiste en el disco. Redis maneja incorrectamente el cambio de tama\u00f1o de los b\u00faferes de memoria, lo que puede provocar un desbordamiento de enteros que provoca un desbordamiento del mont\u00f3n y una posible ejecuci\u00f3n remota de c\u00f3digo. Este problema se solucion\u00f3 en las versiones 7.0.15 y 7.2.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -50,18 +74,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.9",
"versionEndExcluding": "7.0.15",
"matchCriteriaId": "205F5134-0355-48E0-B2F4-7E14179654D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.4",
"matchCriteriaId": "FE0E44DA-5BAD-4EB8-82D8-93BB2D7D9CDE"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/redis/redis/releases/tag/7.0.15",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/redis/redis/releases/tag/7.2.4",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/redis/redis/security/advisories/GHSA-xr47-pcmx-fq2m",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42865",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:50.093",
"lastModified": "2024-01-11T13:57:26.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:13:22.973",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,23 +14,116 @@
"value": "Se solucion\u00f3 una lectura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.3, tvOS 16.4, iOS 16.4 y iPadOS 16.4, watchOS 9.4. El procesamiento de una imagen puede resultar en la divulgaci\u00f3n de la memoria del proceso."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.4",
"matchCriteriaId": "EE68C5EC-5829-481D-BFF7-0A501018A3CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.4",
"matchCriteriaId": "F02C0CA5-8ABA-48C7-BCAE-5CF25435DF87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.3",
"matchCriteriaId": "F58DAF22-8807-445A-AD05-8510829526CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.4",
"matchCriteriaId": "B55C90FB-21A2-4066-9FFD-04ABA57E68F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.4",
"matchCriteriaId": "B5DA93B3-CA76-4932-84EE-40445A6505EA"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213674",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213678",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42869",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-10T22:15:50.200",
"lastModified": "2024-01-11T13:57:26.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:19:52.457",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,88 @@
"value": "Se abordaron m\u00faltiples problemas de corrupci\u00f3n de memoria con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.4, iOS 16.5 y iPadOS 16.5. M\u00faltiples problemas en libxml2."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.5",
"matchCriteriaId": "A4021D9E-B688-4FBC-B43A-D3C28FD38E67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.5",
"matchCriteriaId": "CFA59B02-43A5-4865-8560-AA32D69E5C5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.4",
"matchCriteriaId": "ADD1755A-5CD2-4EED-8C6C-4729FADFA3F5"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213757",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213758",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46712",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-01-10T18:15:46.223",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:25:21.613",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -50,10 +70,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.6",
"matchCriteriaId": "A94FF899-FAEF-4005-9B23-1F44A949AEEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndIncluding": "7.2.1",
"matchCriteriaId": "EFB80359-3F7B-41FC-87EC-3EAF9A46642A"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-395",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48783",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-01-10T18:15:46.807",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:24:38.617",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -50,10 +70,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.3.0",
"versionEndIncluding": "5.3.8",
"matchCriteriaId": "44C143C2-D850-4768-94D0-55615D670A47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndIncluding": "6.0.14",
"matchCriteriaId": "EBA19A35-E732-4B07-BE90-4B93B914D857"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.7",
"matchCriteriaId": "281311DE-FCED-4AB9-8D54-EBD0C8FE53B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.2",
"matchCriteriaId": "CF4332EA-0FED-44AB-A395-E3D62B365012"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-408",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-50950",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-01-17T17:15:11.143",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM QRadar SIEM 7.5 could disclose sensitive email information in responses from offense rules. IBM X-Force ID: 275709."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275709",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7108657",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5006",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-17T15:15:10.803",
"lastModified": "2024-01-17T15:15:10.803",
"vulnStatus": "Received",
"lastModified": "2024-01-17T17:35:08.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5041",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-17T15:15:10.850",
"lastModified": "2024-01-17T15:15:10.850",
"vulnStatus": "Received",
"lastModified": "2024-01-17T17:35:08.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51123",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-10T22:15:50.823",
"lastModified": "2024-01-11T13:57:26.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:23:36.637",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,79 @@
"value": "Un problema descubierto en D-Link dir815 v.1.01SSb08.bin permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud POST manipulada al par\u00e1metro service en la funci\u00f3n SOAPCGI_main del componente binario cgibin."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dir-815_firmware:1.01ssb08.bin:*:*:*:*:*:*:*",
"matchCriteriaId": "F1F21B82-9750-4DCB-BD12-B67DB5E09AA6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dir-815:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50618B63-304B-4A61-AA50-5154E8690E88"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/WhereisRain/dir-815",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52028",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-11T09:15:47.300",
"lastModified": "2024-01-11T13:57:26.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:26:49.623",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,79 @@
"value": "Se descubri\u00f3 que TOTOlink A3700R v9.1.2u.5822_B20200513 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n setTracerouteCfg."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.5822_b20200513:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F5D7B3-9362-4A1F-A53C-8B7DA8CAFAA0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a3700r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05777EB4-0963-4317-AB0B-287A2140915D"
}
]
}
]
}
],
"references": [
{
"url": "https://815yang.github.io/2023/12/04/a3700r/TOTOlink%20A3700R_setTracerouteCfg/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52029",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-11T09:15:47.350",
"lastModified": "2024-01-11T13:57:26.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:26:18.677",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,79 @@
"value": "Se descubri\u00f3 que TOTOlink A3700R v9.1.2u.5822_B20200513 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n setDiagnosisCfg."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.5822_b20200513:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F5D7B3-9362-4A1F-A53C-8B7DA8CAFAA0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a3700r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05777EB4-0963-4317-AB0B-287A2140915D"
}
]
}
]
}
],
"references": [
{
"url": "https://815yang.github.io/2023/12/04/a3700r/TOTOlink%20A3700R%28setDiagnosisCfg%29/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52030",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-11T09:15:47.393",
"lastModified": "2024-01-11T13:57:26.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:25:43.917",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,79 @@
"value": "Se descubri\u00f3 que TOTOlink A3700R v9.1.2u.5822_B20200513 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n setOpModeCfg."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.5822_b20200513:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F5D7B3-9362-4A1F-A53C-8B7DA8CAFAA0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a3700r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05777EB4-0963-4317-AB0B-287A2140915D"
}
]
}
]
}
],
"references": [
{
"url": "https://815yang.github.io/2023/12/04/a3700r/TOTOlink%20A3700R%28setOpModeCfg%29/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52031",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-11T09:15:47.437",
"lastModified": "2024-01-11T13:57:26.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:24:45.007",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,79 @@
"value": "Se descubri\u00f3 que TOTOlink A3700R v9.1.2u.5822_B20200513 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n UploadFirmwareFile."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.5822_b20200513:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F5D7B3-9362-4A1F-A53C-8B7DA8CAFAA0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:a3700r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05777EB4-0963-4317-AB0B-287A2140915D"
}
]
}
]
}
],
"references": [
{
"url": "https://815yang.github.io/2023/12/04/a3700r/TOTOlink%20A3700R_UploadFirmwareFile/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52032",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-11T09:15:47.483",
"lastModified": "2024-01-11T13:57:26.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:10:27.367",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,79 @@
"value": "Se descubri\u00f3 que TOTOlink EX1200T V4.1.2cu.5232_B20210713 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n \"principal\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:ex1200t_firmware:4.1.2cu.5232_b20210713:*:*:*:*:*:*:*",
"matchCriteriaId": "1DD36F94-8646-4794-8878-6F4BF1BF1153"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:ex1200t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F262644E-2558-423E-A19E-7C86A1756FBF"
}
]
}
]
}
],
"references": [
{
"url": "https://815yang.github.io/2023/12/24/cve6/EX1200T_V4.1.2cu.5232_B20210713_downloadFlile/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5347",
"sourceIdentifier": "office@cyberdanube.com",
"published": "2024-01-09T10:15:22.523",
"lastModified": "2024-01-17T15:05:39.563",
"lastModified": "2024-01-17T17:50:09.620",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -90,8 +90,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet5310g_firmware:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EE9A221B-49BE-4B94-A4BA-3837ACD2A38B"
"criteria": "cpe:2.3:o:korenix:jetnet_5310g_firmware:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A95682DF-7942-49DA-9F81-EF1807045409"
}
]
},
@ -117,8 +117,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2187DB56-9032-499E-AFEB-71D803C9958F"
"criteria": "cpe:2.3:o:korenix:jetnet_4508_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E7F0FE3A-6460-46FD-BDC0-40BF2705637D"
}
]
},
@ -128,8 +128,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7176A484-A088-4C18-9672-1D97432B17DB"
"criteria": "cpe:2.3:h:korenix:jetnet_4508:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99147D57-7780-4234-B55D-CC9AFBA481C9"
}
]
}
@ -144,8 +144,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508i-w_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FE9137AD-E8FE-4993-A66E-631F5D7072EB"
"criteria": "cpe:2.3:o:korenix:jetnet_4508i-w_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "96C77E80-72C3-4662-A9CE-7C8CC126F1B6"
}
]
},
@ -155,8 +155,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508i-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "965C9456-043B-4565-84A3-536FA6558F0C"
