Skip to content

Commit

Permalink
Auto-Update: 2024-01-09T19:00:25.353020+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Jan 9, 2024
1 parent 91623cd commit 01f1a6d
Show file tree
Hide file tree
Showing 87 changed files with 3,646 additions and 178 deletions.
32 changes: 32 additions & 0 deletions CVE-2022/CVE-2022-486xx/CVE-2022-48618.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
{
"id": "CVE-2022-48618",
"sourceIdentifier": "[email protected]",
"published": "2024-01-09T18:15:45.120",
"lastModified": "2024-01-09T18:15:45.120",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213530",
"source": "[email protected]"
},
{
"url": "https://support.apple.com/en-us/HT213532",
"source": "[email protected]"
},
{
"url": "https://support.apple.com/en-us/HT213535",
"source": "[email protected]"
},
{
"url": "https://support.apple.com/en-us/HT213536",
"source": "[email protected]"
}
]
}
70 changes: 65 additions & 5 deletions CVE-2023/CVE-2023-261xx/CVE-2023-26159.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-26159",
"sourceIdentifier": "[email protected]",
"published": "2024-01-02T05:15:08.630",
"lastModified": "2024-01-02T13:47:24.843",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-09T18:20:54.677",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
Expand All @@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "[email protected]",
"type": "Secondary",
Expand All @@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
},
{
"source": "[email protected]",
"type": "Secondary",
Expand All @@ -50,18 +80,48 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:follow-redirects:follow_redirects:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "1.15.4",
"matchCriteriaId": "5E9B14E8-F184-4F4C-8275-8FE1D093D258"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/follow-redirects/follow-redirects/issues/235",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/follow-redirects/follow-redirects/pull/236",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}
6 changes: 5 additions & 1 deletion CVE-2023/CVE-2023-290xx/CVE-2023-29048.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-29048",
"sourceIdentifier": "[email protected]",
"published": "2024-01-08T09:15:19.893",
"lastModified": "2024-01-08T23:15:08.247",
"lastModified": "2024-01-09T18:15:45.330",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
Expand Down Expand Up @@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html",
"source": "[email protected]"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jan/3",
"source": "[email protected]"
Expand Down
6 changes: 5 additions & 1 deletion CVE-2023/CVE-2023-290xx/CVE-2023-29049.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-29049",
"sourceIdentifier": "[email protected]",
"published": "2024-01-08T09:15:20.120",
"lastModified": "2024-01-08T23:15:08.553",
"lastModified": "2024-01-09T18:15:45.420",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
Expand Down Expand Up @@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html",
"source": "[email protected]"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jan/3",
"source": "[email protected]"
Expand Down
6 changes: 5 additions & 1 deletion CVE-2023/CVE-2023-290xx/CVE-2023-29050.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-29050",
"sourceIdentifier": "[email protected]",
"published": "2024-01-08T09:15:20.300",
"lastModified": "2024-01-08T23:15:08.630",
"lastModified": "2024-01-09T18:15:45.493",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
Expand Down Expand Up @@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html",
"source": "[email protected]"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jan/3",
"source": "[email protected]"
Expand Down
6 changes: 5 additions & 1 deletion CVE-2023/CVE-2023-290xx/CVE-2023-29051.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-29051",
"sourceIdentifier": "[email protected]",
"published": "2024-01-08T09:15:20.480",
"lastModified": "2024-01-08T23:15:08.707",
"lastModified": "2024-01-09T18:15:45.567",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
Expand Down Expand Up @@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html",
"source": "[email protected]"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jan/4",
"source": "[email protected]"
Expand Down
6 changes: 5 additions & 1 deletion CVE-2023/CVE-2023-290xx/CVE-2023-29052.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-29052",
"sourceIdentifier": "[email protected]",
