diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15036.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15036.json index 42dfbe425ca..9e7374aa8bc 100644 --- a/CVE-2016/CVE-2016-150xx/CVE-2016-15036.json +++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15036.json @@ -2,16 +2,40 @@ "id": "CVE-2016-15036", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-23T20:15:37.930", - "lastModified": "2023-12-25T03:08:09.833", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:48:43.957", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Deis Workflow Manager up to 2.3.2. It has been classified as problematic. This affects an unknown part. The manipulation leads to race condition. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 2.3.3 is able to address this issue. The patch is named 31fe3bccbdde134a185752e53380330d16053f7f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-248847. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Se encontr\u00f3 una vulnerabilidad en Deis Workflow Manager hasta 2.3.2. Ha sido clasificada como problem\u00e1tica. Esto afecta a una parte desconocida. La manipulaci\u00f3n conduce a la condici\u00f3n de ejecuci\u00f3n. La complejidad del ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. La actualizaci\u00f3n a la versi\u00f3n 2.3.3 puede solucionar este problema. El parche se llama 31fe3bccbdde134a185752e53380330d16053f7f. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-248847. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -71,26 +95,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deis:workflow_manager:*:*:*:*:*:go:*:*", + "versionEndIncluding": "2.3.2", + "matchCriteriaId": "A82C2086-3CC8-4669-B3E1-8453CD63A459" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/deis/workflow-manager/commit/31fe3bccbdde134a185752e53380330d16053f7f", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/deis/workflow-manager/pull/94", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/deis/workflow-manager/releases/tag/v2.3.3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.248847", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.248847", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-436xx/CVE-2022-43675.json b/CVE-2022/CVE-2022-436xx/CVE-2022-43675.json index 09906527b5d..9e76dac0425 100644 --- a/CVE-2022/CVE-2022-436xx/CVE-2022-43675.json +++ b/CVE-2022/CVE-2022-436xx/CVE-2022-43675.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43675", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-25T06:15:08.253", - "lastModified": "2023-12-26T20:34:16.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:57:31.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,67 @@ "value": "Se descubri\u00f3 un problema en NOKIA NFM-T R19.9. El XSS reflejado en Network Element Manager existe a trav\u00e9s de /oms1350/pages/otn/cpbLogDisplay a trav\u00e9s del par\u00e1metro filename, en /oms1350/pages/otn/connection/E2ERoutingDisplayWithOverLay a trav\u00e9s del par\u00e1metro id y en /oms1350/pages/otn/mainOtn a trav\u00e9s de todos los par\u00e1metros." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nokia:network_functions_manager_for_transport:19.9:*:*:*:*:*:*:*", + "matchCriteriaId": "EE1A66D4-19DC-4734-B3C4-5775FB1B1A2D" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.gruppotim.it/redteam", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24609.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24609.json index c9ff77d92b2..e5b5d26ee0a 100644 --- a/CVE-2023/CVE-2023-246xx/CVE-2023-24609.json +++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24609.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24609", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-22T04:15:08.673", - "lastModified": "2023-12-22T12:18:32.690", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:34:37.670", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,91 @@ "value": "Matrix SSL 4.x a 4.6.0 y Rambus TLS Toolkit tienen un desbordamiento de enteros de sustracci\u00f3n de longitud para el an\u00e1lisis de la extensi\u00f3n Client Hello Pre-Shared Key en el servidor TLS 1.3. Un dispositivo atacado calcula un hash SHA-2 en al menos 65 KB (en RAM). Con una gran cantidad de mensajes TLS manipulados, la CPU se carga mucho. Esto ocurre en tls13VerifyBinder y tls13TranscriptHashUpdate." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:matrixssl:matrixssl:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndIncluding": "4.6.0", + "matchCriteriaId": "69E7A834-680C-47E3-AC27-90C26E8C607F" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rambus:tls_toolkit:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4ECD2764-A6E2-4A74-9783-779F05DAAE3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.rambus.com/security/software-protocols/tls-toolkit/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28872.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28872.json index 059d2a55680..f7a5e76ad4e 100644 --- a/CVE-2023/CVE-2023-288xx/CVE-2023-28872.json +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28872.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28872", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-25T07:15:07.893", - "lastModified": "2023-12-26T20:34:16.