"criteria": "cpe:2.3:h:korenix:jetnet_4508i-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8898260C-6D31-41BA-A2F2-A8975B5C7DEF"
}
]
}
@ -171,8 +171,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508-w_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "505A7DD4-7392-467C-9EA3-6083CB223194"
"criteria": "cpe:2.3:o:korenix:jetnet_4508-w_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E017D04-2392-483C-AC36-8AF8F061720B"
}
]
},
@ -182,8 +182,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A55997F3-A155-423C-90EC-46E462482D80"
"criteria": "cpe:2.3:h:korenix:jetnet_4508-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAC01082-D54E-4E35-A68C-3CF5A54F2816"
}
]
}
@ -198,8 +198,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508if-s_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E6B5C74-4FE8-45DD-9D45-E225E39CDCE6"
"criteria": "cpe:2.3:o:korenix:jetnet_4508if-s_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7461886A-A4D4-4193-8366-5DBB3A78A355"
}
]
},
@ -209,8 +209,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508if-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED235ED-4CEE-47C2-95AF-06017EE84C7B"
"criteria": "cpe:2.3:h:korenix:jetnet_4508if-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DAE70B6-7384-4909-8A07-3F786A51EF6B"
}
]
}
@ -225,8 +225,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508if-m_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8C4BCE96-6A23-4573-BD05-0D66DE2FDAB2"
"criteria": "cpe:2.3:o:korenix:jetnet_4508if-m_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "01E97B8A-ABBB-4EE6-9F56-4766FAAA6CBD"
}
]
},
@ -236,8 +236,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508if-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98B225C9-995D-41BC-A242-40F9072DA173"
"criteria": "cpe:2.3:h:korenix:jetnet_4508if-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "044D5792-E5CE-4235-9148-C984AC0F1F6B"
}
]
}
@ -252,8 +252,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508if-sw_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "220A9305-2789-4ADE-A4A6-94322A93FBE1"
"criteria": "cpe:2.3:o:korenix:jetnet_4508if-sw_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E5AC4C-E6E6-45A0-9E27-54ABC3D224F5"
}
]
},
@ -263,8 +263,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508if-sw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BFE1BAC-2520-4356-AD31-4D3DEDB7214C"
"criteria": "cpe:2.3:h:korenix:jetnet_4508if-sw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EB3742F-CC0B-49E5-B29C-EF4E7D9A7D28"
}
]
}
@ -279,8 +279,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508if-mw_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B3BE81-8972-4BE3-8476-C62FD102C0DF"
"criteria": "cpe:2.3:o:korenix:jetnet_4508if-mw_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "82EBBC44-1C71-406C-9FF0-39FB493C5931"
}
]
},
@ -290,8 +290,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508if-mw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "782964BE-2707-4F12-998C-781AFBBCB56A"
"criteria": "cpe:2.3:h:korenix:jetnet_4508if-mw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "701A8011-7DA5-417F-B36F-ABED3914DED6"
}
]
}
@ -306,8 +306,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508f-m_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8A574615-B429-43B4-830D-6469B80EACC1"
"criteria": "cpe:2.3:o:korenix:jetnet_4508f-m_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7361627A-4F68-413D-8051-5C3318DD8F51"
}
]
},
@ -317,8 +317,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508f-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADADF001-B51B-4B74-BDC9-6A3BE3410C6B"
"criteria": "cpe:2.3:h:korenix:jetnet_4508f-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43A20FF6-2622-4FD4-939C-587B48DD8933"
}
]
}
@ -333,8 +333,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508f-s_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2B79D36E-9182-4D57-952D-F15E51D53AF9"
"criteria": "cpe:2.3:o:korenix:jetnet_4508f-s_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "78B14120-454F-4D1D-A156-1506DD0C0037"
}
]
},
@ -344,8 +344,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508f-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36382F0E-551C-4F07-B3F2-540493131876"
"criteria": "cpe:2.3:h:korenix:jetnet_4508f-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4637E3CC-6474-419C-A78C-963C77AEFF51"
}
]
}
@ -360,8 +360,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508f-mw_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D63B5678-53D8-4F7C-BAE6-D569A0E6E730"
"criteria": "cpe:2.3:o:korenix:jetnet_4508f-mw_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A6F5BD0F-74C3-4032-A6CC-90A96EBAA14C"
}
]
},
@ -371,8 +371,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508f-mw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D053D60-02FB-471C-AFDB-A5CCBC59344D"
"criteria": "cpe:2.3:h:korenix:jetnet_4508f-mw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E5326F-3E4F-40EB-946F-A4D6EA71E9B5"
}
]
}
@ -387,8 +387,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508f-sw_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "24543454-44A3-4218-B011-BD58A6D2D560"
"criteria": "cpe:2.3:o:korenix:jetnet_4508f-sw_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "71C41FA7-2DD7-4788-9874-67ACCADDD456"
}
]
},
@ -398,8 +398,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508f-sw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D328683-93E7-4D04-A79E-488E1F3CC98E"
"criteria": "cpe:2.3:h:korenix:jetnet_4508f-sw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EDFA438-A071-445B-86B9-44C22DB7664D"
}
]
}
@ -414,8 +414,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet5620g-4c_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3081AFA3-3F71-4B96-A38B-A70D36887ABB"
"criteria": "cpe:2.3:o:korenix:jetnet_5620g-4c_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9FE392-DF90-4837-9B96-6CC3ADE539CF"
}
]
},
@ -425,8 +425,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet5620g-4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA0E4809-BF23-4AAD-8EEA-F000617E7795"
"criteria": "cpe:2.3:h:korenix:jetnet_5620g-4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9385192-A75A-428E-9A04-E443A69B2DF8"
}
]
}
@ -441,8 +441,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet5612gp-4f_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "128EF37D-3193-4711-9DD3-0F965A096C8A"
"criteria": "cpe:2.3:o:korenix:jetnet_5612gp-4f_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "64BD0899-AA5B-43DA-B741-BC74CF522989"
}
]
},
@ -452,8 +452,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet5612gp-4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72A7AA85-0DBB-4030-AE67-5D65DFDF10EB"
"criteria": "cpe:2.3:h:korenix:jetnet_5612gp-4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1097E748-4ACA-4D97-8000-A219D0771B2A"
}
]
}
@ -468,8 +468,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet5612g-4f_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E125540D-0FCF-49AB-89DA-2B9AEDC54244"
"criteria": "cpe:2.3:o:korenix:jetnet_5612g-4f_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "03B76261-DAD3-43C9-AAB1-ED30C825A3AF"
}
]
},
@ -479,8 +479,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet5612g-4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A41CDDB8-8D26-4CD2-B67A-297F98D313EF"
"criteria": "cpe:2.3:h:korenix:jetnet_5612g-4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46D7393F-8736-4BC7-A611-4E54D14F7893"
}
]
}
@ -495,8 +495,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet5728g-24p-ac-2dc-us_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D50B0785-B895-4CF8-AEB9-6A028BE616DA"
"criteria": "cpe:2.3:o:korenix:jetnet_5728g-24p-ac-2dc-us_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB3C066-DA69-4C69-ACD1-8AA325667B25"
}
]
},
@ -506,8 +506,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet5728g-24p-ac-2dc-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2B20C7D-BA5D-440A-94AA-21C535879846"
"criteria": "cpe:2.3:h:korenix:jetnet_5728g-24p-ac-2dc-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93F24671-F7E7-476E-92CD-CF0061682A6A"
}
]
}
@ -522,8 +522,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet5728g-24p-ac-2dc-eu_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4664BA3D-EA4D-4A54-B845-9AA14C210F37"
"criteria": "cpe:2.3:o:korenix:jetnet_5728g-24p-ac-2dc-eu_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E34410B0-C4D5-40B9-89A8-95782A55913E"
}
]
},
@ -533,8 +533,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet5728g-24p-ac-2dc-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33A8FEED-347A-48EB-8302-F45DA238265D"
"criteria": "cpe:2.3:h:korenix:jetnet_5728g-24p-ac-2dc-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9145BCF4-E8A0-4561-B5D3-B79B8BDD8692"
}
]
}
@ -549,8 +549,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6528gf-2ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "23DB6499-AE29-4304-8910-B288E8AD4F03"
"criteria": "cpe:2.3:o:korenix:jetnet_6528gf-2ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "347A53EC-7C44-46C4-ABAF-CF7AD709B0AE"
}
]
},
@ -560,8 +560,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6528gf-2ac-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DF73BE9-DB3A-4CCD-8620-13B59E4BC0A5"
"criteria": "cpe:2.3:h:korenix:jetnet_6528gf-2ac-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1189AAB8-CFB1-4542-A85D-717E793F67F0"
}
]
}
@ -576,8 +576,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6528gf-2ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF11F464-53FA-4667-ACC9-F460254845AD"
"criteria": "cpe:2.3:o:korenix:jetnet_6528gf-2ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C9D7474-2DC1-4698-8116-506E05A87E0A"
}
]
},
@ -587,8 +587,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6528gf-2ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "511A9B03-5FC2-4AD6-B85D-96D1A7BA28EB"
"criteria": "cpe:2.3:h:korenix:jetnet_6528gf-2ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B857CDA-1A39-454E-B16C-CE90CD1577B2"
}
]
}
@ -603,8 +603,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6528gf-2dc24_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "31477C04-BE34-40DF-85C8-2D0F5662842C"
"criteria": "cpe:2.3:o:korenix:jetnet_6528gf-2dc24_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "47FED1A9-830B-4F3D-92C7-5CAEF5F742C6"
}
]
},
@ -614,8 +614,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6528gf-2dc24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48D8AFCB-AD72-4D00-B7BC-191526E94795"
"criteria": "cpe:2.3:h:korenix:jetnet_6528gf-2dc24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEAAB531-DB65-4C51-A2FC-9D7E6FBBCB23"
}
]
}
@ -630,8 +630,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6528gf-2dc48_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1E76CC4D-9B3E-4319-B40A-E75CEA7000D6"
"criteria": "cpe:2.3:o:korenix:jetnet_6528gf-2dc48_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "13F06A64-36CA-4023-8217-1ECC065AFC13"
}
]
},
@ -641,8 +641,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6528gf-2dc48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6391AB0E-BE54-4D0A-ADA1-1DD64471F37C"
"criteria": "cpe:2.3:h:korenix:jetnet_6528gf-2dc48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "165844C8-B773-49D1-AFFB-564EE4858127"
}
]
}
@ -657,8 +657,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6528gf-ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "87043A8A-5A6C-4730-A3D9-57C30A9BD2FF"
"criteria": "cpe:2.3:o:korenix:jetnet_6528gf-ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB9A900-9AC7-4A82-BEED-7002AD81AFDE"
}
]
},
@ -668,8 +668,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6528gf-ac-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE631AC7-6AE5-46F0-8303-1AA2D9A0D510"
"criteria": "cpe:2.3:h:korenix:jetnet_6528gf-ac-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69857D1C-BA45-4B3F-8F11-9D5636EDFF5D"
}
]
}
@ -684,8 +684,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6528gf-ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED42227E-CDE9-4784-A8E4-AD40B0F4498C"
