Auto-Update: 2023-09-14T18:00:25.485222+00:00

This commit is contained in:
cad-safe-bot 2023-09-14 18:00:29 +00:00
parent a10b6047b9
commit f599103e96
52 changed files with 4812 additions and 256 deletions

View File

@ -2,19 +2,143 @@
"id": "CVE-2014-5329",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-08T03:15:07.387",
"lastModified": "2023-09-08T12:58:39.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:12:01.977",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "GIGAPOD file servers (Appliance model and Software model) provide two web interfaces, 80/tcp and 443/tcp for user operation, and 8001/tcp for administrative operation.\r\n8001/tcp is served by a version of Apache HTTP server containing a flaw in handling HTTP requests (CVE-2011-3192), which may lead to a denial-of-service (DoS) condition."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tripodworks:gigapod_officehard_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.04.03",
"matchCriteriaId": "AB7A1124-19E8-41C7-AC57-2DBCC5D16D86"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tripodworks:gigapod_officehard:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AC5BBBD-0779-43CC-A0F6-9BA62B331691"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tripodworks:gigapod_2010_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.01.02",
"matchCriteriaId": "49F0663C-C397-4788-836E-0EB810270EA9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tripodworks:gigapod_2010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03E7B57D-B3FB-4E60-9B0A-C6D6FDE4BC54"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tripodworks:gigapod_3_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.01.02",
"matchCriteriaId": "DFA2BF10-37C5-4B86-8572-ABB87AF6018B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tripodworks:gigapod_3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BD9132E-0CB0-4F39-A156-35FE958A6129"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN23809730/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2016-2124",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-02-18T18:15:08.237",
"lastModified": "2022-02-25T16:28:59.887",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-14T17:15:09.967",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -368,6 +368,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html",
"source": "secalert@redhat.com"
},
{
"url": "https://www.samba.org/samba/security/CVE-2016-2124.html",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-20396",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-12-23T21:29:01.280",
"lastModified": "2019-10-03T00:03:26.223",
"lastModified": "2023-09-14T16:09:17.943",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:net-wave:ming2120j_firmware:5.76.1006c:*:*:*:*:*:*:*",
"matchCriteriaId": "0991F4E3-9EB9-4A5C-A91D-8114F9C6918C"
"criteria": "cpe:2.3:o:telaum:ming2120j_firmware:5.76.1006c:*:*:*:*:*:*:*",
"matchCriteriaId": "43019ED6-7E32-414C-9EB5-E59AF9ED8110"
}
]
},
@ -96,8 +96,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:net-wave:ming2120j:4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "50995EFB-6E7D-4BF7-A68F-59A7FCE61E7D"
"criteria": "cpe:2.3:h:telaum:ming2120j:4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2F0A54C3-BD5D-4893-AC66-661D3F234FA2"
}
]
}
@ -112,8 +112,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:net-wave:ming6300_firmware:5.83.6305jrc2:*:*:*:*:*:*:*",
"matchCriteriaId": "FC32F055-7801-4041-AC62-3219B03C51B3"
"criteria": "cpe:2.3:o:telaum:ming6300_firmware:5.83.6305jrc2:*:*:*:*:*:*:*",
"matchCriteriaId": "A709E6A9-0E67-4E6E-B3E7-2A66F2EB9E31"
}
]
},
@ -123,8 +123,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:net-wave:ming6300:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "127E067B-7F60-4E7F-809F-9558912B230A"
"criteria": "cpe:2.3:h:telaum:ming6300:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8966966-864C-43D1-8125-CC4293303246"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-10218",
"sourceIdentifier": "secalert@redhat.com",
"published": "2019-11-06T10:15:10.607",
"lastModified": "2021-05-29T13:15:07.383",
"lastModified": "2023-09-14T17:15:10.470",
"vulnStatus": "Modified",
"descriptions": [
{
@ -87,7 +87,7 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -97,7 +97,7 @@
]
},
{
"source": "nvd@nist.gov",
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
@ -179,6 +179,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-14833",
"sourceIdentifier": "secalert@redhat.com",
"published": "2019-11-06T10:15:10.793",
"lastModified": "2021-05-29T13:15:07.557",
"lastModified": "2023-09-14T17:15:10.667",
"vulnStatus": "Modified",
"descriptions": [
{
@ -87,22 +87,22 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-305"
"value": "CWE-521"
}
]
},
{
"source": "nvd@nist.gov",
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-521"
"value": "CWE-305"
}
]
}
@ -192,6 +192,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-14847",