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:35:33.797", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,67 @@ "value": "Support Assistant en NCP Secure Enterprise Client anterior a 13.10 permite a los atacantes ejecutar archivos DLL con privilegios de SYSTEM creando un enlace simb\u00f3lico desde una ubicaci\u00f3n %LOCALAPPDATA%\\Temp\\NcpSupport*." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ncp-e:secure_enterprise_client:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.10", + "matchCriteriaId": "D12849E5-A134-4341-9F0D-D005A664C68C" + } + ] + } + ] + } + ], "references": [ { "url": "https://herolab.usd.de/en/security-advisories/usd-2022-0006/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31297.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31297.json index c7ad1397987..43c7521f8df 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31297.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31297.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31297", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-25T07:15:08.593", - "lastModified": "2023-12-26T20:34:16.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:35:00.150", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,73 @@ "value": "Se descubri\u00f3 un problema en SESAMI planfocus CPTO (Cash Point & Transport Optimizer) 6.3.8.6 718. Hay XSS a trav\u00e9s del campo Name al modificar un cliente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sesami:cash_point_\\&_transport_optimizer:6.3.8.6.718:*:*:*:*:*:*:*", + "matchCriteriaId": "1FF8F540-DE41-4C35-BA23-64A08F2474E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://herolab.usd.de/en/security-advisories/usd-2022-0058/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://herolab.usd.de/security-advisories/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31417.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31417.json index a3b35608e80..e681d7ca581 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31417.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31417.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31417", "sourceIdentifier": "bressers@elastic.co", "published": "2023-10-26T18:15:08.500", - "lastModified": "2023-11-30T22:15:07.717", - "vulnStatus": "Modified", + "lastModified": "2024-01-03T19:02:34.430", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,19 +21,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "baseScore": 4.4, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 0.8, "impactScore": 3.6 }, { @@ -116,7 +116,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20231130-0006/", - "source": "bressers@elastic.co" + "source": "bressers@elastic.co", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.elastic.co/community/security", diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46929.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46929.json new file mode 100644 index 00000000000..47331d831c9 --- /dev/null +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46929.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46929", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-03T19:15:08.390", + "lastModified": "2024-01-03T19:17:49.857", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue discovered in GPAC 2.3-DEV-rev605-gfc9e29089-master in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 allows attackers to crash the application." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/gpac/gpac/commit/4248def5d24325aeb0e35cacde3d56c9411816a6", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/gpac/gpac/issues/2662", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48654.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48654.json index e032af66fa4..d151bdf7229 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48654.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48654.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48654", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-25T06:15:08.483", - "lastModified": "2023-12-26T20:34:16.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:54:40.840", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,74 @@ "value": "One Identity Password Manager anterior a 5.13.1 permite Kiosk Escape. Este producto permite a los usuarios restablecer sus contrase\u00f1as de Active Directory en la pantalla de inicio de sesi\u00f3n de un cliente de Windows. Inicia un navegador basado en Chromium en modo quiosco para proporcionar la funcionalidad de reinicio. La secuencia de escape es: vaya a la secci\u00f3n Google ReCAPTCHA, haga clic en el enlace Privacidad, observe que hay una nueva ventana del navegador, navegue a cualquier sitio web que ofrezca carga de archivos, navegue a cmd.exe desde la ventana del explorador de archivos e inicie cmd. .exe como NT AUTHORITY\\SYSTEM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oneidentity:password_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.13.1", + "matchCriteriaId": "9BB9DDED-0454-482A-B760-D59409637901" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec-consult.com/vulnerability-lab/advisory/kiosk-escape-privilege-escalation-one-identity-password-manager-secure-password-extension/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.oneidentity.com/products/password-manager/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49328.