-
Notifications
You must be signed in to change notification settings - Fork 16
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Auto-Update: 2024-01-09T19:00:25.353020+00:00
- Loading branch information
1 parent
91623cd
commit 01f1a6d
Showing
87 changed files
with
3,646 additions
and
178 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
{ | ||
"id": "CVE-2022-48618", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-01-09T18:15:45.120", | ||
"lastModified": "2024-01-09T18:15:45.120", | ||
"vulnStatus": "Received", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1." | ||
} | ||
], | ||
"metrics": {}, | ||
"references": [ | ||
{ | ||
"url": "https://support.apple.com/en-us/HT213530", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://support.apple.com/en-us/HT213532", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://support.apple.com/en-us/HT213535", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://support.apple.com/en-us/HT213536", | ||
"source": "[email protected]" | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,8 +2,8 @@ | |
"id": "CVE-2023-26159", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-01-02T05:15:08.630", | ||
"lastModified": "2024-01-02T13:47:24.843", | ||
"vulnStatus": "Awaiting Analysis", | ||
"lastModified": "2024-01-09T18:20:54.677", | ||
"vulnStatus": "Analyzed", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
|
@@ -16,6 +16,26 @@ | |
], | ||
"metrics": { | ||
"cvssMetricV31": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "NONE", | ||
"userInteraction": "REQUIRED", | ||
"scope": "CHANGED", | ||
"confidentialityImpact": "LOW", | ||
"integrityImpact": "LOW", | ||
"availabilityImpact": "NONE", | ||
"baseScore": 6.1, | ||
"baseSeverity": "MEDIUM" | ||
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 2.7 | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"type": "Secondary", | ||
|
@@ -39,6 +59,16 @@ | |
] | ||
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-601" | ||
} | ||
] | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"type": "Secondary", | ||
|
@@ -50,18 +80,48 @@ | |
] | ||
} | ||
], | ||
"configurations": [ | ||
{ | ||
"nodes": [ | ||
{ | ||
"operator": "OR", | ||
"negate": false, | ||
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:a:follow-redirects:follow_redirects:*:*:*:*:*:node.js:*:*", | ||
"versionEndExcluding": "1.15.4", | ||
"matchCriteriaId": "5E9B14E8-F184-4F4C-8275-8FE1D093D258" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://github.com/follow-redirects/follow-redirects/issues/235", | ||
"source": "[email protected]" | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Exploit", | ||
"Issue Tracking" | ||
] | ||
}, | ||
{ | ||
"url": "https://github.com/follow-redirects/follow-redirects/pull/236", | ||
"source": "[email protected]" | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Issue Tracking", | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://security.snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137", | ||
"source": "[email protected]" | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Exploit", | ||
"Third Party Advisory" | ||
] | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2023-29048", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-01-08T09:15:19.893", | ||
"lastModified": "2024-01-08T23:15:08.247", | ||
"lastModified": "2024-01-09T18:15:45.330", | ||
"vulnStatus": "Awaiting Analysis", | ||
"descriptions": [ | ||
{ | ||
|
@@ -51,6 +51,10 @@ | |
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "http://seclists.org/fulldisclosure/2024/Jan/3", | ||
"source": "[email protected]" | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2023-29049", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-01-08T09:15:20.120", | ||
"lastModified": "2024-01-08T23:15:08.553", | ||
"lastModified": "2024-01-09T18:15:45.420", | ||
"vulnStatus": "Awaiting Analysis", | ||
"descriptions": [ | ||
{ | ||
|
@@ -51,6 +51,10 @@ | |
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "http://seclists.org/fulldisclosure/2024/Jan/3", | ||
"source": "[email protected]" | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2023-29050", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-01-08T09:15:20.300", | ||
"lastModified": "2024-01-08T23:15:08.630", | ||
"lastModified": "2024-01-09T18:15:45.493", | ||
"vulnStatus": "Awaiting Analysis", | ||
"descriptions": [ | ||
{ | ||
|
@@ -51,6 +51,10 @@ | |
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "http://seclists.org/fulldisclosure/2024/Jan/3", | ||
"source": "[email protected]" | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2023-29051", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-01-08T09:15:20.480", | ||
"lastModified": "2024-01-08T23:15:08.707", | ||
"lastModified": "2024-01-09T18:15:45.567", | ||
"vulnStatus": "Awaiting Analysis", | ||
"descriptions": [ | ||
{ | ||
|
@@ -51,6 +51,10 @@ | |
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "http://seclists.org/fulldisclosure/2024/Jan/4", | ||
"source": "[email protected]" | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2023-29052", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-01-08T09:15:20.680", | ||