"sourceIdentifier": "secalert@redhat.com",
"published": "2019-11-06T10:15:10.933",
"lastModified": "2021-05-29T13:15:07.640",
"lastModified": "2023-09-14T17:15:10.797",
"vulnStatus": "Modified",
"descriptions": [
{
@ -87,7 +87,7 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -97,7 +97,7 @@
]
},
{
"source": "nvd@nist.gov",
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
@ -178,6 +178,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/",
"source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-14902",
"sourceIdentifier": "secalert@redhat.com",
"published": "2020-01-21T18:15:12.653",
"lastModified": "2022-08-29T19:43:14.370",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-14T17:15:10.923",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -87,22 +87,22 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "nvd@nist.gov",
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-284"
}
]
}
@ -213,6 +213,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/",
"source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-14907",
"sourceIdentifier": "secalert@redhat.com",
"published": "2020-01-21T18:15:12.717",
"lastModified": "2022-11-16T03:07:29.893",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-14T17:15:11.097",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -87,7 +87,7 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -97,7 +97,7 @@
]
},
{
"source": "nvd@nist.gov",
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
@ -274,6 +274,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-16470",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-11T14:15:07.740",
"lastModified": "2023-09-14T03:45:04.547",
"lastModified": "2023-09-14T16:40:57.590",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -17,19 +17,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-16471",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-11T14:15:07.887",
"lastModified": "2023-09-14T03:41:51.240",
"lastModified": "2023-09-14T16:41:01.967",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -17,19 +17,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19344",
"sourceIdentifier": "secalert@redhat.com",
"published": "2020-01-21T18:15:12.937",
"lastModified": "2020-03-25T19:15:15.573",
"lastModified": "2023-09-14T17:15:11.250",
"vulnStatus": "Modified",
"descriptions": [
{
@ -231,6 +231,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/",
"source": "secalert@redhat.com"

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20569",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-08-08T18:15:11.530",
"lastModified": "2023-08-27T03:15:12.547",
"vulnStatus": "Modified",
"lastModified": "2023-09-14T17:42:52.950",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,19 +17,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
@ -4073,7 +4073,10 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/",
@ -4093,7 +4096,8 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/",
"source": "psirt@amd.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-23451",
"sourceIdentifier": "psirt@sick.de",
"published": "2023-04-19T23:15:06.970",
"lastModified": "2023-05-04T15:24:37.877",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-14T17:15:11.450",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The Flexi Classic and Flexi Soft Gateways SICK UE410-EN3 FLEXI ETHERNET GATEW., SICK UE410-EN1 FLEXI ETHERNET GATEW., SICK UE410-EN3S04 FLEXI ETHERNET GATEW., SICK UE410-EN4 FLEXI ETHERNET GATEW., SICK FX0-GENT00000 FLEXISOFT EIP GATEW., SICK FX0-GMOD00000 FLEXISOFT MOD GATEW., SICK FX0-GPNT00000 FLEXISOFT PNET GATEW., SICK FX0-GENT00030 FLEXISOFT EIP GATEW.V2, SICK FX0-GPNT00030 FLEXISOFT PNET GATEW.V2 and SICK FX0-GMOD00010 FLEXISOFT MOD GW. have Telnet enabled by factory default. No password is set in the default configuration. Gateways with a serial number >2311xxxx have the Telnet interface disabled by factory default."
"value": "The Flexi Classic and Flexi Soft Gateways SICK UE410-EN3 FLEXI ETHERNET GATEW. with serial number <=2311xxxx all Firmware versions, SICK UE410-EN1 FLEXI ETHERNET GATEW. with serial number <=2311xxxx all Firmware versions, SICK UE410-EN3S04 FLEXI ETHERNET GATEW. with serial number <=2311xxxx all Firmware versions, SICK UE410-EN4 FLEXI ETHERNET GATEW. with serial number <=2311xxxx all Firmware versions, SICK FX0-GENT00000 FLEXISOFT EIP GATEW. with serial number <=2311xxxx with Firmware <=V2.11.0, SICK FX0-GMOD00000 FLEXISOFT MOD GATEW. with serial number <=2311xxxx with Firmware <=V2.11.0, SICK FX0-GPNT00000 FLEXISOFT PNET GATEW. with serial number <=2311xxxx with Firmware <=V2.12.0, SICK FX0-GENT00030 FLEXISOFT EIP GATEW.V2 with serial number <=2311xxxx all Firmware versions, SICK FX0-GPNT00030 FLEXISOFT PNET GATEW.V2 with serial number <=2311xxxx all Firmware versions and SICK FX0-GMOD00010 FLEXISOFT MOD GW with serial number <=2311xxxx with Firmware <=V2.11.0 all have Telnet enabled by factory default. No password is set in the default configuration."