"criteria": "cpe:2.3:o:korenix:jetnet_6528gf-ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CE95314D-9AFC-40CB-B449-B195FF94605B"
}
]
},
@ -695,8 +695,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6528gf-ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "870154EF-D3DB-4337-8905-A7888E06F787"
"criteria": "cpe:2.3:h:korenix:jetnet_6528gf-ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B483B168-203E-4905-9585-B7DDC735A76E"
}
]
}
@ -711,8 +711,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6628xp-4f-us_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C5FCBF5F-FB5B-4521-8641-01A439B42554"
"criteria": "cpe:2.3:o:korenix:jetnet_6628xp-4f-us_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C890BEF3-785C-47F1-A65C-92518E4FAA2D"
}
]
},
@ -722,8 +722,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6628xp-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC2FB7-D3A4-4154-8FE6-C574E9D65163"
"criteria": "cpe:2.3:h:korenix:jetnet_6628xp-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A1FA23F-3E4E-46E5-A0F8-B31895C1B5CC"
}
]
}
@ -738,8 +738,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6628x-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E4B24BE6-6C7A-46F3-B020-79826444B8E8"
"criteria": "cpe:2.3:o:korenix:jetnet_6628x-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "70128CE4-FAF6-4564-BC3F-EFA813A01DD4"
}
]
},
@ -749,8 +749,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6628x-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "711A5C6D-BD3F-4297-896B-D4C6193FF495"
"criteria": "cpe:2.3:h:korenix:jetnet_6628x-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAC14B48-37CE-4385-A779-A553850A7B3C"
}
]
}
@ -765,8 +765,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6728g-24p-ac-2dc-us_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8EE4C4F8-CB14-47B9-9788-44491FDDA31D"
"criteria": "cpe:2.3:o:korenix:jetnet_6728g-24p-ac-2dc-us_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "22E4FFB2-CB4C-4088-A656-84B7F883DF6A"
}
]
},
@ -776,8 +776,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6728g-24p-ac-2dc-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E22EDFE-7E2D-4E66-AD86-BA84120D04B0"
"criteria": "cpe:2.3:h:korenix:jetnet_6728g-24p-ac-2dc-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D865328-72DC-4802-A82D-DBF30B638583"
}
]
}
@ -792,8 +792,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6728g-24p-ac-2dc-eu_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB39EAB6-D7E3-49CF-8221-C086AD7D7665"
"criteria": "cpe:2.3:o:korenix:jetnet_6728g-24p-ac-2dc-eu_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C837607-C6FF-40F2-AC88-6A9C48CB1029"
}
]
},
@ -803,8 +803,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6728g-24p-ac-2dc-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "444CE615-E6E9-4E3B-8D83-8AAC31F11AE9"
"criteria": "cpe:2.3:h:korenix:jetnet_6728g-24p-ac-2dc-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16305FB2-E46A-4DDA-9E85-64DAD64B35D4"
}
]
}
@ -819,8 +819,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-2dc48_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "71340F26-5B5C-45DE-A5C0-0EE6BBCF3E58"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-2dc48_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43816A78-45C6-4829-A4C4-72DA8E0E330C"
}
]
},
@ -830,8 +830,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-2dc48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46C5A5D0-8A4C-42F8-A446-9296DD82D016"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-2dc48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38E8437F-8F81-40D5-A4A2-D6D3D1E8DC7F"
}
]
}
@ -846,8 +846,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-2dc24_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DB334C-8A0C-4BAA-BB2F-39DFA870F675"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-2dc24_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B733CE0-84AC-4E80-9276-F129F41DF88E"
}
]
},
@ -857,8 +857,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-2dc24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A548EA71-D43D-444A-9A17-2FB019CCAB54"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-2dc24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58C8D47C-A56B-43A2-9A85-4C5823A3B9A9"
}
]
}
@ -873,8 +873,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-ac-dc24-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A289C72D-732F-4B71-AC89-AEBD27F81492"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-ac-dc24-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8E1ADD38-C9C3-42AE-AD9A-D20FE64F44D2"
}
]
},
@ -884,8 +884,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-ac-dc24-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "648F7C4F-0F6E-41D0-8405-DB95F14E874B"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-ac-dc24-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51811483-40D1-40B9-82CB-015CEA7A8ACE"
}
]
}
@ -900,8 +900,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-2ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE2E55E-2895-4AB0-97DF-CDFAAF55E7C5"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-2ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0BC888A2-32AC-4DB0-B073-FE8FE9A565CB"
}
]
},
@ -911,8 +911,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-2ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58106DF8-A71C-4571-8E8B-CF8864C4C89E"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-2ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "585BC55D-9ED9-4A22-AFED-9C199A89011F"
}
]
}
@ -927,8 +927,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "089E69A3-B477-420A-B665-0C264CB33703"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "527AFFFB-0626-41AD-9CD8-0E34ECC4B4A8"
}
]
},
@ -938,8 +938,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B29F3C4E-2A95-408B-BE3F-0E8DA5C9B71B"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AA11034-5A43-45C5-A48A-B9754A63AFBF"
}
]
}
@ -954,8 +954,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-2ac-au_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2ADE14D8-796F-4E6D-9DAB-A93BEE5ECFEF"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-2ac-au_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A2B07B4D-6E13-4589-8ACA-ADF728EB4716"
}
]
},
@ -965,8 +965,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-2ac-au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BC3C88F-71E9-4CEB-94F2-490D972AFA67"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-2ac-au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1523A9A-09E0-44E1-96E2-24FE49B7FDAA"
}
]
}
@ -981,8 +981,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-ac-dc24-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2A315472-9721-4652-B21F-FA1E8506584C"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-ac-dc24-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "69E718E1-864B-4B97-8A4C-242E449728A6"
}
]
},
@ -992,8 +992,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-ac-dc24-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "335308E4-31C3-4E90-B307-2AE076EE682F"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-ac-dc24-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C64F5C7-7FC0-415A-8209-145DA3A296FA"
}
]
}
@ -1008,8 +1008,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-2ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5E97906-9629-4776-8339-423C82D375FA"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-2ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C26FCFA8-C978-4967-82CC-7CEBEC9014B8"
}
]
},
@ -1019,8 +1019,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-2ac-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28BF440A-4CB4-4F23-A198-F5B5312AE944"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-2ac-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73431E6E-CAF5-4114-A2E8-BE9860558610"
}
]
}
@ -1035,8 +1035,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6910g-m12_hvdc_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "853C6DCB-DBBE-47E6-B318-0324E5739C92"
"criteria": "cpe:2.3:o:korenix:jetnet_6910g-m12_hvdc_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65334CFA-6C17-461E-9137-976244486B42"
}
]
},
@ -1046,8 +1046,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6910g-m12_hvdc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6817848-C8E4-4D10-A0B4-6016072CC4DB"
"criteria": "cpe:2.3:h:korenix:jetnet_6910g-m12_hvdc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1D90718-B60B-4950-9898-24E315D63F44"
}
]
}
@ -1062,8 +1062,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7310g-v2_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "049C0B4F-651B-4245-BB81-16AAE135FC94"
"criteria": "cpe:2.3:o:korenix:jetnet_7310g-v2_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BAC7EFE2-DE02-4012-955B-5078348B362C"
}
]
},
@ -1073,8 +1073,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7310g-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF040D6C-DE7F-4F6E-A13B-7DA987F6E4DF"
"criteria": "cpe:2.3:h:korenix:jetnet_7310g-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53CE00D4-6846-4C28-83DD-13952831275E"
}
]
}
@ -1089,8 +1089,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7628xp-4f-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E2069D33-0BB9-4260-82F9-929FB90BB68C"
"criteria": "cpe:2.3:o:korenix:jetnet_7628xp-4f-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C417B424-3504-4BFB-AFB9-B66C0AF38AD5"
}
]
},
@ -1100,8 +1100,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7628xp-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C397929-6B19-42C1-A161-184639C6299A"
"criteria": "cpe:2.3:h:korenix:jetnet_7628xp-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E629B201-717C-4D7C-A1DE-04E0820B7AA9"
}
]
}
@ -1116,8 +1116,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7628xp-4f-us_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "802DB1DE-5D36-4F08-B3A2-070B985D9360"
"criteria": "cpe:2.3:o:korenix:jetnet_7628xp-4f-us_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7B817CA4-30DC-419D-AD84-3489CA0C68D8"
}
]
},
@ -1127,8 +1127,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7628xp-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C397929-6B19-42C1-A161-184639C6299A"
"criteria": "cpe:2.3:h:korenix:jetnet_7628xp-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E629B201-717C-4D7C-A1DE-04E0820B7AA9"
}
]
}
@ -1143,8 +1143,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7628xp-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "80E0983A-62CB-47A6-8CB7-664B81F87E0B"
"criteria": "cpe:2.3:o:korenix:jetnet_7628xp-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BE668B76-D528-4C4F-93CC-893479E2230C"
}
]
},
@ -1154,8 +1154,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7628xp-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50EB8AFE-42F2-453D-BBE4-75B3629CDF6B"
"criteria": "cpe:2.3:h:korenix:jetnet_7628xp-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B566F22-B0BA-4259-B104-AFCEA5ECCA70"
}
]
}
@ -1170,8 +1170,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7628xp-4f-eu_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D2497E2C-4AD1-486A-B4FC-8F1A7E12D149"
"criteria": "cpe:2.3:o:korenix:jetnet_7628xp-4f-eu_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72B8862C-DA86-46DD-957A-7B88C6C42927"
}
]
},
@ -1181,8 +1181,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7628xp-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50EB8AFE-42F2-453D-BBE4-75B3629CDF6B"
"criteria": "cpe:2.3:h:korenix:jetnet_7628xp-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B566F22-B0BA-4259-B104-AFCEA5ECCA70"
}
]
}
@ -1197,8 +1197,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7628x-4f-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2AB3AC94-D763-4CF7-9C3A-FE72D026FC1A"
"criteria": "cpe:2.3:o:korenix:jetnet_7628x-4f-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3563599-3CF7-46ED-8734-0A52BA052071"
}
]
},
@ -1208,8 +1208,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7628x-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4724A817-C5F4-4AEA-8E8A-04429BCA3344"