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49328.json index 6c8c7435f62..8985d8ca93b 100644 --- a/CVE-2023/CVE-2023-493xx/CVE-2023-49328.json +++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49328.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49328", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-25T06:15:08.530", - "lastModified": "2023-12-26T20:34:16.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:43:29.493", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,78 @@ "value": "En un servidor Wolters Kluwer B.POINT 23.70.00 que ejecuta Linux localmente, durante la fase de autenticaci\u00f3n, un usuario del sistema validado puede lograr la ejecuci\u00f3n remota de c\u00f3digo mediante la inyecci\u00f3n de argumentos en el m\u00f3dulo de servidor a servidor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wolterskluwer:b.point:23.70.00:*:*:*:*:*:*:*", + "matchCriteriaId": "5CFE73D3-3711-440D-8D33-3FCDE0B2B989" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.gruppotim.it/it/footer/red-team.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49594.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49594.json index 01835b23485..4933a8bde91 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49594.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49594.json @@ -2,16 +2,40 @@ "id": "CVE-2023-49594", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-12-23T20:15:38.250", - "lastModified": "2023-12-25T03:08:09.833", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:40:02.443", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability exists in the challenge functionality of instipod DuoUniversalKeycloakAuthenticator 1.0.7 plugin. A specially crafted HTTP request can lead to a disclosure of sensitive information. An user login to Keycloak using DuoUniversalKeycloakAuthenticator plugin triggers this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en la funcionalidad de desaf\u00edo de instipod DuoUniversalKeycloakAuthenticator 1.0.7 plugin. Una solicitud HTTP especialmente manipulada puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n confidencial. Un usuario que inicia sesi\u00f3n en Keycloak utilizando el complemento DuoUniversalKeycloakAuthenticator desencadena esta vulnerabilidad." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "talos-cna@cisco.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "talos-cna@cisco.com", "type": "Secondary", @@ -46,14 +80,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:michaelkelly:duouniversalkeycloakauthenticator:*:*:*:*:*:keycloak:*:*", + "versionEndExcluding": "1.0.8", + "matchCriteriaId": "B46EA7DB-C758-4D09-80B7-8A667522B9F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/instipod/DuoUniversalKeycloakAuthenticator/releases/tag/1.0.8", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1907", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50090.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50090.json new file mode 100644 index 00000000000..7a5cf295cb8 --- /dev/null +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50090.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-50090", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-03T20:15:21.660", + "lastModified": "2024-01-03T20:15:21.660", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Arbitrary File Write vulnerability in the saveReportFile method of ureport2 2.2.9 and before allows attackers to write arbitrary files and run arbitrary commands via crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://lemono.fun/thoughts/UReport2-RCE.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50254.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50254.json index b6fb5c9e0d7..9b26f59fc83 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50254.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50254.json @@ -2,16 +2,40 @@ "id": "CVE-2023-50254", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T17:15:09.330", - "lastModified": "2023-12-22T20:32:34.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:12:07.347", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Deepin Linux's default document reader `deepin-reader` software suffers from a serious vulnerability in versions prior to 6.0.7 due to a design flaw that leads to remote command execution via crafted docx document. This is a file overwrite vulnerability. Remote code execution (RCE) can be achieved by overwriting files like .bash_rc, .bash_login, etc. RCE will be triggered when the user opens the terminal. Version 6.0.7 contains a patch for the issue." + }, + { + "lang": "es", + "value": "El software de lectura de documentos predeterminado de Deepin Linux, `deepin-reader`, sufre una grave vulnerabilidad en versiones anteriores a la 6.0.7 debido a un fallo de dise\u00f1o que conduce a la ejecuci\u00f3n remota de comandos a trav\u00e9s de un documento docx manipulado. Esta es una vulnerabilidad de sobrescritura de archivos. La ejecuci\u00f3n remota de c\u00f3digo (RCE) se puede lograr sobrescribiendo archivos como .bash_rc, .bash_login, etc. RCE se activar\u00e1 cuando el usuario abra la terminal. La versi\u00f3n 6.0.7 contiene un parche para el problema." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +60,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,18 +84,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deepin:deepin_reader:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.0.7", + "matchCriteriaId": "45827122-099F-45C4-9A3D-5558FB225C4D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/linuxdeepin/deepin-reader/commit/4db7a079fb7bd77257b1b9208a7ab26aade8fe04", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/linuxdeepin/deepin-reader/commit/c192fd20a2fe4003e0581c3164489a89e06420c6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-q9jr-726g-9495", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50258.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50258.json index d07486dac9e..43ab8b1bed4 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50258.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50258.json @@ -2,16 +2,40 @@ "id": "CVE-2023-50258", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T17:15:09.530", - "lastModified": "2023-12-22T20:32:34.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:10:06.117", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Medusa is an automatic video library manager for TV shows. Versions prior to 1.0.19 are vulnerable to unauthenticated blind server-side request forgery (SSRF). The `testDiscord` request handler in `medusa/server/web/home/handler.py` does not validate the user-controlled `discord_webhook` variable and passes it to the `notifiers.discord_notifier.test_notify` method, then `_notify_discord` and finally `_send_discord_msg` method, which sends a POST request to the user-controlled URL on line 64 in `/medusa/notifiers/discord.py`, which leads to a blind server-side request forgery. This issue allows for crafting POST requests on behalf of the Medusa server. Version 1.0.19 contains a fix for the issue." + }, + { + "lang": "es", + "value": "Medusa es un administrador autom\u00e1tico de videoteca para programas de televisi\u00f3n. Las versiones anteriores a la 1.0.19 son vulnerables a Blind Server-Side Request Forgery (SSRF) no autenticado. El controlador de solicitudes `testDiscord` en `medusa/server/web/home/handler.py` no valida la variable `discord_webhook` controlada por el usuario y la pasa al m\u00e9todo `notifiers.discord_notifier.test_notify`, luego a `_notify_discord` y finalmente el m\u00e9todo `_send_discord_msg`, que env\u00eda una solicitud POST a la URL controlada por el usuario en la l\u00ednea 64 en `/medusa/notifiers/discord.py`, lo que conduce a blind server-side request forgery. Este problema permite elaborar solicitudes POST en nombre del servidor Medusa. La versi\u00f3n 1.0.19 contiene una soluci\u00f3n para el problema." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,26 +70,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pymedusa:medusa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.19", + "matchCriteriaId": "8CD9BB0B-832D-4ED5-943D-FA54CE61C830" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/pymedusa/Medusa/blob/3d656652ab277e47689483912ed7fc443e7023e8/medusa/notifiers/discord.py#L64", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/pymedusa/Medusa/blob/3d656652ab277e47689483912ed7fc443e7023e8/medusa/server/web/home/handler.py#L158", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/pymedusa/Medusa/releases/tag/v1.0.19", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/pymedusa/Medusa/security/advisories/GHSA-3hph-6586-qv9g", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2023-201_GHSL-2023-202_Medusa/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50259.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50259.json index 1c9b99f71ab..735f29a0f71 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50259.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50259.json @@ -2,16 +2,40 @@ "id": "CVE-2023-50259", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T17:15:09.747", - "lastModified": "2023-12-22T20:32:34.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:07:07.073", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Medusa is an automatic video library manager for TV shows. Versions prior to 1.0.19 are vulnerable to unauthenticated blind server-side request forgery (SSRF). The `testslack` request handler in `medusa/server/web/home/handler.py` does not validate the user-controlled `slack_webhook` variable and passes it to the `notifiers.slack_notifier.test_notify` method, then `_notify_slack` and finally `_send_slack` method, which sends a POST request to the user-controlled URL on line 103 in `/medusa/notifiers/slack.py`, which leads to a blind server-side request forgery (SSRF). This issue allows for crafting POST requests on behalf of the Medusa server. Version 1.0.19 contains a fix for the issue." + }, + { + "lang": "es", + "value": "Medusa es un administrador autom\u00e1tico de videoteca para programas de televisi\u00f3n. Las versiones anteriores a la 1.0.19 son vulnerables a blind server-side request forgery (SSRF) no autenticado. El controlador de solicitudes `testslack` en `medusa/server/web/home/handler.py` no valida la variable `slack_webhook` controlada por el usuario y la pasa al m\u00e9todo `notifiers.slack_notifier.test_notify`, luego a `_notify_slack` y finalmente el m\u00e9todo `_send_slack`, que env\u00eda una solicitud POST a la URL controlada por el usuario en la l\u00ednea 103 en `/medusa/notifiers/slack.py`, lo que conduce a blind server-side request forgery (SSRF). Este problema permite manipular solicitudes POST en nombre del servidor Medusa. La versi\u00f3n 1.0.19 contiene una soluci\u00f3n para el problema." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,26 +70,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pymedusa:medusa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.19", + "matchCriteriaId": "8CD9BB0B-832D-4ED5-943D-FA54CE61C830" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/pymedusa/Medusa/blob/3d656652ab277e47689483912ed7fc443e7023e8/medusa/notifiers/slack.py#L103", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/pymedusa/Medusa/blob/3d656652ab277e47689483912ed7fc443e7023e8/medusa/server/web/home/handler.py#L168", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/pymedusa/Medusa/releases/tag/v1.0.19", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/pymedusa/Medusa/security/advisories/GHSA-8mcr-vffr-jwxv", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2023-201_GHSL-2023-202_Medusa/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51385.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51385.json index f053b89f721..a391f857ec1 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51385.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51385.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51385", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-18T19:15:08.773", - "lastModified": "2023-12-28T03:15:07.990", - "vulnStatus": "Modified", + "lastModified": "2024-01-03T19:40:07.653", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,20 +21,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" }, "exploitabilityScore": 3.9, - "impactScore": 5.9 + "impactScore": 2.5 } ] }, @@ -66,12 +66,41 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2023/12/26/4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a", @@ -82,19 +111,32 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202312-17", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5586", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.openssh.com/txt/release-9.6", diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51451.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51451.json index c5ca2293ee0..372b39ae74c 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51451.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51451.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51451", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:09.297", - "lastModified": "2023-12-25T03:08:20.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:52:26.203", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Symbolicator is a service used in Sentry. Starting in Symbolicator version 0.3.3 and prior to version 21.12.1, an attacker could make Symbolicator send GET HTTP requests to arbitrary URLs with internal IP addresses by using an invalid protocol. The responses of those requests could be exposed via Symbolicator's API. In affected Sentry instances, the data could be exposed through the Sentry API and user interface if the attacker has a registered account. The issue has been fixed in Symbolicator release 23.12.1, Sentry self-hosted release 23.12.1, and has already been mitigated on sentry.io on December 18, 2023. If updating is not possible, some other mitigations are available. One may disable JS processing by toggling the option `Allow JavaScript Source Fetching` in `Organization Settings > Security & Privacy` and/or disable all untrusted public repositories under `Project Settings > Debug Files`. Alternatively, if JavaScript and native symbolication are not required, disable Symbolicator completely in `config.yml`." + }, + { + "lang": "es", + "value": "Symbolicator es un servicio utilizado en Sentry. A partir de la versi\u00f3n 0.3.3 de Symbolicator y antes de la versi\u00f3n 21.12.1, un atacante podr\u00eda hacer que Symbolicator enviara solicitudes HTTP GET a URL arbitrarias con direcciones IP internas mediante el uso de un protocolo no v\u00e1lido. Las respuestas a esas solicitudes podr\u00edan exponerse a trav\u00e9s de la API de Symbolicator. En las instancias de Sentry afectadas, los datos podr\u00edan quedar expuestos a trav\u00e9s de la API de Sentry y la interfaz de usuario si el atacante tiene una cuenta registrada. El problema se solucion\u00f3 en la versi\u00f3n 23.12.1 de Symbolicator, la versi\u00f3n 23.12.1 autohospedada de Sentry y ya se mitig\u00f3 en sentry.io el 18 de diciembre de 2023. Si no es posible actualizar, hay otras mitigaciones disponibles. Se puede deshabilitar el procesamiento de JS activando la opci\u00f3n \"Allow JavaScript Source Fetching\" en \"Organization Settings > Security & Privacy\" y/o deshabilitar todos los repositorios p\u00fablicos que no sean de confianza en \"Project Settings > Debug Files\". Alternativamente, si no se requieren JavaScript ni la simbolizaci\u00f3n nativa, desactive Symbolicator por completo en `config.yml`." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,22 +80,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sentry:symbolicator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.3.3", + "versionEndExcluding": "23.12.1", + "matchCriteriaId": "90A1A7B2-A187-4B37-B3DD-301CC6441B55" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/getsentry/self-hosted/releases/tag/23.12.1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/getsentry/symbolicator/pull/1343", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/getsentry/symbolicator/releases/tag/23.12.1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/getsentry/symbolicator/security/advisories/GHSA-ghg9-7m82-h96r", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mitigation", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51649.