}
],
"metrics": {

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-25519",
"sourceIdentifier": "9576f279-3576-44b5-a4af-b9a8644b2de6",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-09-12T02:15:10.173",
"lastModified": "2023-09-12T11:52:05.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:43:33.853",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,27 @@
"metrics": {
"cvssMetricV31": [
{
"source": "9576f279-3576-44b5-a4af-b9a8644b2de6",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -36,7 +56,17 @@
},
"weaknesses": [
{
"source": "9576f279-3576-44b5-a4af-b9a8644b2de6",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
@ -46,10 +76,134 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nvidia:bluefield_1_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.24.1000",
"matchCriteriaId": "C650DAD0-9A63-45B7-BDEF-7CCB3B1256FF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nvidia:bluefield_1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "485AAB91-2835-4ABF-BBA9-647F73111358"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nvidia:bluefield_2_lts_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.35.3006",
"matchCriteriaId": "6E192997-A07E-4D32-A164-E82F6F3302DE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nvidia:bluefield_2_lts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A755B8-4FF4-4209-9E49-580159B9DFC7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nvidia:bluefield_2_ga_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.38.1002",
"matchCriteriaId": "53E136D7-66BB-49E1-A9E2-7E1B58A74ABA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nvidia:bluefield_2_ga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC213CA8-C172-4AB5-B66B-A5C71F470F33"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nvidia:bluefield_3_ga_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "32.38.1002",
"matchCriteriaId": "82957F72-C974-4407-AC3F-10F6678AF0F2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nvidia:bluefield_3_ga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1A941D7-49CE-49DA-A730-71C598D11EE9"
}
]
}
]
}
],
"references": [
{
"url": "https://https://nvidia.custhelp.com/app/answers/detail/a_id/5479",
"source": "9576f279-3576-44b5-a4af-b9a8644b2de6"
"source": "psirt@nvidia.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5479",
"source": "nvd@nist.gov",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28252",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-11T21:15:25.137",
"lastModified": "2023-04-13T01:10:18.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-14T16:15:08.110",
"vulnStatus": "Modified",
"cisaExploitAdd": "2023-04-11",
"cisaActionDue": "2023-05-02",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -146,6 +146,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174668/Windows-Common-Log-File-System-Driver-clfs.sys-Privilege-Escalation.html",
"source": "secure@microsoft.com"
},
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252",
"source": "secure@microsoft.com",

View File

@ -2,23 +2,86 @@
"id": "CVE-2023-31468",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-11T19:15:42.173",
"lastModified": "2023-09-12T11:52:22.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:58:23.067",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Inosoft VisiWin 7 through 2022-2.1 (Runtime RT7.3 RC3 20221209.5). The \"%PROGRAMFILES(X86)%\\INOSOFT GmbH\" folder has weak permissions for Everyone, allowing an attacker to insert a Trojan horse file that runs as SYSTEM."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:inosoft:visiwin_7:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2022-2.1",
"matchCriteriaId": "8F58B8AF-3831-4081-BCE6-70F394DB5DEC"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174268/Inosoft-VisiWin-7-2022-2.1-Insecure-Permissions-Privilege-Escalation.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/51682",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33136",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:09.353",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:50:15.443",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,63 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:azure_devops_server:2019.0.1:-:*:*:*:*:*:*",
"matchCriteriaId": "FD677E75-F110-4C20-A408-0F0620D468BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:azure_devops_server:2019.1.2:-:*:*:*:*:*:*",
"matchCriteriaId": "E47C8F7E-E085-4C8C-A522-687F9B2C7B34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:azure_devops_server:2020.0.2:-:*:*:*:*:*:*",
"matchCriteriaId": "ABF9F2EE-7A4F-4FEC-BF7A-6574B173F3D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:azure_devops_server:2020.1.2:-:*:*:*:*:*:*",
"matchCriteriaId": "A8F7E9F3-B3DC-4161-AA99-DF4E17599868"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:azure_devops_server:2022.0.1:-:*:*:*:*:*:*",
"matchCriteriaId": "890F7135-DCF3-40A6-9FFE-F048EE7E1565"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33136",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34041",
"sourceIdentifier": "security@vmware.com",
"published": "2023-09-08T08:15:07.493",
"lastModified": "2023-09-08T12:58:39.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:12:21.513",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -34,10 +54,49 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*",
"versionEndExcluding": "32.4.0",
"matchCriteriaId": "3FCD5A21-A021-401A-BC00-19F2B47B3B0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudfoundry:routing-release:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.278.0",
"matchCriteriaId": "C38EECC5-AEC7-4D60-8A19-B2191F4D6BE8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cloudfoundry.org/blog/abuse-of-http-hop-by-hop-headers-in-cloud-foundry-gorouter/",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-36250",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-14T17:15:11.643",
"lastModified": "2023-09-14T17:15:11.643",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CSV Injection vulnerability in GNOME time tracker version 3.0.2, allows local attackers to execute arbitrary code via crafted .tsv file when creating a new record."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/BrunoTeixeira1996/CVE-2023-36250/blob/main/README.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36739",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:09.893",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:57:29.203",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:3d_viewer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2307.27042.0",