"criteria": "cpe:2.3:h:korenix:jetnet_7628x-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C722303-26DB-44AD-BF0D-A7930C52A638"
}
]
}
@ -1224,8 +1224,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7628x-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "75826EA2-A247-4981-80DB-1B0653C6C6C3"
"criteria": "cpe:2.3:o:korenix:jetnet_7628x-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AB06B11C-154D-4B6A-8E8E-A12831F8211E"
}
]
},
@ -1235,8 +1235,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7628x-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96E344A8-27FE-4E48-948B-2C345CC14883"
"criteria": "cpe:2.3:h:korenix:jetnet_7628x-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41AF8048-A100-4BDB-B902-B80E70D89173"
}
]
}
@ -1251,8 +1251,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7714g-m12_hvdc_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB5460B2-BB27-4FE2-B2EE-B86467DD8EEF"
"criteria": "cpe:2.3:o:korenix:jetnet_7714g-m12_hvdc_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6624B567-4DF0-4A67-8C14-EB8E4BE1EEDA"
}
]
},
@ -1262,8 +1262,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7714g-m12_hvdc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15EFEB55-14EF-444E-A854-0D6AD4E4AEB3"
"criteria": "cpe:2.3:h:korenix:jetnet_7714g-m12_hvdc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0492BC5-5B2C-4DF7-971C-679955DE83AC"
}
]
}
@ -1276,7 +1276,8 @@
"source": "office@cyberdanube.com",
"tags": [
"Exploit",
"Third Party Advisory"
"Third Party Advisory",
"VDB Entry"
]
},
{
@ -1284,6 +1285,7 @@
"source": "office@cyberdanube.com",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5376",
"sourceIdentifier": "office@cyberdanube.com",
"published": "2024-01-09T10:15:22.823",
"lastModified": "2024-01-17T15:05:39.563",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-01-17T17:46:40.297",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,8 +90,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet5310g_firmware:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EE9A221B-49BE-4B94-A4BA-3837ACD2A38B"
"criteria": "cpe:2.3:o:korenix:jetnet_5310g_firmware:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A95682DF-7942-49DA-9F81-EF1807045409"
}
]
},
@ -117,8 +117,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2187DB56-9032-499E-AFEB-71D803C9958F"
"criteria": "cpe:2.3:o:korenix:jetnet_4508_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E7F0FE3A-6460-46FD-BDC0-40BF2705637D"
}
]
},
@ -128,8 +128,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7176A484-A088-4C18-9672-1D97432B17DB"
"criteria": "cpe:2.3:h:korenix:jetnet_4508:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99147D57-7780-4234-B55D-CC9AFBA481C9"
}
]
}
@ -144,8 +144,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508i-w_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FE9137AD-E8FE-4993-A66E-631F5D7072EB"
"criteria": "cpe:2.3:o:korenix:jetnet_4508i-w_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "96C77E80-72C3-4662-A9CE-7C8CC126F1B6"
}
]
},
@ -155,8 +155,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508i-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "965C9456-043B-4565-84A3-536FA6558F0C"
"criteria": "cpe:2.3:h:korenix:jetnet_4508i-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8898260C-6D31-41BA-A2F2-A8975B5C7DEF"
}
]
}
@ -171,8 +171,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508-w_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "505A7DD4-7392-467C-9EA3-6083CB223194"
"criteria": "cpe:2.3:o:korenix:jetnet_4508-w_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E017D04-2392-483C-AC36-8AF8F061720B"
}
]
},
@ -182,8 +182,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A55997F3-A155-423C-90EC-46E462482D80"
"criteria": "cpe:2.3:h:korenix:jetnet_4508-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAC01082-D54E-4E35-A68C-3CF5A54F2816"
}
]
}
@ -198,8 +198,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508if-s_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E6B5C74-4FE8-45DD-9D45-E225E39CDCE6"
"criteria": "cpe:2.3:o:korenix:jetnet_4508if-s_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7461886A-A4D4-4193-8366-5DBB3A78A355"
}
]
},
@ -209,8 +209,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508if-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED235ED-4CEE-47C2-95AF-06017EE84C7B"
"criteria": "cpe:2.3:h:korenix:jetnet_4508if-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DAE70B6-7384-4909-8A07-3F786A51EF6B"
}
]
}
@ -225,8 +225,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508if-m_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8C4BCE96-6A23-4573-BD05-0D66DE2FDAB2"
"criteria": "cpe:2.3:o:korenix:jetnet_4508if-m_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "01E97B8A-ABBB-4EE6-9F56-4766FAAA6CBD"
}
]
},
@ -236,8 +236,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508if-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98B225C9-995D-41BC-A242-40F9072DA173"
"criteria": "cpe:2.3:h:korenix:jetnet_4508if-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "044D5792-E5CE-4235-9148-C984AC0F1F6B"
}
]
}
@ -252,8 +252,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508if-sw_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "220A9305-2789-4ADE-A4A6-94322A93FBE1"
"criteria": "cpe:2.3:o:korenix:jetnet_4508if-sw_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E5AC4C-E6E6-45A0-9E27-54ABC3D224F5"
}
]
},
@ -263,8 +263,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508if-sw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BFE1BAC-2520-4356-AD31-4D3DEDB7214C"
"criteria": "cpe:2.3:h:korenix:jetnet_4508if-sw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EB3742F-CC0B-49E5-B29C-EF4E7D9A7D28"
}
]
}
@ -279,8 +279,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508if-mw_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B3BE81-8972-4BE3-8476-C62FD102C0DF"
"criteria": "cpe:2.3:o:korenix:jetnet_4508if-mw_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "82EBBC44-1C71-406C-9FF0-39FB493C5931"
}
]
},
@ -290,8 +290,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508if-mw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "782964BE-2707-4F12-998C-781AFBBCB56A"
"criteria": "cpe:2.3:h:korenix:jetnet_4508if-mw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "701A8011-7DA5-417F-B36F-ABED3914DED6"
}
]
}
@ -306,8 +306,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508f-m_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8A574615-B429-43B4-830D-6469B80EACC1"
"criteria": "cpe:2.3:o:korenix:jetnet_4508f-m_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7361627A-4F68-413D-8051-5C3318DD8F51"
}
]
},
@ -317,8 +317,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508f-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADADF001-B51B-4B74-BDC9-6A3BE3410C6B"
"criteria": "cpe:2.3:h:korenix:jetnet_4508f-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43A20FF6-2622-4FD4-939C-587B48DD8933"
}
]
}
@ -333,8 +333,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508f-s_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2B79D36E-9182-4D57-952D-F15E51D53AF9"
"criteria": "cpe:2.3:o:korenix:jetnet_4508f-s_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "78B14120-454F-4D1D-A156-1506DD0C0037"
}
]
},
@ -344,8 +344,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508f-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36382F0E-551C-4F07-B3F2-540493131876"
"criteria": "cpe:2.3:h:korenix:jetnet_4508f-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4637E3CC-6474-419C-A78C-963C77AEFF51"
}
]
}
@ -360,8 +360,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508f-mw_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D63B5678-53D8-4F7C-BAE6-D569A0E6E730"
"criteria": "cpe:2.3:o:korenix:jetnet_4508f-mw_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A6F5BD0F-74C3-4032-A6CC-90A96EBAA14C"
}
]
},
@ -371,8 +371,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508f-mw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D053D60-02FB-471C-AFDB-A5CCBC59344D"
"criteria": "cpe:2.3:h:korenix:jetnet_4508f-mw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E5326F-3E4F-40EB-946F-A4D6EA71E9B5"
}
]
}
@ -387,8 +387,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet4508f-sw_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "24543454-44A3-4218-B011-BD58A6D2D560"
"criteria": "cpe:2.3:o:korenix:jetnet_4508f-sw_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "71C41FA7-2DD7-4788-9874-67ACCADDD456"
}
]
},
@ -398,8 +398,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet4508f-sw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D328683-93E7-4D04-A79E-488E1F3CC98E"
"criteria": "cpe:2.3:h:korenix:jetnet_4508f-sw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EDFA438-A071-445B-86B9-44C22DB7664D"
}
]
}
@ -414,8 +414,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet5620g-4c_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3081AFA3-3F71-4B96-A38B-A70D36887ABB"
"criteria": "cpe:2.3:o:korenix:jetnet_5620g-4c_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9FE392-DF90-4837-9B96-6CC3ADE539CF"
}
]
},
@ -425,8 +425,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet5620g-4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA0E4809-BF23-4AAD-8EEA-F000617E7795"
"criteria": "cpe:2.3:h:korenix:jetnet_5620g-4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9385192-A75A-428E-9A04-E443A69B2DF8"
}
]
}
@ -441,8 +441,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet5612gp-4f_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "128EF37D-3193-4711-9DD3-0F965A096C8A"
"criteria": "cpe:2.3:o:korenix:jetnet_5612gp-4f_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "64BD0899-AA5B-43DA-B741-BC74CF522989"
}
]
},
@ -452,8 +452,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet5612gp-4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72A7AA85-0DBB-4030-AE67-5D65DFDF10EB"
"criteria": "cpe:2.3:h:korenix:jetnet_5612gp-4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1097E748-4ACA-4D97-8000-A219D0771B2A"
}
]
}
@ -468,8 +468,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet5612g-4f_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E125540D-0FCF-49AB-89DA-2B9AEDC54244"
"criteria": "cpe:2.3:o:korenix:jetnet_5612g-4f_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "03B76261-DAD3-43C9-AAB1-ED30C825A3AF"
}
]
},
@ -479,8 +479,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet5612g-4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A41CDDB8-8D26-4CD2-B67A-297F98D313EF"
"criteria": "cpe:2.3:h:korenix:jetnet_5612g-4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46D7393F-8736-4BC7-A611-4E54D14F7893"
}
]
}
@ -495,8 +495,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet5728g-24p-ac-2dc-us_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D50B0785-B895-4CF8-AEB9-6A028BE616DA"
"criteria": "cpe:2.3:o:korenix:jetnet_5728g-24p-ac-2dc-us_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB3C066-DA69-4C69-ACD1-8AA325667B25"
}
]
},
@ -506,8 +506,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet5728g-24p-ac-2dc-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2B20C7D-BA5D-440A-94AA-21C535879846"
"criteria": "cpe:2.3:h:korenix:jetnet_5728g-24p-ac-2dc-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93F24671-F7E7-476E-92CD-CF0061682A6A"
}
]
}
@ -522,8 +522,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet5728g-24p-ac-2dc-eu_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4664BA3D-EA4D-4A54-B845-9AA14C210F37"
"criteria": "cpe:2.3:o:korenix:jetnet_5728g-24p-ac-2dc-eu_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E34410B0-C4D5-40B9-89A8-95782A55913E"
}
]
},
@ -533,8 +533,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet5728g-24p-ac-2dc-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33A8FEED-347A-48EB-8302-F45DA238265D"
"criteria": "cpe:2.3:h:korenix:jetnet_5728g-24p-ac-2dc-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9145BCF4-E8A0-4561-B5D3-B79B8BDD8692"
}
]
}
@ -549,8 +549,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6528gf-2ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "23DB6499-AE29-4304-8910-B288E8AD4F03"
