Skip to content

Commit

Permalink
Auto-Update: 2024-02-06T19:00:33.081430+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Feb 6, 2024
1 parent d0bb9a5 commit 744a570
Show file tree
Hide file tree
Showing 54 changed files with 2,134 additions and 172 deletions.
6 changes: 5 additions & 1 deletion CVE-2019/CVE-2019-148xx/CVE-2019-14865.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2019-14865",
"sourceIdentifier": "[email protected]",
"published": "2019-11-29T10:15:12.830",
"lastModified": "2023-02-12T23:36:07.163",
"lastModified": "2024-02-06T18:15:58.207",
"vulnStatus": "Modified",
"descriptions": [
{
Expand Down Expand Up @@ -142,6 +142,10 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/02/06/3",
"source": "[email protected]"
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0335",
"source": "[email protected]",
Expand Down
4 changes: 2 additions & 2 deletions CVE-2023/CVE-2023-351xx/CVE-2023-35188.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-35188",
"sourceIdentifier": "[email protected]",
"published": "2024-02-06T16:15:51.140",
"lastModified": "2024-02-06T16:15:51.140",
"vulnStatus": "Received",
"lastModified": "2024-02-06T17:52:56.963",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
Expand Down
55 changes: 55 additions & 0 deletions CVE-2023/CVE-2023-364xx/CVE-2023-36498.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
{
"id": "CVE-2023-36498",
"sourceIdentifier": "[email protected]",
"published": "2024-02-06T17:15:08.527",
"lastModified": "2024-02-06T18:15:58.383",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A post-authentication command injection vulnerability exists in the PPTP client functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability and gain access to an unrestricted shell."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1853",
"source": "[email protected]"
}
]
}
63 changes: 63 additions & 0 deletions CVE-2023/CVE-2023-405xx/CVE-2023-40545.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,63 @@
{
"id": "CVE-2023-40545",
"sourceIdentifier": "[email protected]",
"published": "2024-02-06T18:15:58.470",
"lastModified": "2024-02-06T18:15:58.470",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Authentication\u00a0bypass when an OAuth2 Client is using client_secret_jwt as its authentication method on affected 11.3 versions via specially crafted requests.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://docs.pingidentity.com/r/en-us/pingfederate-113/hro1701116403236",
"source": "[email protected]"
},
{
"url": "https://support.pingidentity.com/s/article/SECADV040-PingFederate-OAuth-Client-Authentication-Bypass",
"source": "[email protected]"
},
{
"url": "https://www.pingidentity.com/en/resources/downloads/pingfederate/previous-releases.html",
"source": "[email protected]"
}
]
}
91 changes: 87 additions & 4 deletions CVE-2023/CVE-2023-405xx/CVE-2023-40548.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,16 +2,40 @@
"id": "CVE-2023-40548",
"sourceIdentifier": "[email protected]",
"published": "2024-01-29T15:15:08.893",
"lastModified": "2024-01-29T16:19:17.097",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-06T18:37:23.327",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase."
},
{
"lang": "es",
"value": "Se encontr\u00f3 un desbordamiento de b\u00fafer en Shim en el sistema de 32 bits. El desbordamiento ocurre debido a una operaci\u00f3n de suma que involucra un valor controlado por el usuario analizado del binario PE que utiliza Shim. Este valor se utiliza adem\u00e1s para operaciones de asignaci\u00f3n de memoria, lo que provoca un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria. Esta falla causa da\u00f1os en la memoria y puede provocar fallas o problemas de integridad de los datos durante la fase de inicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 5.9
},
{
"source": "[email protected]",
"type": "Secondary",
Expand All @@ -35,6 +59,20 @@
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "[email protected]",
"type": "Secondary",
Expand All @@ -46,14 +84,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*",
"versionEndIncluding": "15.8",
"matchCriteriaId": "A4D01344-F2B6-4206-9E1D-AAAAB1977EA0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:shim:15.8:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BF11AEF9-B742-46DC-94D2-6160B93767BD"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-40548",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
}
]
}
55 changes: 55 additions & 0 deletions CVE-2023/CVE-2023-426xx/CVE-2023-42664.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
{
"id": "CVE-2023-42664",
"sourceIdentifier": "[email protected]",
"published": "2024-02-06T17:15:08.770",
"lastModified": "2024-02-06T18:15:58.670",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A post authentication command injection vulnerability exists when setting up the PPTP global configuration of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1856",
"source": "[email protected]"
}
]
}
55 changes: 55 additions & 0 deletions CVE-2023/CVE-2023-434xx/CVE-2023-43482.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
{
"id": "CVE-2023-43482",
"sourceIdentifier": "[email protected]",
"published": "2024-02-06T17:15:08.973",
"lastModified": "2024-02-06T18:15:58.757",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A command execution vulnerability exists in the guest resource functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1850",
"source": "[email protected]"
}
]
}
Loading

0 comments on commit 744a570

Please sign in to comment.