"matchCriteriaId": "56BF1D42-3F03-4F6E-A71E-9CE508F2D812"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36739",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36740",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:10.093",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:55:23.760",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:3d_viewer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2306.12012.0",
"matchCriteriaId": "857DAE71-5053-4037-85E8-2B439D6B3E00"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36740",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36742",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:10.317",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:52:48.600",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.82.1",
"matchCriteriaId": "31ED7CD7-C40A-4F62-A181-B2B833F167A0"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36742",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,23 +2,81 @@
"id": "CVE-2023-36980",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-11T14:15:09.183",
"lastModified": "2023-09-11T14:26:36.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:59:14.567",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue in Ethereum Blockchain v0.1.1+commit.6ff4cd6 cause the balance to be zeroed out when the value of betsize+casino.balance exceeds the threshold."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereum:blockchain:0.1.1\\+commit.6ff4cd6:*:*:*:*:*:*:*",
"matchCriteriaId": "07399D1F-64DE-4C35-B7FB-16F648EC02B8"
}
]
}
]
}
],
"references": [
{
"url": "https://etherscan.io/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/WayneLi12/CVEs/tree/master/CVE-2023-36980",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-38070",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:27.460",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:44:11.617",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +46,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.3.0.1",
"matchCriteriaId": "2ABFF8F6-AB75-4EB4-AA59-D297EA29B4D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.3.0",
"versionEndExcluding": "13.4.0.12",
"matchCriteriaId": "88242224-85E8-4F7B-8AF3-D5CFDBE741BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.1.0.11",
"matchCriteriaId": "B0A2FCDD-F71A-4AE1-B969-55B7A0D0DF0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.2",
"versionEndExcluding": "14.2.0.6",
"matchCriteriaId": "7E1EFF45-5311-4E89-B736-271EF3C0C232"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.3",
"versionEndExcluding": "14.3.0.1",
"matchCriteriaId": "5F7641A6-5EF6-4258-A7E0-87CC180B30F0"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-38071",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:27.767",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:44:28.447",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -31,13 +31,43 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,10 +76,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.3.0.1",
"matchCriteriaId": "2ABFF8F6-AB75-4EB4-AA59-D297EA29B4D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.3.0",
"versionEndExcluding": "13.4.0.12",
"matchCriteriaId": "88242224-85E8-4F7B-8AF3-D5CFDBE741BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.1.0.11",
"matchCriteriaId": "B0A2FCDD-F71A-4AE1-B969-55B7A0D0DF0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.2",
"versionEndExcluding": "14.2.0.6",
"matchCriteriaId": "7E1EFF45-5311-4E89-B736-271EF3C0C232"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.3",
"versionEndExcluding": "14.3.0.1",
"matchCriteriaId": "5F7641A6-5EF6-4258-A7E0-87CC180B30F0"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-38072",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:27.863",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:44:34.867",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +46,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.3.0.1",
"matchCriteriaId": "2ABFF8F6-AB75-4EB4-AA59-D297EA29B4D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.3.0",
"versionEndExcluding": "13.4.0.12",
"matchCriteriaId": "88242224-85E8-4F7B-8AF3-D5CFDBE741BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.1.0.11",
"matchCriteriaId": "B0A2FCDD-F71A-4AE1-B969-55B7A0D0DF0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.2",
"versionEndExcluding": "14.2.0.6",
"matchCriteriaId": "7E1EFF45-5311-4E89-B736-271EF3C0C232"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.3",
"versionEndExcluding": "14.3.0.1",
"matchCriteriaId": "5F7641A6-5EF6-4258-A7E0-87CC180B30F0"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-38073",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:28.113",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:44:47.727",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +46,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.3.0.1",
"matchCriteriaId": "2ABFF8F6-AB75-4EB4-AA59-D297EA29B4D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.3.0",
"versionEndExcluding": "13.4.0.12",
"matchCriteriaId": "88242224-85E8-4F7B-8AF3-D5CFDBE741BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.1.0.11",
"matchCriteriaId": "B0A2FCDD-F71A-4AE1-B969-55B7A0D0DF0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.2",
"versionEndExcluding": "14.2.0.6",
"matchCriteriaId": "7E1EFF45-5311-4E89-B736-271EF3C0C232"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.3",
"versionEndExcluding": "14.3.0.1",
"matchCriteriaId": "5F7641A6-5EF6-4258-A7E0-87CC180B30F0"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-38074",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:28.367",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:44:56.900",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,12 +44,71 @@
"value": "CWE-843"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.3.0.1",
"matchCriteriaId": "2ABFF8F6-AB75-4EB4-AA59-D297EA29B4D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.3.0",
"versionEndExcluding": "13.4.0.12",
"matchCriteriaId": "88242224-85E8-4F7B-8AF3-D5CFDBE741BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.1.0.11",
"matchCriteriaId": "B0A2FCDD-F71A-4AE1-B969-55B7A0D0DF0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.2",
"versionEndExcluding": "14.2.0.6",
"matchCriteriaId": "7E1EFF45-5311-4E89-B736-271EF3C0C232"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.3",
"versionEndExcluding": "14.3.0.1",
"matchCriteriaId": "5F7641A6-5EF6-4258-A7E0-87CC180B30F0"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-38075",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:28.630",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:45:06.403",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -31,12 +31,32 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +66,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.3.0.1",