"criteria": "cpe:2.3:o:korenix:jetnet_6528gf-2ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "347A53EC-7C44-46C4-ABAF-CF7AD709B0AE"
}
]
},
@ -560,8 +560,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6528gf-2ac-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DF73BE9-DB3A-4CCD-8620-13B59E4BC0A5"
"criteria": "cpe:2.3:h:korenix:jetnet_6528gf-2ac-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1189AAB8-CFB1-4542-A85D-717E793F67F0"
}
]
}
@ -576,8 +576,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6528gf-2ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF11F464-53FA-4667-ACC9-F460254845AD"
"criteria": "cpe:2.3:o:korenix:jetnet_6528gf-2ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C9D7474-2DC1-4698-8116-506E05A87E0A"
}
]
},
@ -587,8 +587,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6528gf-2ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "511A9B03-5FC2-4AD6-B85D-96D1A7BA28EB"
"criteria": "cpe:2.3:h:korenix:jetnet_6528gf-2ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B857CDA-1A39-454E-B16C-CE90CD1577B2"
}
]
}
@ -603,8 +603,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6528gf-2dc24_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "31477C04-BE34-40DF-85C8-2D0F5662842C"
"criteria": "cpe:2.3:o:korenix:jetnet_6528gf-2dc24_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "47FED1A9-830B-4F3D-92C7-5CAEF5F742C6"
}
]
},
@ -614,8 +614,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6528gf-2dc24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48D8AFCB-AD72-4D00-B7BC-191526E94795"
"criteria": "cpe:2.3:h:korenix:jetnet_6528gf-2dc24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEAAB531-DB65-4C51-A2FC-9D7E6FBBCB23"
}
]
}
@ -630,8 +630,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6528gf-2dc48_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1E76CC4D-9B3E-4319-B40A-E75CEA7000D6"
"criteria": "cpe:2.3:o:korenix:jetnet_6528gf-2dc48_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "13F06A64-36CA-4023-8217-1ECC065AFC13"
}
]
},
@ -641,8 +641,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6528gf-2dc48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6391AB0E-BE54-4D0A-ADA1-1DD64471F37C"
"criteria": "cpe:2.3:h:korenix:jetnet_6528gf-2dc48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "165844C8-B773-49D1-AFFB-564EE4858127"
}
]
}
@ -657,8 +657,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6528gf-ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "87043A8A-5A6C-4730-A3D9-57C30A9BD2FF"
"criteria": "cpe:2.3:o:korenix:jetnet_6528gf-ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB9A900-9AC7-4A82-BEED-7002AD81AFDE"
}
]
},
@ -668,8 +668,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6528gf-ac-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE631AC7-6AE5-46F0-8303-1AA2D9A0D510"
"criteria": "cpe:2.3:h:korenix:jetnet_6528gf-ac-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69857D1C-BA45-4B3F-8F11-9D5636EDFF5D"
}
]
}
@ -684,8 +684,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6528gf-ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED42227E-CDE9-4784-A8E4-AD40B0F4498C"
"criteria": "cpe:2.3:o:korenix:jetnet_6528gf-ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CE95314D-9AFC-40CB-B449-B195FF94605B"
}
]
},
@ -695,8 +695,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6528gf-ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "870154EF-D3DB-4337-8905-A7888E06F787"
"criteria": "cpe:2.3:h:korenix:jetnet_6528gf-ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B483B168-203E-4905-9585-B7DDC735A76E"
}
]
}
@ -711,8 +711,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6628xp-4f-us_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C5FCBF5F-FB5B-4521-8641-01A439B42554"
"criteria": "cpe:2.3:o:korenix:jetnet_6628xp-4f-us_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C890BEF3-785C-47F1-A65C-92518E4FAA2D"
}
]
},
@ -722,8 +722,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6628xp-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC2FB7-D3A4-4154-8FE6-C574E9D65163"
"criteria": "cpe:2.3:h:korenix:jetnet_6628xp-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A1FA23F-3E4E-46E5-A0F8-B31895C1B5CC"
}
]
}
@ -738,8 +738,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6628x-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E4B24BE6-6C7A-46F3-B020-79826444B8E8"
"criteria": "cpe:2.3:o:korenix:jetnet_6628x-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "70128CE4-FAF6-4564-BC3F-EFA813A01DD4"
}
]
},
@ -749,8 +749,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6628x-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "711A5C6D-BD3F-4297-896B-D4C6193FF495"
"criteria": "cpe:2.3:h:korenix:jetnet_6628x-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAC14B48-37CE-4385-A779-A553850A7B3C"
}
]
}
@ -765,8 +765,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6728g-24p-ac-2dc-us_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8EE4C4F8-CB14-47B9-9788-44491FDDA31D"
"criteria": "cpe:2.3:o:korenix:jetnet_6728g-24p-ac-2dc-us_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "22E4FFB2-CB4C-4088-A656-84B7F883DF6A"
}
]
},
@ -776,8 +776,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6728g-24p-ac-2dc-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E22EDFE-7E2D-4E66-AD86-BA84120D04B0"
"criteria": "cpe:2.3:h:korenix:jetnet_6728g-24p-ac-2dc-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D865328-72DC-4802-A82D-DBF30B638583"
}
]
}
@ -792,8 +792,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6728g-24p-ac-2dc-eu_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB39EAB6-D7E3-49CF-8221-C086AD7D7665"
"criteria": "cpe:2.3:o:korenix:jetnet_6728g-24p-ac-2dc-eu_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C837607-C6FF-40F2-AC88-6A9C48CB1029"
}
]
},
@ -803,8 +803,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6728g-24p-ac-2dc-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "444CE615-E6E9-4E3B-8D83-8AAC31F11AE9"
"criteria": "cpe:2.3:h:korenix:jetnet_6728g-24p-ac-2dc-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16305FB2-E46A-4DDA-9E85-64DAD64B35D4"
}
]
}
@ -819,8 +819,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-2dc48_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "71340F26-5B5C-45DE-A5C0-0EE6BBCF3E58"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-2dc48_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43816A78-45C6-4829-A4C4-72DA8E0E330C"
}
]
},
@ -830,8 +830,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-2dc48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46C5A5D0-8A4C-42F8-A446-9296DD82D016"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-2dc48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38E8437F-8F81-40D5-A4A2-D6D3D1E8DC7F"
}
]
}
@ -846,8 +846,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-2dc24_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DB334C-8A0C-4BAA-BB2F-39DFA870F675"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-2dc24_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B733CE0-84AC-4E80-9276-F129F41DF88E"
}
]
},
@ -857,8 +857,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-2dc24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A548EA71-D43D-444A-9A17-2FB019CCAB54"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-2dc24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58C8D47C-A56B-43A2-9A85-4C5823A3B9A9"
}
]
}
@ -873,8 +873,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-ac-dc24-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A289C72D-732F-4B71-AC89-AEBD27F81492"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-ac-dc24-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8E1ADD38-C9C3-42AE-AD9A-D20FE64F44D2"
}
]
},
@ -884,8 +884,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-ac-dc24-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "648F7C4F-0F6E-41D0-8405-DB95F14E874B"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-ac-dc24-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51811483-40D1-40B9-82CB-015CEA7A8ACE"
}
]
}
@ -900,8 +900,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-2ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE2E55E-2895-4AB0-97DF-CDFAAF55E7C5"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-2ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0BC888A2-32AC-4DB0-B073-FE8FE9A565CB"
}
]
},
@ -911,8 +911,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-2ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58106DF8-A71C-4571-8E8B-CF8864C4C89E"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-2ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "585BC55D-9ED9-4A22-AFED-9C199A89011F"
}
]
}
@ -927,8 +927,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "089E69A3-B477-420A-B665-0C264CB33703"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-ac-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "527AFFFB-0626-41AD-9CD8-0E34ECC4B4A8"
}
]
},
@ -938,8 +938,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B29F3C4E-2A95-408B-BE3F-0E8DA5C9B71B"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-ac-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AA11034-5A43-45C5-A48A-B9754A63AFBF"
}
]
}
@ -954,8 +954,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-2ac-au_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2ADE14D8-796F-4E6D-9DAB-A93BEE5ECFEF"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-2ac-au_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A2B07B4D-6E13-4589-8ACA-ADF728EB4716"
}
]
},
@ -965,8 +965,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-2ac-au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BC3C88F-71E9-4CEB-94F2-490D972AFA67"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-2ac-au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1523A9A-09E0-44E1-96E2-24FE49B7FDAA"
}
]
}
@ -981,8 +981,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-ac-dc24-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2A315472-9721-4652-B21F-FA1E8506584C"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-ac-dc24-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "69E718E1-864B-4B97-8A4C-242E449728A6"
}
]
},
@ -992,8 +992,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-ac-dc24-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "335308E4-31C3-4E90-B307-2AE076EE682F"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-ac-dc24-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C64F5C7-7FC0-415A-8209-145DA3A296FA"
}
]
}
@ -1008,8 +1008,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6828gf-2ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5E97906-9629-4776-8339-423C82D375FA"
"criteria": "cpe:2.3:o:korenix:jetnet_6828gf-2ac-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C26FCFA8-C978-4967-82CC-7CEBEC9014B8"
}
]
},
@ -1019,8 +1019,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6828gf-2ac-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28BF440A-4CB4-4F23-A198-F5B5312AE944"
"criteria": "cpe:2.3:h:korenix:jetnet_6828gf-2ac-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73431E6E-CAF5-4114-A2E8-BE9860558610"
}
]
}
@ -1035,8 +1035,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet6910g-m12_hvdc_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "853C6DCB-DBBE-47E6-B318-0324E5739C92"
"criteria": "cpe:2.3:o:korenix:jetnet_6910g-m12_hvdc_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65334CFA-6C17-461E-9137-976244486B42"
}
]
},
@ -1046,8 +1046,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet6910g-m12_hvdc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6817848-C8E4-4D10-A0B4-6016072CC4DB"
"criteria": "cpe:2.3:h:korenix:jetnet_6910g-m12_hvdc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1D90718-B60B-4950-9898-24E315D63F44"
}
]
}
@ -1062,8 +1062,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7310g-v2_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "049C0B4F-651B-4245-BB81-16AAE135FC94"
"criteria": "cpe:2.3:o:korenix:jetnet_7310g-v2_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BAC7EFE2-DE02-4012-955B-5078348B362C"
}
]
},