"published": "2024-01-08T09:15:20.680",
"lastModified": "2024-01-08T23:15:08.780",
"lastModified": "2024-01-09T18:15:45.650",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
Expand Down Expand Up @@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html",
"source": "[email protected]"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jan/4",
"source": "[email protected]"
Expand Down
16 changes: 8 additions & 8 deletions CVE-2023/CVE-2023-367xx/CVE-2023-36719.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-36719",
"sourceIdentifier": "[email protected]",
"published": "2023-11-14T18:15:50.820",
"lastModified": "2023-12-15T19:47:17.103",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-09T17:15:10.673",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand All @@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
Expand All @@ -37,23 +37,23 @@
"impactScore": 5.9
},
{
"source": "[email protected]",
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
Expand Down
6 changes: 5 additions & 1 deletion CVE-2023/CVE-2023-417xx/CVE-2023-41710.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-41710",
"sourceIdentifier": "[email protected]",
"published": "2024-01-08T09:15:20.883",
"lastModified": "2024-01-08T23:15:08.850",
"lastModified": "2024-01-09T18:15:46.650",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
Expand Down Expand Up @@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html",
"source": "[email protected]"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jan/4",
"source": "[email protected]"
Expand Down
21 changes: 13 additions & 8 deletions CVE-2023/CVE-2023-44xx/CVE-2023-4462.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-4462",
"sourceIdentifier": "[email protected]",
"published": "2023-12-29T10:15:11.100",
"lastModified": "2024-01-05T15:16:26.990",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-09T17:15:11.153",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in Poly CCX 400, CCX 600, Trio 8800 and Trio C60. This affects an unknown part of the component Web Configuration Application. The manipulation leads to insufficiently random values. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249255."
"value": "A vulnerability classified as problematic has been found in Poly Trio 8300, Trio 8500, Trio 8800, Trio C60, CCX 350, CCX 400, CCX 500, CCX 505, CCX 600, CCX 700, EDGE E100, EDGE E220, EDGE E300, EDGE E320, EDGE E350, EDGE E400, EDGE E450, EDGE E500, EDGE E550, VVX 101, VVX 150, VVX 201, VVX 250, VVX 300, VVX 301, VVX 310, VVX 311, VVX 350, VVX 400, VVX 401, VVX 410, VVX 411, VVX 450, VVX 500, VVX 501, VVX 600 and VVX 601. This affects an unknown part of the component Web Configuration Application. The manipulation leads to insufficiently random values. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249255."
},
{
"lang": "es",
Expand Down Expand Up @@ -214,11 +214,12 @@
]
},
{
"url": "https://modzero.com/en/advisories/mz-23-01-poly-voip-devices/",
"source": "[email protected]",
"tags": [
"Broken Link"
]
"url": "https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices",
"source": "[email protected]"
},
{
"url": "https://modzero.com/en/advisories/mz-23-01-poly-voip/",
"source": "[email protected]"
},
{
"url": "https://modzero.com/en/blog/multiple-vulnerabilities-in-poly-products/",
Expand All @@ -228,6 +229,10 @@
"Third Party Advisory"
]
},
{
"url": "https://support.hp.com/us-en/document/ish_9929296-9929329-16/hpsbpy03896",
"source": "[email protected]"
},
{
"url": "https://vuldb.com/?ctiid.249255",
"source": "[email protected]",
Expand Down
15 changes: 8 additions & 7 deletions CVE-2023/CVE-2023-44xx/CVE-2023-4463.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-4463",
"sourceIdentifier": "[email protected]",
"published": "2023-12-29T10:15:11.413",
"lastModified": "2024-01-05T22:23:17.760",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-09T17:15:11.347",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand Down Expand Up @@ -214,11 +214,12 @@
]
},
{
"url": "https://modzero.com/en/advisories/mz-23-01-poly-voip-devices/",
"source": "[email protected]",
"tags": [
"Broken Link"
]
"url": "https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices",
"source": "[email protected]"
},
{
"url": "https://modzero.com/en/advisories/mz-23-01-poly-voip/",
"source": "[email protected]"
},
{
"url": "https://modzero.com/en/blog/multiple-vulnerabilities-in-poly-products/",
Expand Down
Loading

0 comments on commit 01f1a6d

Please sign in to comment.