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51649.json index fe978a05de5..b33a735c8ec 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51649.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51649.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51649", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T17:15:10.197", - "lastModified": "2023-12-22T20:32:34.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:05:01.863", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. When submitting a Job to run via a Job Button, only the model-level `extras.run_job` permission is checked (i.e., does the user have permission to run Jobs in general). Object-level permissions (i.e., does the user have permission to run this specific Job?) are not enforced by the URL/view used in this case. A user with permissions to run even a single Job can actually run all configured JobButton Jobs. Fix will be available in Nautobot 1.6.8 and 2.1.0 " + }, + { + "lang": "es", + "value": "Nautobot es una Network Automation Platform y Network Source of Truth creada como una aplicaci\u00f3n web sobre el marco Django Python con una base de datos PostgreSQL o MySQL. Al enviar un job para ejecutar a trav\u00e9s de un bot\u00f3n de job, solo se verifica el permiso `extras.run_job` a nivel de modelo (es decir, si el usuario tiene permiso para ejecutar jobs en general). Los permisos a nivel de objeto (es decir, \u00bftiene el usuario permiso para ejecutar este trabajo espec\u00edfico?) no se aplican mediante la URL/vista utilizada en este caso. Un usuario con permisos para ejecutar incluso un solo job puede ejecutar todos los jobs de JobButton configurados. La soluci\u00f3n estar\u00e1 disponible en Nautobot 1.6.8 y 2.1.0" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,22 +70,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.5.14", + "versionEndExcluding": "1.6.8", + "matchCriteriaId": "882A82E9-9E77-42C7-9BF0-B9043343580F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.1.0", + "matchCriteriaId": "FAFB640A-21BF-41F2-B824-50336FF393B0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nautobot/nautobot/issues/4988", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/nautobot/nautobot/pull/4993", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/nautobot/nautobot/pull/4995", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-vf5m-xrhm-v999", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51650.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51650.json index 64e42285e6d..5c9bf983627 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51650.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51650.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51650", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:09.503", - "lastModified": "2023-12-25T03:08:20.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T19:53:37.357", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Hertzbeat is an open source, real-time monitoring system. Prior to version 1.4.1, Spring Boot permission configuration issues caused unauthorized access vulnerabilities to three interfaces. This could result in disclosure of sensitive server information. Version 1.4.1 fixes this issue.\n" + }, + { + "lang": "es", + "value": "Hertzbeat es un sistema de monitoreo en tiempo real de c\u00f3digo abierto. Antes de la versi\u00f3n 1.4.1, los problemas de configuraci\u00f3n de permisos de Spring Boot provocaban vulnerabilidades de acceso no autorizado a tres interfaces. Esto podr\u00eda resultar en la divulgaci\u00f3n de informaci\u00f3n confidencial del servidor. La versi\u00f3n 1.4.1 soluciona este problema." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +70,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dromara:hertzbeat:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.1", + "matchCriteriaId": "FA9DA6B7-E31D-4037-BB20-38E777BF59BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/dromara/hertzbeat/releases/tag/v1.4.1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/dromara/hertzbeat/security/advisories/GHSA-rrc5-qpxr-5jm2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51662.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51662.json index 99bc5291c1d..154d0afc379 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51662.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51662.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51662", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T17:15:10.413", - "lastModified": "2023-12-22T20:32:34.