@ -1073,8 +1073,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7310g-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF040D6C-DE7F-4F6E-A13B-7DA987F6E4DF"
"criteria": "cpe:2.3:h:korenix:jetnet_7310g-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53CE00D4-6846-4C28-83DD-13952831275E"
}
]
}
@ -1089,8 +1089,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7628xp-4f-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E2069D33-0BB9-4260-82F9-929FB90BB68C"
"criteria": "cpe:2.3:o:korenix:jetnet_7628xp-4f-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C417B424-3504-4BFB-AFB9-B66C0AF38AD5"
}
]
},
@ -1100,8 +1100,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7628xp-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C397929-6B19-42C1-A161-184639C6299A"
"criteria": "cpe:2.3:h:korenix:jetnet_7628xp-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E629B201-717C-4D7C-A1DE-04E0820B7AA9"
}
]
}
@ -1116,8 +1116,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7628xp-4f-us_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "802DB1DE-5D36-4F08-B3A2-070B985D9360"
"criteria": "cpe:2.3:o:korenix:jetnet_7628xp-4f-us_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7B817CA4-30DC-419D-AD84-3489CA0C68D8"
}
]
},
@ -1127,8 +1127,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7628xp-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C397929-6B19-42C1-A161-184639C6299A"
"criteria": "cpe:2.3:h:korenix:jetnet_7628xp-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E629B201-717C-4D7C-A1DE-04E0820B7AA9"
}
]
}
@ -1143,8 +1143,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7628xp-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "80E0983A-62CB-47A6-8CB7-664B81F87E0B"
"criteria": "cpe:2.3:o:korenix:jetnet_7628xp-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BE668B76-D528-4C4F-93CC-893479E2230C"
}
]
},
@ -1154,8 +1154,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7628xp-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50EB8AFE-42F2-453D-BBE4-75B3629CDF6B"
"criteria": "cpe:2.3:h:korenix:jetnet_7628xp-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B566F22-B0BA-4259-B104-AFCEA5ECCA70"
}
]
}
@ -1170,8 +1170,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7628xp-4f-eu_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D2497E2C-4AD1-486A-B4FC-8F1A7E12D149"
"criteria": "cpe:2.3:o:korenix:jetnet_7628xp-4f-eu_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72B8862C-DA86-46DD-957A-7B88C6C42927"
}
]
},
@ -1181,8 +1181,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7628xp-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50EB8AFE-42F2-453D-BBE4-75B3629CDF6B"
"criteria": "cpe:2.3:h:korenix:jetnet_7628xp-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B566F22-B0BA-4259-B104-AFCEA5ECCA70"
}
]
}
@ -1197,8 +1197,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7628x-4f-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2AB3AC94-D763-4CF7-9C3A-FE72D026FC1A"
"criteria": "cpe:2.3:o:korenix:jetnet_7628x-4f-us_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3563599-3CF7-46ED-8734-0A52BA052071"
}
]
},
@ -1208,8 +1208,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7628x-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4724A817-C5F4-4AEA-8E8A-04429BCA3344"
"criteria": "cpe:2.3:h:korenix:jetnet_7628x-4f-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C722303-26DB-44AD-BF0D-A7930C52A638"
}
]
}
@ -1224,8 +1224,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7628x-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "75826EA2-A247-4981-80DB-1B0653C6C6C3"
"criteria": "cpe:2.3:o:korenix:jetnet_7628x-4f-eu_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AB06B11C-154D-4B6A-8E8E-A12831F8211E"
}
]
},
@ -1235,8 +1235,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7628x-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96E344A8-27FE-4E48-948B-2C345CC14883"
"criteria": "cpe:2.3:h:korenix:jetnet_7628x-4f-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41AF8048-A100-4BDB-B902-B80E70D89173"
}
]
}
@ -1251,8 +1251,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:korenix:jetnet7714g-m12_hvdc_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB5460B2-BB27-4FE2-B2EE-B86467DD8EEF"
"criteria": "cpe:2.3:o:korenix:jetnet_7714g-m12_hvdc_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6624B567-4DF0-4A67-8C14-EB8E4BE1EEDA"
}
]
},
@ -1262,8 +1262,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:korenix:jetnet7714g-m12_hvdc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15EFEB55-14EF-444E-A854-0D6AD4E4AEB3"
"criteria": "cpe:2.3:h:korenix:jetnet_7714g-m12_hvdc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0492BC5-5B2C-4DF7-971C-679955DE83AC"
}
]
}
@ -1276,7 +1276,8 @@
"source": "office@cyberdanube.com",
"tags": [
"Exploit",
"Third Party Advisory"
"Third Party Advisory",
"VDB Entry"
]
},
{
@ -1284,6 +1285,7 @@
"source": "office@cyberdanube.com",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-6158",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-10T15:15:10.167",
"lastModified": "2024-01-10T16:59:53.407",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T17:36:01.273",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The EventON - WordPress Virtual Event Calendar Plugin plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the evo_eventpost_update_meta function in all versions up to, and including, 4.5.4 (for Pro) and 2.2.7 (for free). This makes it possible for unauthenticated attackers to update and remove arbitrary post metadata. Note that certain parameters may allow for content injection."
},
{
"lang": "es",
"value": "El complemento EventON - WordPress Virtual Event Calendar Plugin para WordPress es vulnerable a modificaciones no autorizadas de datos y p\u00e9rdida de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n evo_eventpost_update_meta en todas las versiones hasta 4.5.4 (para Pro) y 2.2.7 incluida (gratis). Esto hace posible que atacantes no autenticados actualicen y eliminen metadatos de publicaciones arbitrarias. Tenga en cuenta que ciertos par\u00e1metros pueden permitir la inyecci\u00f3n de contenido."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -34,18 +58,63 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.5.4",
"matchCriteriaId": "2EDE7CA5-2467-4B83-B8B5-9940A7CBD275"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:myeventon:eventon-lite:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.2.7",
"matchCriteriaId": "131AC85C-5608-42D1-B684-C2844FA4119B"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.myeventon.com/documentations/eventon-changelog/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3017578/eventon-lite/trunk/includes/admin/class-admin-ajax.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/19f94c4f-145b-4058-aabd-06525fce3cea?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6567",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-11T09:15:49.407",
"lastModified": "2024-01-11T13:57:26.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:46:59.213",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -38,14 +58,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.2.5.8",
"matchCriteriaId": "31CF97A5-E33D-4219-85B7-CC758FC57639"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3013957/learnpress",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6ab578cd-3a0b-43d3-aaa7-0a01f431a4e2?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6582",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-11T09:15:49.617",
"lastModified": "2024-01-11T13:57:26.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:45:11.677",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -38,22 +58,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmet:elements_kit_elementor_addons:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.0.4",
"matchCriteriaId": "F6E2247D-FA3F-40BE-940E-CFF6CFE86C3A"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/elementskit-lite/tags/3.0.3/modules/controls/widget-area-utils.php#L15",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/elementskit-lite/tags/3.0.3/widgets/init/enqueue-scripts.php#L44",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3011323/elementskit-lite/trunk/modules/controls/widget-area-utils.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ff4ae5c8-d164-4c2f-9bf3-83934c22cf4c?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6583",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-11T09:15:49.777",
"lastModified": "2024-01-11T13:57:26.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:42:13.750",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -38,14 +58,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codection:import_and_export_users_and_customers:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.24.2",
"matchCriteriaId": "9D954D92-332A-48C2-B024-2DCDFEABD020"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3007057/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac709779-36f1-4f66-8db3-95a514a5ea59?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-0389",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-10T14:15:44.663",
"lastModified": "2024-01-10T16:59:53.407",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T17:35:31.857",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Student Attendance System 1.0. Affected is an unknown function of the file attendance_report.php. The manipulation of the argument class_id leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-250230 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en SourceCodester Student Attendance System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo attendance_report.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento class_id conduce a la inyecci\u00f3n de SQL. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. VDB-250230 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -71,18 +95,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:student_attendance_system_project:student_attendance_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "04D954BA-08A7-4F4A-B5F7-A0500095AA77"
}
]
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1Vi-IGjAZbitDqEvmd9ONrxE0MgB8-v1I/view?usp=sharing",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.250230",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.250230",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0396",
"sourceIdentifier": "security@progress.com",
"published": "2024-01-17T16:15:46.623",
"lastModified": "2024-01-17T16:15:46.623",
"vulnStatus": "Received",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-0468",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-12T21:15:10.350",
"lastModified": "2024-01-14T21:42:17.123",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:30:21.263",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in code-projects Fighting Cock Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/action/new-father.php. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250573 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en code-projects Fighting Cock Information System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/action/new-father.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento image conduce a una carga sin restricciones. El ataque se puede lanzar de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-250573."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -60,6 +84,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -71,18 +105,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:fighting_cock_information_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0249E06A-469D-4F3E-9BDE-0A0EC6B58056"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BxYQ/vul/blob/main/FIGHTING_COCK_INFORMATION_SYSTEM_File9docx.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.250573",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.250573",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-0469",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-12T21:15:10.573",