"matchCriteriaId": "2ABFF8F6-AB75-4EB4-AA59-D297EA29B4D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.3.0",
"versionEndExcluding": "13.4.0.12",
"matchCriteriaId": "88242224-85E8-4F7B-8AF3-D5CFDBE741BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.1.0.11",
"matchCriteriaId": "B0A2FCDD-F71A-4AE1-B969-55B7A0D0DF0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.2",
"versionEndExcluding": "14.2.0.6",
"matchCriteriaId": "7E1EFF45-5311-4E89-B736-271EF3C0C232"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.3",
"versionEndExcluding": "14.3.0.1",
"matchCriteriaId": "5F7641A6-5EF6-4258-A7E0-87CC180B30F0"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-38076",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:28.727",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:45:17.600",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +46,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.3.0.1",
"matchCriteriaId": "2ABFF8F6-AB75-4EB4-AA59-D297EA29B4D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.3.0",
"versionEndExcluding": "13.4.0.12",
"matchCriteriaId": "88242224-85E8-4F7B-8AF3-D5CFDBE741BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.1.0.11",
"matchCriteriaId": "B0A2FCDD-F71A-4AE1-B969-55B7A0D0DF0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.2",
"versionEndExcluding": "14.2.0.6",
"matchCriteriaId": "7E1EFF45-5311-4E89-B736-271EF3C0C232"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.3",
"versionEndExcluding": "14.3.0.1",
"matchCriteriaId": "5F7641A6-5EF6-4258-A7E0-87CC180B30F0"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,23 +2,86 @@
"id": "CVE-2023-39067",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-11T18:15:10.223",
"lastModified": "2023-09-11T19:08:33.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:58:48.480",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in ZLMediaKiet v.4.0 and v.5.0 allows an attacker to execute arbitrary code via a crafted script to the URL."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zlmediakit:zlmediakit:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "73F0E409-1888-47BF-B1FE-2CFD1610C7BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zlmediakit:zlmediakit:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D867AE9C-CBFC-41EA-BD3C-F08CE8952803"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Yao-ruo/CVE-FIND/blob/main/CVE-2023-39067",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/Yao-ruo/CVE-ZLMediaKit/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,19 +2,113 @@
"id": "CVE-2023-39068",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-11T19:15:43.070",
"lastModified": "2023-09-12T11:52:22.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:45:55.417",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in NBD80S09S-KLC v.YK_HZXM_NBD80S09S-KLC_V4.03.R11.7601.Nat.OnvifC.20230414.bin and NBD80N32RA-KL-V3 v.YK_HZXM_NBD80N32RA-KL_V4.03.R11.7601.Nat.OnvifC.20220120.bin allows a remote attacker to casue a denial of service via a crafted request to the service.XM component."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xiongmaitech:nb080s09s-klc_firmware:yk_hzxm_nbd80s09s-klc_v4.03.r11.7601.nat.onvifc.20230414:*:*:*:*:*:*:*",
"matchCriteriaId": "C535C0FD-ACC4-4A68-ADE9-FBE94F763052"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:xiongmaitech:nb080s09s-klc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FE509EA-F852-4440-861B-100E21110CC0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xiongmaitech:nbd80n32ra-kl-v3_firmware:yk_hzxm_nbd80n32ra-kl_v4.03.r11.7601.nat.onvifc.20220120:*:*:*:*:*:*:*",
"matchCriteriaId": "10CE6A4A-EB61-4CE3-AAD8-7B46BCB61233"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:xiongmaitech:nbd80n32ra-kl-v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0902D3E4-47FF-4646-899A-3607A62CA165"
}
]
}
]
}
],
"references": [
{
"url": "https://www.xiongmaitech.com/en/index.php/service/notice_info/51/3",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,39 +2,127 @@
"id": "CVE-2023-39780",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-11T19:15:43.190",
"lastModified": "2023-09-12T11:52:22.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:43:36.990",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ASUS RT-AX55 v3.0.0.4.386.51598 was discovered to contain an authenticated command injection vulnerability."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386.51598:*:*:*:*:*:*:*",
"matchCriteriaId": "0AABC778-3AC0-4730-953A-61175570FC81"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/1/EN.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/2/EN.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/3/EN.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/4/EN.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/5/EN.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/6/EN.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-40724",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:28.823",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:45:51.487",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +46,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:qms_automotive:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.39",
"matchCriteriaId": "17162BBB-9C4B-4347-B2F6-F8E40D67C954"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-40725",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:28.917",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:46:06.480",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +46,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:qms_automotive:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.39",
"matchCriteriaId": "17162BBB-9C4B-4347-B2F6-F8E40D67C954"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-40726",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:29.013",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:46:40.793",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -31,12 +31,32 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:qms_automotive:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.39",
"matchCriteriaId": "17162BBB-9C4B-4347-B2F6-F8E40D67C954"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-40727",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:29.120",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:30:13.113",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +46,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:qms_automotive:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.39",