"lastModified": "2024-01-08T23:15:08.780", | ||
"lastModified": "2024-01-09T18:15:45.650", | ||
"vulnStatus": "Awaiting Analysis", | ||
"descriptions": [ | ||
{ | ||
|
@@ -51,6 +51,10 @@ | |
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "http://seclists.org/fulldisclosure/2024/Jan/4", | ||
"source": "[email protected]" | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,8 +2,8 @@ | |
"id": "CVE-2023-36719", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2023-11-14T18:15:50.820", | ||
"lastModified": "2023-12-15T19:47:17.103", | ||
"vulnStatus": "Analyzed", | ||
"lastModified": "2024-01-09T17:15:10.673", | ||
"vulnStatus": "Modified", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
|
@@ -17,7 +17,7 @@ | |
"metrics": { | ||
"cvssMetricV31": [ | ||
{ | ||
"source": "[email protected]", | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"cvssData": { | ||
"version": "3.1", | ||
|
@@ -37,23 +37,23 @@ | |
"impactScore": 5.9 | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"source": "[email protected]", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", | ||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", | ||
"attackVector": "LOCAL", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "NONE", | ||
"privilegesRequired": "LOW", | ||
"userInteraction": "NONE", | ||
"scope": "UNCHANGED", | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "HIGH", | ||
"availabilityImpact": "HIGH", | ||
"baseScore": 8.4, | ||
"baseScore": 7.8, | ||
"baseSeverity": "HIGH" | ||
}, | ||
"exploitabilityScore": 2.5, | ||
"exploitabilityScore": 1.8, | ||
"impactScore": 5.9 | ||
} | ||
] | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2023-41710", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-01-08T09:15:20.883", | ||
"lastModified": "2024-01-08T23:15:08.850", | ||
"lastModified": "2024-01-09T18:15:46.650", | ||
"vulnStatus": "Awaiting Analysis", | ||
"descriptions": [ | ||
{ | ||
|
@@ -51,6 +51,10 @@ | |
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "http://seclists.org/fulldisclosure/2024/Jan/4", | ||
"source": "[email protected]" | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,12 +2,12 @@ | |
"id": "CVE-2023-4462", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2023-12-29T10:15:11.100", | ||
"lastModified": "2024-01-05T15:16:26.990", | ||
"vulnStatus": "Analyzed", | ||
"lastModified": "2024-01-09T17:15:11.153", | ||
"vulnStatus": "Modified", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "A vulnerability classified as problematic has been found in Poly CCX 400, CCX 600, Trio 8800 and Trio C60. This affects an unknown part of the component Web Configuration Application. The manipulation leads to insufficiently random values. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249255." | ||
"value": "A vulnerability classified as problematic has been found in Poly Trio 8300, Trio 8500, Trio 8800, Trio C60, CCX 350, CCX 400, CCX 500, CCX 505, CCX 600, CCX 700, EDGE E100, EDGE E220, EDGE E300, EDGE E320, EDGE E350, EDGE E400, EDGE E450, EDGE E500, EDGE E550, VVX 101, VVX 150, VVX 201, VVX 250, VVX 300, VVX 301, VVX 310, VVX 311, VVX 350, VVX 400, VVX 401, VVX 410, VVX 411, VVX 450, VVX 500, VVX 501, VVX 600 and VVX 601. This affects an unknown part of the component Web Configuration Application. The manipulation leads to insufficiently random values. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249255." | ||
}, | ||
{ | ||
"lang": "es", | ||
|
@@ -214,11 +214,12 @@ | |
] | ||
}, | ||
{ | ||
"url": "https://modzero.com/en/advisories/mz-23-01-poly-voip-devices/", | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Broken Link" | ||
] | ||
"url": "https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://modzero.com/en/advisories/mz-23-01-poly-voip/", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://modzero.com/en/blog/multiple-vulnerabilities-in-poly-products/", | ||
|
@@ -228,6 +229,10 @@ | |
"Third Party Advisory" | ||
] | ||
}, | ||
{ | ||
"url": "https://support.hp.com/us-en/document/ish_9929296-9929329-16/hpsbpy03896", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://vuldb.com/?ctiid.249255", | ||
"source": "[email protected]", | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,8 +2,8 @@ | |
"id": "CVE-2023-4463", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2023-12-29T10:15:11.413", | ||
"lastModified": "2024-01-05T22:23:17.760", | ||
"vulnStatus": "Analyzed", | ||
"lastModified": "2024-01-09T17:15:11.347", | ||
"vulnStatus": "Modified", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
|
@@ -214,11 +214,12 @@ | |
] | ||
}, | ||
{ | ||
"url": "https://modzero.com/en/advisories/mz-23-01-poly-voip-devices/", | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Broken Link" | ||
] | ||
"url": "https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://modzero.com/en/advisories/mz-23-01-poly-voip/", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://modzero.com/en/blog/multiple-vulnerabilities-in-poly-products/", | ||
|
Oops, something went wrong.