"lastModified": "2024-01-14T21:42:17.123",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:29:59.303",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Human Resource Integrated System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file update_personal_info.php. The manipulation of the argument sex leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250574 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en code-projects Human Resource Integrated System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo update_personal_info.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento sex conduce a la inyecci\u00f3n SQL. El ataque puede lanzarse de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. VDB-250574 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -71,18 +95,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:human_resource_integrated_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5938CA79-F046-4802-A059-D3CADDB7680B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/yingqian1984/FirePunch/blob/main/11-Human%20Resource%20Integrated%20System%20has%20SQL%20injection%20vulnerabilities%20update_personal_info.php.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.250574",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.250574",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-0470",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-12T21:15:10.800",
"lastModified": "2024-01-14T21:42:17.123",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:27:01.340",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Human Resource Integrated System 1.0. It has been classified as critical. This affects an unknown part of the file /admin_route/inc_service_credits.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250575."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Human Resource Integrated System 1.0. Ha sido clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo /admin_route/inc_service_credits.php. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-250575."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -71,18 +95,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:human_resource_integrated_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97ADC395-708B-46E6-9FDB-B97645F44831"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/yingqian1984/FirePunch/blob/main/11-Human%20Resource%20Integrated%20System%20has%20SQL%20injection%20vulnerabilities%20inc_service_credits.php.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.250575",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.250575",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-0471",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-12T21:15:11.050",
"lastModified": "2024-01-14T21:42:17.123",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T18:27:15.440",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Human Resource Integrated System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin_route/dec_service_credits.php. The manipulation of the argument date leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250576."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Human Resource Integrated System 1.0. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin_route/dec_service_credits.php. La manipulaci\u00f3n del argumento date conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-250576."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -71,18 +95,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:human_resource_integrated_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97ADC395-708B-46E6-9FDB-B97645F44831"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/yingqian1984/FirePunch/blob/main/11-Human%20Resource%20Integrated%20System%20has%20SQL%20injection%20vulnerabilities%20dec_service_credits.php.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.250576",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.250576",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0639",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-17T16:15:46.810",
"lastModified": "2024-01-17T16:15:46.810",
"vulnStatus": "Received",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0641",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-17T16:15:47.003",
"lastModified": "2024-01-17T16:15:47.003",
"vulnStatus": "Received",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0642",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-17T14:15:43.470",
"lastModified": "2024-01-17T14:15:43.470",
"vulnStatus": "Received",
"lastModified": "2024-01-17T17:35:08.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0643",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-17T14:15:43.920",
"lastModified": "2024-01-17T14:15:43.920",
"vulnStatus": "Received",
"lastModified": "2024-01-17T17:35:08.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0645",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-17T14:15:44.113",
"lastModified": "2024-01-17T14:15:44.113",
"vulnStatus": "Received",
"lastModified": "2024-01-17T17:35:08.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0646",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-17T16:15:47.190",
"lastModified": "2024-01-17T16:15:47.190",
"vulnStatus": "Received",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20251",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-01-17T17:15:11.350",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ISE-XSS-bL4VTML",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20270",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-01-17T17:15:11.627",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-6syj82Ju",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20272",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-01-17T17:15:12.130",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Unity Connection could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system and execute commands on the underlying operating system. This vulnerability is due to a lack of authentication in a specific API and improper validation of user-supplied data. An attacker could exploit this vulnerability by uploading arbitrary files to an affected system. A successful exploit could allow the attacker to store malicious files on the system, execute arbitrary commands on the operating system, and elevate privileges to root."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuc-unauth-afu-FROYsCsD",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20277",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-01-17T17:15:12.300",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands and elevate privileges to root."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thouseyes-privesc-DmzHG3Qv",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20287",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-01-17T17:15:12.467",
"lastModified": "2024-01-17T17:35:02.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of the Cisco WAP371 Wireless-AC/N Dual Radio Access Point (AP) with Single Point Setup could allow an authenticated, remote attacker to perform command injection attacks against an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the device. To exploit this vulnerability, the attacker must have valid administrative credentials for the device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-bHStWgXO",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-20653",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-01-09T18:15:47.940",
"lastModified": "2024-01-09T19:56:14.023",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T17:04:25.387",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Common Log File System Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios del sistema de archivos de registro com\u00fan de Microsoft"
}
],
"metrics": {
@ -34,10 +38,187 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20402",
"matchCriteriaId": "46ABD897-272E-49BD-BCD1-79EA0908349D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.10240.20402",
"matchCriteriaId": "B85886E7-0E67-4BBD-9E42-4507DF422BCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.6614",
"matchCriteriaId": "1301CF7B-D772-4AAA-BFF2-88BF493A324E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.6614",
"matchCriteriaId": "DDEB129C-34A6-47E5-A652-51FCE0A3A880"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.17763.5329",
"matchCriteriaId": "F0470D92-707F-4073-886A-ECDC4F2E1CAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.5329",
"matchCriteriaId": "9C150F7E-8967-4AB8-8DF8-EBC89A10D554"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.5329",
"matchCriteriaId": "A7997F10-4040-4664-B55E-0039E25B4F79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.19044.3930",
"matchCriteriaId": "C541A6B6-7D07-4EA9-89FF-81D815A9476F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19044.3930",
"matchCriteriaId": "5BFCE595-C6A9-4F10-9EC7-58C1D66BB436"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19044.3930",
"matchCriteriaId": "A49993E0-2369-48E3-A925-6405722F1A19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.19045.3930",
"matchCriteriaId": "5D738639-84ED-4215-82F1-7D94D68D3396"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19045.3930",
"matchCriteriaId": "047947E7-B85E-4D6A-9B92-E39E4828206E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19045.3930",
"matchCriteriaId": "45296209-531C-48D1-84DA-FAD9E28E7999"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22000.2713",
"matchCriteriaId": "6FA472E2-4501-4597-9979-796258111DA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22000.2713",
"matchCriteriaId": "0F377DD9-2DBF-4202-AF3F-6AC6A809F4E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22621.3007",
"matchCriteriaId": "C48178EC-BDEE-4F78-BCFB-B125F5CA0A9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22621.3007",
"matchCriteriaId": "04C81079-1855-4F8C-A9E2-3E2CC796C4F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22631.3007",
"matchCriteriaId": "91F6049F-03C1-494C-8AA1-6DE27D335139"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22631.3007",
"matchCriteriaId": "A00CE59A-0762-4AA4-99DA-5C9545F85666"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20653",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-20656",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-01-09T18:15:48.490",
"lastModified": "2024-01-09T19:56:14.023",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T17:22:25.503",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Visual Studio Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Visual Studio"
}
],
"metrics": {
@ -34,10 +38,78 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*",
"matchCriteriaId": "62FE95C2-066B-491D-82BF-3EF173822B2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.9.59",
"matchCriteriaId": "8A3FE761-3245-4763-9FC8-FA81B2AFC945"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0",
"versionEndExcluding": "16.11.33",
"matchCriteriaId": "EEAEA929-9BCB-463F-BFD7-E56E9BEB8AB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.2",
"versionEndExcluding": "17.2.23",
"matchCriteriaId": "05D999A1-AB25-4642-8D94-07AD00FEE820"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.4",
"versionEndExcluding": "17.4.15",
"matchCriteriaId": "AE1C61FB-CC6B-4D88-8B7F-FFE9D1238A6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.6",
"versionEndExcluding": "17.6.11",
"matchCriteriaId": "7CA9C0A3-7D62-40CE-8493-514CB313F72C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20656",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-20657",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-01-09T18:15:48.670",
"lastModified": "2024-01-09T19:56:14.023",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T17:28:35.963",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Windows Group Policy Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios en la pol\u00edtica de grupo de Windows"
}
],
"metrics": {
@ -34,10 +38,187 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20402",
"matchCriteriaId": "46ABD897-272E-49BD-BCD1-79EA0908349D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.10240.20402",
"matchCriteriaId": "B85886E7-0E67-4BBD-9E42-4507DF422BCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.6614",