"matchCriteriaId": "17162BBB-9C4B-4347-B2F6-F8E40D67C954"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-40728",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:29.210",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:28:40.837",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:qms_automotive:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.39",
"matchCriteriaId": "17162BBB-9C4B-4347-B2F6-F8E40D67C954"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-40729",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:29.307",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:00:59.243",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:qms_automotive:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.39",
"matchCriteriaId": "17162BBB-9C4B-4347-B2F6-F8E40D67C954"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-40730",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:29.403",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:00:29.273",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:qms_automotive:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.39",
"matchCriteriaId": "17162BBB-9C4B-4347-B2F6-F8E40D67C954"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-40731",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:29.490",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:59:57.110",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:qms_automotive:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.39",
"matchCriteriaId": "17162BBB-9C4B-4347-B2F6-F8E40D67C954"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-40732",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:29.593",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:49:50.890",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -31,12 +31,32 @@
},
"exploitabilityScore": 1.3,
"impactScore": 2.5
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.9,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.3,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:qms_automotive:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.39",
"matchCriteriaId": "17162BBB-9C4B-4347-B2F6-F8E40D67C954"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-41032",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:29.690",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:46:52.843",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,12 +44,65 @@
"value": "CWE-787"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*",
"versionStartIncluding": "34.1",
"versionEndExcluding": "34.1.258",
"matchCriteriaId": "E7751190-C386-451B-88B5-4BB4DCBFCE44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*",
"versionStartIncluding": "35.0",
"versionEndExcluding": "35.0.253",
"matchCriteriaId": "0CC7B08D-C9CF-4B68-90A8-8D2DF3CB5154"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*",
"versionStartIncluding": "35.1",
"versionEndExcluding": "35.1.184",
"matchCriteriaId": "3881FB7A-8951-48F6-A948-7C670C11B2B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*",
"versionStartIncluding": "36.0",
"versionEndExcluding": "36.0.142",
"matchCriteriaId": "B2873D5B-2501-4B02-8B68-347B69FC8D43"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-190839.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -1,9 +1,9 @@
{
"id": "CVE-2023-41033",
"sourceIdentifier": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-09-12T10:15:29.783",
"lastModified": "2023-09-12T11:51:54.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:47:01.133",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
@ -46,10 +46,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*",
"versionStartIncluding": "35.0",
"versionEndExcluding": "35.0.260",
"matchCriteriaId": "A15581E8-5B1C-4FA3-8416-A51832018B2A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*",
"versionStartIncluding": "35.1",
"versionEndExcluding": "35.1.246",
"matchCriteriaId": "030986EF-744F-476B-BAB1-BCE12D456C5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*",
"versionStartIncluding": "36.0",
"versionEndExcluding": "36.0.156",
"matchCriteriaId": "2B357683-F73D-47E7-9750-95D1018D035B"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-190839.pdf",
"source": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-41609",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-11T18:15:10.993",
"lastModified": "2023-09-11T19:08:33.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T17:58:35.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An open redirect vulnerability in the sanitize_url() parameter of CouchCMS v2.3 allows attackers to redirect a victim user to an arbitrary web site via a crafted URL."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:couchcms:couchcms:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "54DC5B84-C10C-47C8-8168-FCBC27DB17ED"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/CouchCMS/CouchCMS/issues/190",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,94 @@
"id": "CVE-2023-41775",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-08T08:15:07.593",
"lastModified": "2023-09-08T12:58:39.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:48:00.897",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper access control vulnerability in 'direct' Desktop App for macOS ver 2.6.0 and earlier allows a local attacker to bypass access restriction and to use camrea, microphone, etc. of the device where the product is installed without the user's consent."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:l-is-b:direct:*:*:*:*:desktop:*:*:*",
"versionEndIncluding": "2.6.0",
"matchCriteriaId": "33D9E910-61BA-455A-8156-979417CD84B7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN42691027/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://status.direct4b.com/2023/08/31/2023083101/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-42178",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-14T16:15:08.293",
"lastModified": "2023-09-14T16:15:08.293",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Lenosp 1.0.0-1.2.0 is vulnerable to SQL Injection via the log query module."
}
],
"metrics": {},
"references": [
{
"url": "https://gitee.com/zzdevelop/lenosp",
"source": "cve@mitre.org"
},
{
"url": "https://gitee.com/zzdevelop/lenosp/issues/I7X5QL",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42180",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-14T16:15:08.370",
"lastModified": "2023-09-14T16:15:08.370",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the /user/upload component of lenosp 1.0-1.2.0 allows attackers to execute html code via a crafted JPG file."