"matchCriteriaId": "1301CF7B-D772-4AAA-BFF2-88BF493A324E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.6614",
"matchCriteriaId": "DDEB129C-34A6-47E5-A652-51FCE0A3A880"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.17763.5329",
"matchCriteriaId": "F0470D92-707F-4073-886A-ECDC4F2E1CAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.5329",
"matchCriteriaId": "9C150F7E-8967-4AB8-8DF8-EBC89A10D554"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.5329",
"matchCriteriaId": "A7997F10-4040-4664-B55E-0039E25B4F79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.19044.3930",
"matchCriteriaId": "C541A6B6-7D07-4EA9-89FF-81D815A9476F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19044.3930",
"matchCriteriaId": "5BFCE595-C6A9-4F10-9EC7-58C1D66BB436"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19044.3930",
"matchCriteriaId": "A49993E0-2369-48E3-A925-6405722F1A19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.19045.3930",
"matchCriteriaId": "5D738639-84ED-4215-82F1-7D94D68D3396"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19045.3930",
"matchCriteriaId": "047947E7-B85E-4D6A-9B92-E39E4828206E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19045.3930",
"matchCriteriaId": "45296209-531C-48D1-84DA-FAD9E28E7999"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22000.2713",
"matchCriteriaId": "6FA472E2-4501-4597-9979-796258111DA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22000.2713",
"matchCriteriaId": "0F377DD9-2DBF-4202-AF3F-6AC6A809F4E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22621.3007",
"matchCriteriaId": "C48178EC-BDEE-4F78-BCFB-B125F5CA0A9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22621.3007",
"matchCriteriaId": "04C81079-1855-4F8C-A9E2-3E2CC796C4F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22631.3007",
"matchCriteriaId": "91F6049F-03C1-494C-8AA1-6DE27D335139"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22631.3007",
"matchCriteriaId": "A00CE59A-0762-4AA4-99DA-5C9545F85666"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20657",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,18 +2,22 @@
"id": "CVE-2024-20714",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-01-10T13:15:49.703",
"lastModified": "2024-01-10T13:56:00.697",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T17:31:11.130",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
},
{
"lang": "es",
"value": "Las versiones 2.1.3 y anteriores de Adobe Substance 3D Stager se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -31,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -46,10 +70,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.1.3",
"matchCriteriaId": "2CA28535-8EC9-4966-B508-00F187105C3D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-06.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,18 +2,22 @@
"id": "CVE-2024-20715",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-01-10T13:15:49.900",
"lastModified": "2024-01-10T13:56:00.697",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-17T17:33:43.200",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
},
{
"lang": "es",
"value": "Las versiones 2.1.3 y anteriores de Adobe Substance 3D Stager se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -31,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -46,10 +70,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.1.3",
"matchCriteriaId": "2CA28535-8EC9-4966-B508-00F187105C3D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-06.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-22714",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-17T18:15:45.410",
"lastModified": "2024-01-17T18:15:45.410",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stupid Simple CMS <=1.2.4 is vulnerable to Cross Site Scripting (XSS) in the editing section of the article content."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/RumblingIsOccupied/cms/blob/main/2.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-22715",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-17T18:15:45.457",
"lastModified": "2024-01-17T18:15:45.457",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stupid Simple CMS <=1.2.4 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin-edit.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/RumblingIsOccupied/cms/blob/main/1.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-01-17T17:00:25.501586+00:00
2024-01-17T19:00:25.032103+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-01-17T16:15:47.190000+00:00
2024-01-17T18:52:03.727000+00:00
```
### Last Data Feed Release
@ -29,54 +29,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
236218
236238
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `20`
* [CVE-2022-36418](CVE-2022/CVE-2022-364xx/CVE-2022-36418.json) (`2024-01-17T16:15:45.817`)
* [CVE-2022-38141](CVE-2022/CVE-2022-381xx/CVE-2022-38141.json) (`2024-01-17T16:15:46.033`)
* [CVE-2022-40203](CVE-2022/CVE-2022-402xx/CVE-2022-40203.json) (`2024-01-17T16:15:46.230`)
* [CVE-2023-5006](CVE-2023/CVE-2023-50xx/CVE-2023-5006.json) (`2024-01-17T15:15:10.803`)
* [CVE-2023-5041](CVE-2023/CVE-2023-50xx/CVE-2023-5041.json) (`2024-01-17T15:15:10.850`)
* [CVE-2023-34379](CVE-2023/CVE-2023-343xx/CVE-2023-34379.json) (`2024-01-17T16:15:46.427`)
* [CVE-2024-0396](CVE-2024/CVE-2024-03xx/CVE-2024-0396.json) (`2024-01-17T16:15:46.623`)
* [CVE-2024-0639](CVE-2024/CVE-2024-06xx/CVE-2024-0639.json) (`2024-01-17T16:15:46.810`)
* [CVE-2024-0641](CVE-2024/CVE-2024-06xx/CVE-2024-0641.json) (`2024-01-17T16:15:47.003`)
* [CVE-2024-0646](CVE-2024/CVE-2024-06xx/CVE-2024-0646.json) (`2024-01-17T16:15:47.190`)
* [CVE-2022-40702](CVE-2022/CVE-2022-407xx/CVE-2022-40702.json) (`2024-01-17T17:15:09.120`)
* [CVE-2022-41619](CVE-2022/CVE-2022-416xx/CVE-2022-41619.json) (`2024-01-17T17:15:09.333`)
* [CVE-2022-41695](CVE-2022/CVE-2022-416xx/CVE-2022-41695.json) (`2024-01-17T17:15:09.550`)
* [CVE-2022-41990](CVE-2022/CVE-2022-419xx/CVE-2022-41990.json) (`2024-01-17T17:15:09.757`)
* [CVE-2022-41786](CVE-2022/CVE-2022-417xx/CVE-2022-41786.json) (`2024-01-17T18:15:45.000`)
* [CVE-2022-41790](CVE-2022/CVE-2022-417xx/CVE-2022-41790.json) (`2024-01-17T18:15:45.207`)
* [CVE-2023-20257](CVE-2023/CVE-2023-202xx/CVE-2023-20257.json) (`2024-01-17T17:15:09.960`)
* [CVE-2023-20258](CVE-2023/CVE-2023-202xx/CVE-2023-20258.json) (`2024-01-17T17:15:10.147`)
* [CVE-2023-20260](CVE-2023/CVE-2023-202xx/CVE-2023-20260.json) (`2024-01-17T17:15:10.323`)
* [CVE-2023-20271](CVE-2023/CVE-2023-202xx/CVE-2023-20271.json) (`2024-01-17T17:15:10.540`)
* [CVE-2023-23882](CVE-2023/CVE-2023-238xx/CVE-2023-23882.json) (`2024-01-17T17:15:10.720`)
* [CVE-2023-23896](CVE-2023/CVE-2023-238xx/CVE-2023-23896.json) (`2024-01-17T17:15:10.913`)
* [CVE-2023-50950](CVE-2023/CVE-2023-509xx/CVE-2023-50950.json) (`2024-01-17T17:15:11.143`)
* [CVE-2024-20251](CVE-2024/CVE-2024-202xx/CVE-2024-20251.json) (`2024-01-17T17:15:11.350`)
* [CVE-2024-20270](CVE-2024/CVE-2024-202xx/CVE-2024-20270.json) (`2024-01-17T17:15:11.627`)
* [CVE-2024-20272](CVE-2024/CVE-2024-202xx/CVE-2024-20272.json) (`2024-01-17T17:15:12.130`)
* [CVE-2024-20277](CVE-2024/CVE-2024-202xx/CVE-2024-20277.json) (`2024-01-17T17:15:12.300`)
* [CVE-2024-20287](CVE-2024/CVE-2024-202xx/CVE-2024-20287.json) (`2024-01-17T17:15:12.467`)
* [CVE-2024-22714](CVE-2024/CVE-2024-227xx/CVE-2024-22714.json) (`2024-01-17T18:15:45.410`)
* [CVE-2024-22715](CVE-2024/CVE-2024-227xx/CVE-2024-22715.json) (`2024-01-17T18:15:45.457`)
### CVEs modified in the last Commit
Recently modified CVEs: `40`
Recently modified CVEs: `53`
* [CVE-2023-5376](CVE-2023/CVE-2023-53xx/CVE-2023-5376.json) (`2024-01-17T15:05:39.563`)
* [CVE-2023-49810](CVE-2023/CVE-2023-498xx/CVE-2023-49810.json) (`2024-01-17T15:07:26.067`)
* [CVE-2023-49738](CVE-2023/CVE-2023-497xx/CVE-2023-49738.json) (`2024-01-17T15:08:28.850`)
* [CVE-2023-38022](CVE-2023/CVE-2023-380xx/CVE-2023-38022.json) (`2024-01-17T15:09:09.537`)
* [CVE-2023-49715](CVE-2023/CVE-2023-497xx/CVE-2023-49715.json) (`2024-01-17T15:14:14.103`)
* [CVE-2023-49599](CVE-2023/CVE-2023-495xx/CVE-2023-49599.json) (`2024-01-17T15:14:39.320`)
* [CVE-2023-21830](CVE-2023/CVE-2023-218xx/CVE-2023-21830.json) (`2024-01-17T15:15:10.047`)
* [CVE-2023-21835](CVE-2023/CVE-2023-218xx/CVE-2023-21835.json) (`2024-01-17T15:15:10.157`)
* [CVE-2023-21843](CVE-2023/CVE-2023-218xx/CVE-2023-21843.json) (`2024-01-17T15:15:10.240`)
* [CVE-2023-45229](CVE-2023/CVE-2023-452xx/CVE-2023-45229.json) (`2024-01-17T15:15:10.330`)
* [CVE-2023-45230](CVE-2023/CVE-2023-452xx/CVE-2023-45230.json) (`2024-01-17T15:15:10.400`)
* [CVE-2023-45231](CVE-2023/CVE-2023-452xx/CVE-2023-45231.json) (`2024-01-17T15:15:10.470`)
* [CVE-2023-45232](CVE-2023/CVE-2023-452xx/CVE-2023-45232.json) (`2024-01-17T15:15:10.540`)
* [CVE-2023-45233](CVE-2023/CVE-2023-452xx/CVE-2023-45233.json) (`2024-01-17T15:15:10.610`)
* [CVE-2023-45234](CVE-2023/CVE-2023-452xx/CVE-2023-45234.json) (`2024-01-17T15:15:10.670`)
* [CVE-2023-45235](CVE-2023/CVE-2023-452xx/CVE-2023-45235.json) (`2024-01-17T15:15:10.737`)
* [CVE-2023-49589](CVE-2023/CVE-2023-495xx/CVE-2023-49589.json) (`2024-01-17T15:16:26.823`)
* [CVE-2023-38021](CVE-2023/CVE-2023-380xx/CVE-2023-38021.json) (`2024-01-17T15:17:38.897`)
* [CVE-2023-48730](CVE-2023/CVE-2023-487xx/CVE-2023-48730.json) (`2024-01-17T15:17:52.480`)
* [CVE-2023-48728](CVE-2023/CVE-2023-487xx/CVE-2023-48728.json) (`2024-01-17T15:19:11.497`)
* [CVE-2023-47862](CVE-2023/CVE-2023-478xx/CVE-2023-47862.json) (`2024-01-17T15:21:15.080`)
* [CVE-2023-47861](CVE-2023/CVE-2023-478xx/CVE-2023-47861.json) (`2024-01-17T15:21:57.430`)
* [CVE-2023-47171](CVE-2023/CVE-2023-471xx/CVE-2023-47171.json) (`2024-01-17T15:22:38.970`)
* [CVE-2023-45139](CVE-2023/CVE-2023-451xx/CVE-2023-45139.json) (`2024-01-17T15:36:52.233`)
* [CVE-2024-21907](CVE-2024/CVE-2024-219xx/CVE-2024-21907.json) (`2024-01-17T15:24:07.360`)
* [CVE-2023-52030](CVE-2023/CVE-2023-520xx/CVE-2023-52030.json) (`2024-01-17T18:25:43.917`)
* [CVE-2023-52029](CVE-2023/CVE-2023-520xx/CVE-2023-52029.json) (`2024-01-17T18:26:18.677`)
* [CVE-2023-52028](CVE-2023/CVE-2023-520xx/CVE-2023-52028.json) (`2024-01-17T18:26:49.623`)
* [CVE-2023-40393](CVE-2023/CVE-2023-403xx/CVE-2023-40393.json) (`2024-01-17T18:30:39.897`)
* [CVE-2023-6583](CVE-2023/CVE-2023-65xx/CVE-2023-6583.json) (`2024-01-17T18:42:13.750`)
* [CVE-2023-6582](CVE-2023/CVE-2023-65xx/CVE-2023-6582.json) (`2024-01-17T18:45:11.677`)
* [CVE-2023-6567](CVE-2023/CVE-2023-65xx/CVE-2023-6567.json) (`2024-01-17T18:46:59.213`)
* [CVE-2023-40433](CVE-2023/CVE-2023-404xx/CVE-2023-40433.json) (`2024-01-17T18:52:03.727`)
* [CVE-2024-20653](CVE-2024/CVE-2024-206xx/CVE-2024-20653.json) (`2024-01-17T17:04:25.387`)
* [CVE-2024-20656](CVE-2024/CVE-2024-206xx/CVE-2024-20656.json) (`2024-01-17T17:22:25.503`)
* [CVE-2024-20657](CVE-2024/CVE-2024-206xx/CVE-2024-20657.json) (`2024-01-17T17:28:35.963`)
* [CVE-2024-20714](CVE-2024/CVE-2024-207xx/CVE-2024-20714.json) (`2024-01-17T17:31:11.130`)
* [CVE-2024-20715](CVE-2024/CVE-2024-207xx/CVE-2024-20715.json) (`2024-01-17T17:33:43.200`)
* [CVE-2024-0396](CVE-2024/CVE-2024-03xx/CVE-2024-0396.json) (`2024-01-17T17:35:02.713`)
* [CVE-2024-0639](CVE-2024/CVE-2024-06xx/CVE-2024-0639.json) (`2024-01-17T17:35:02.713`)
* [CVE-2024-0641](CVE-2024/CVE-2024-06xx/CVE-2024-0641.json) (`2024-01-17T17:35:02.713`)
* [CVE-2024-0646](CVE-2024/CVE-2024-06xx/CVE-2024-0646.json) (`2024-01-17T17:35:02.713`)
* [CVE-2024-0642](CVE-2024/CVE-2024-06xx/CVE-2024-0642.json) (`2024-01-17T17:35:08.140`)
* [CVE-2024-0643](CVE-2024/CVE-2024-06xx/CVE-2024-0643.json) (`2024-01-17T17:35:08.140`)
* [CVE-2024-0645](CVE-2024/CVE-2024-06xx/CVE-2024-0645.json) (`2024-01-17T17:35:08.140`)
* [CVE-2024-0389](CVE-2024/CVE-2024-03xx/CVE-2024-0389.json) (`2024-01-17T17:35:31.857`)
* [CVE-2024-0470](CVE-2024/CVE-2024-04xx/CVE-2024-0470.json) (`2024-01-17T18:27:01.340`)
* [CVE-2024-0471](CVE-2024/CVE-2024-04xx/CVE-2024-0471.json) (`2024-01-17T18:27:15.440`)
* [CVE-2024-0469](CVE-2024/CVE-2024-04xx/CVE-2024-0469.json) (`2024-01-17T18:29:59.303`)
* [CVE-2024-0468](CVE-2024/CVE-2024-04xx/CVE-2024-0468.json) (`2024-01-17T18:30:21.263`)
## Download and Usage