}
],
"metrics": {},
"references": [
{
"url": "https://gitee.com/zzdevelop/lenosp/issues/I7X760",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,31 +2,114 @@
"id": "CVE-2023-4807",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-09-08T12:15:08.043",
"lastModified": "2023-09-12T08:15:13.893",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-14T16:43:57.203",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Issue summary: The POLY1305 MAC (message authentication code) implementation\ncontains a bug that might corrupt the internal state of applications on the\nWindows 64 platform when running on newer X86_64 processors supporting the\nAVX512-IFMA instructions.\n\nImpact summary: If in an application that uses the OpenSSL library an attacker\ncan influence whether the POLY1305 MAC algorithm is used, the application\nstate might be corrupted with various application dependent consequences.\n\nThe POLY1305 MAC (message authentication code) implementation in OpenSSL does\nnot save the contents of non-volatile XMM registers on Windows 64 platform\nwhen calculating the MAC of data larger than 64 bytes. Before returning to\nthe caller all the XMM registers are set to zero rather than restoring their\nprevious content. The vulnerable code is used only on newer x86_64 processors\nsupporting the AVX512-IFMA instructions.\n\nThe consequences of this kind of internal application state corruption can\nbe various - from no consequences, if the calling application does not\ndepend on the contents of non-volatile XMM registers at all, to the worst\nconsequences, where the attacker could get complete control of the application\nprocess. However given the contents of the registers are just zeroized so\nthe attacker cannot put arbitrary values inside, the most likely consequence,\nif any, would be an incorrect result of some application dependent\ncalculations or a crash leading to a denial of service.\n\nThe POLY1305 MAC algorithm is most frequently used as part of the\nCHACHA20-POLY1305 AEAD (authenticated encryption with associated data)\nalgorithm. The most common usage of this AEAD cipher is with TLS protocol\nversions 1.2 and 1.3 and a malicious client can influence whether this AEAD\ncipher is used by the server. This implies that server applications using\nOpenSSL can be potentially impacted. However we are currently not aware of\nany concrete application that would be affected by this issue therefore we\nconsider this a Low severity security issue.\n\nAs a workaround the AVX512-IFMA instructions support can be disabled at\nruntime by setting the environment variable OPENSSL_ia32cap:\n\n OPENSSL_ia32cap=:~0x200000\n\nThe FIPS provider is not affected by this issue."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1.1",
"versionEndExcluding": "1.1.1w",
"matchCriteriaId": "AE28C377-98B8-48F3-9869-A5085F95D22C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.11",
"matchCriteriaId": "F9CA5322-712C-46EC-85D4-82BBCD86A370"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.1.0",
"versionEndExcluding": "3.1.3",
"matchCriteriaId": "8CD493DA-9CA9-4D3C-A2C0-BE0A06D7E265"
}
]
}
]
}
],
"references": [
{
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4bfac4471f53c4f74c8d81020beb938f92d84ca5",
"source": "openssl-security@openssl.org"
"source": "openssl-security@openssl.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6754de4a121ec7f261b16723180df6592cbb4508",
"source": "openssl-security@openssl.org"
"source": "openssl-security@openssl.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a632d534c73eeb3e3db8c7540d811194ef7c79ff",
"source": "openssl-security@openssl.org"
"source": "openssl-security@openssl.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://www.openssl.org/news/secadv/20230908.txt",
"source": "openssl-security@openssl.org"
"source": "openssl-security@openssl.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-4951",
"sourceIdentifier": "info@greenrocketsecurity.com",
"published": "2023-09-14T17:15:11.927",
"lastModified": "2023-09-14T17:15:11.927",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross site scripting issue was discovered with the pagination function on the \"Client-based Authentication Policy Configuration\" screen of the GreenRADIUS web admin interface.\u00a0This issue is found in GreenRADIUS v5.1.1.1 and prior. A fix was included in v5.1.2.2.\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@greenrocketsecurity.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.0,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "info@greenrocketsecurity.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://greenrocketsecurity.com/cve-2023-4951/",
"source": "info@greenrocketsecurity.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-14T16:00:25.272328+00:00
2023-09-14T18:00:25.485222+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-14T15:57:16.997000+00:00
2023-09-14T17:59:14.567000+00:00
```
### Last Data Feed Release
@ -29,28 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
224917
224921
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `4`
* [CVE-2021-28485](CVE-2021/CVE-2021-284xx/CVE-2021-28485.json) (`2023-09-14T15:15:07.827`)
* [CVE-2023-1108](CVE-2023/CVE-2023-11xx/CVE-2023-1108.json) (`2023-09-14T15:15:08.293`)
* [CVE-2023-30909](CVE-2023/CVE-2023-309xx/CVE-2023-30909.json) (`2023-09-14T15:15:08.637`)
* [CVE-2023-42178](CVE-2023/CVE-2023-421xx/CVE-2023-42178.json) (`2023-09-14T16:15:08.293`)
* [CVE-2023-42180](CVE-2023/CVE-2023-421xx/CVE-2023-42180.json) (`2023-09-14T16:15:08.370`)
* [CVE-2023-36250](CVE-2023/CVE-2023-362xx/CVE-2023-36250.json) (`2023-09-14T17:15:11.643`)
* [CVE-2023-4951](CVE-2023/CVE-2023-49xx/CVE-2023-4951.json) (`2023-09-14T17:15:11.927`)
### CVEs modified in the last Commit
Recently modified CVEs: `6`
Recently modified CVEs: `47`
* [CVE-2021-29108](CVE-2021/CVE-2021-291xx/CVE-2021-29108.json) (`2023-09-14T15:37:39.617`)
* [CVE-2021-43753](CVE-2021/CVE-2021-437xx/CVE-2021-43753.json) (`2023-09-14T15:57:16.997`)
* [CVE-2023-38155](CVE-2023/CVE-2023-381xx/CVE-2023-38155.json) (`2023-09-14T14:01:08.387`)
* [CVE-2023-38148](CVE-2023/CVE-2023-381xx/CVE-2023-38148.json) (`2023-09-14T14:17:02.120`)
* [CVE-2023-20238](CVE-2023/CVE-2023-202xx/CVE-2023-20238.json) (`2023-09-14T15:39:38.287`)
* [CVE-2023-0925](CVE-2023/CVE-2023-09xx/CVE-2023-0925.json) (`2023-09-14T15:40:14.937`)
* [CVE-2023-40724](CVE-2023/CVE-2023-407xx/CVE-2023-40724.json) (`2023-09-14T16:45:51.487`)
* [CVE-2023-40725](CVE-2023/CVE-2023-407xx/CVE-2023-40725.json) (`2023-09-14T16:46:06.480`)
* [CVE-2023-40726](CVE-2023/CVE-2023-407xx/CVE-2023-40726.json) (`2023-09-14T16:46:40.793`)
* [CVE-2023-41032](CVE-2023/CVE-2023-410xx/CVE-2023-41032.json) (`2023-09-14T16:46:52.843`)
* [CVE-2023-41033](CVE-2023/CVE-2023-410xx/CVE-2023-41033.json) (`2023-09-14T16:47:01.133`)
* [CVE-2023-41775](CVE-2023/CVE-2023-417xx/CVE-2023-41775.json) (`2023-09-14T16:48:00.897`)
* [CVE-2023-40732](CVE-2023/CVE-2023-407xx/CVE-2023-40732.json) (`2023-09-14T16:49:50.890`)
* [CVE-2023-40731](CVE-2023/CVE-2023-407xx/CVE-2023-40731.json) (`2023-09-14T16:59:57.110`)
* [CVE-2023-40730](CVE-2023/CVE-2023-407xx/CVE-2023-40730.json) (`2023-09-14T17:00:29.273`)
* [CVE-2023-40729](CVE-2023/CVE-2023-407xx/CVE-2023-40729.json) (`2023-09-14T17:00:59.243`)
* [CVE-2023-23451](CVE-2023/CVE-2023-234xx/CVE-2023-23451.json) (`2023-09-14T17:15:11.450`)
* [CVE-2023-40728](CVE-2023/CVE-2023-407xx/CVE-2023-40728.json) (`2023-09-14T17:28:40.837`)
* [CVE-2023-40727](CVE-2023/CVE-2023-407xx/CVE-2023-40727.json) (`2023-09-14T17:30:13.113`)
* [CVE-2023-20569](CVE-2023/CVE-2023-205xx/CVE-2023-20569.json) (`2023-09-14T17:42:52.950`)
* [CVE-2023-25519](CVE-2023/CVE-2023-255xx/CVE-2023-25519.json) (`2023-09-14T17:43:33.853`)
* [CVE-2023-39780](CVE-2023/CVE-2023-397xx/CVE-2023-39780.json) (`2023-09-14T17:43:36.990`)
* [CVE-2023-39068](CVE-2023/CVE-2023-390xx/CVE-2023-39068.json) (`2023-09-14T17:45:55.417`)
* [CVE-2023-33136](CVE-2023/CVE-2023-331xx/CVE-2023-33136.json) (`2023-09-14T17:50:15.443`)
* [CVE-2023-36742](CVE-2023/CVE-2023-367xx/CVE-2023-36742.json) (`2023-09-14T17:52:48.600`)
* [CVE-2023-36740](CVE-2023/CVE-2023-367xx/CVE-2023-36740.json) (`2023-09-14T17:55:23.760`)
* [CVE-2023-36739](CVE-2023/CVE-2023-367xx/CVE-2023-36739.json) (`2023-09-14T17:57:29.203`)
* [CVE-2023-31468](CVE-2023/CVE-2023-314xx/CVE-2023-31468.json) (`2023-09-14T17:58:23.067`)
* [CVE-2023-41609](CVE-2023/CVE-2023-416xx/CVE-2023-41609.json) (`2023-09-14T17:58:35.633`)
* [CVE-2023-39067](CVE-2023/CVE-2023-390xx/CVE-2023-39067.json) (`2023-09-14T17:58:48.480`)
* [CVE-2023-36980](CVE-2023/CVE-2023-369xx/CVE-2023-36980.json) (`2023-09-14T17:59:14.567`)
## Download and Usage