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T19:27:28.663", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Snowflake .NET driver provides an interface to the Microsoft .NET open source software framework for developing applications. Snowflake recently received a report about a vulnerability in the Snowflake Connector .NET where the checks against the Certificate Revocation List (CRL) were not performed where the insecureMode flag was set to false, which is the default setting. The vulnerability affects versions between 2.0.25 and 2.1.4 (inclusive). Snowflake fixed the issue in version 2.1.5." + }, + { + "lang": "es", + "value": "El controlador Snowflake .NET proporciona una interfaz para el framework de software de c\u00f3digo abierto Microsoft .NET para desarrollar aplicaciones. Snowflake recibi\u00f3 recientemente un informe sobre una vulnerabilidad en Snowflake Connector .NET donde no se realizaron las verificaciones de la Lista de revocaci\u00f3n de certificados (CRL) cuando el indicador insecureMode estaba establecido en falso, que es la configuraci\u00f3n predeterminada. La vulnerabilidad afecta a las versiones entre 2.0.25 y 2.1.4 (inclusive). Snowflake solucion\u00f3 el problema en la versi\u00f3n 2.1.5." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +70,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:snowflake:snowflake_connector:*:*:*:*:*:.net:*:*", + "versionStartIncluding": "2.0.25", + "versionEndExcluding": "2.1.5", + "matchCriteriaId": "B30751F1-BB84-4574-BF03-4633B0F8A6CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.snowflake.com/release-notes/clients-drivers/dotnet-2023#version-2-1-5-december-18-2023", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/snowflakedb/snowflake-connector-net/security/advisories/GHSA-hwcc-4cv8-cf3h", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51763.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51763.json index 71105954197..cff8179eb5e 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51763.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51763.json @@ -2,27 +2,93 @@ "id": "CVE-2023-51763", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-24T04:15:07.633", - "lastModified": "2023-12-25T03:08:09.833", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:54:40.243", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "csv_builder.rb in ActiveAdmin (aka Active Admin) before 3.2.0 allows CSV injection." + }, + { + "lang": "es", + "value": "csv_builder.rb en ActiveAdmin (tambi\u00e9n conocido como Active Admin) anterior a 3.2.0 permite la inyecci\u00f3n de CSV." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1236" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:activeadmin:active_admin:*:*:*:*:*:ruby_on_rails:*:*", + "versionEndExcluding": "3.2.0", + "matchCriteriaId": "853F2CE2-FAAA-4FAE-A24B-7551874574D1" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/activeadmin/activeadmin/commit/697be2b183491beadc8f0b7d8b5bfb44f2387909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/activeadmin/activeadmin/pull/8161", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/activeadmin/activeadmin/releases/tag/v3.2.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51772.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51772.json index 2f3ff0dbdb1..c78f2ddb8ea 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51772.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51772.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51772", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-25T06:15:08.580", - "lastModified": "2023-12-26T20:34:16.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:37:31.497", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,74 @@ "value": "One Identity Password Manager anterior a 5.13.1 permite Kiosk Escape. Este producto permite a los usuarios restablecer sus contrase\u00f1as de Active Directory en la pantalla de inicio de sesi\u00f3n de un cliente de Windows. Inicia un navegador basado en Chromium en modo quiosco para proporcionar la funcionalidad de reinicio. La secuencia de escape es: espere a que se agote el tiempo de espera de la sesi\u00f3n, haga clic en el \u00edcono de Ayuda, observe que hay una ventana del navegador para el sitio web de One Identity, navegue a cualquier sitio web que ofrezca carga de archivos, navegue a cmd.exe desde la ventana del explorador de archivos, e inicie cmd.exe como NT AUTHORITY\\SYSTEM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oneidentity:password_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.13.1", + "matchCriteriaId": "9BB9DDED-0454-482A-B760-D59409637901" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec-consult.com/vulnerability-lab/advisory/kiosk-escape-privilege-escalation-one-identity-password-manager-secure-password-extension/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.oneidentity.com/products/password-manager/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5215.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5215.json index 398399ab54e..dc4b4ccf522 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5215.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5215.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5215", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-28T14:15:26.117", - "lastModified": "2023-11-07T04:23:36.993", - "vulnStatus": "Modified", + "lastModified": "2024-01-03T19:03:11.570", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,23 +21,23 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 6.5, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 + "exploitabilityScore": 2.8, + "impactScore": 3.6 }, { - "source": "53f830b8-0a3f-465b-8143-3b8a9948e749", + "source": "secalert@redhat.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -70,7 +70,7 @@ ] }, { - "source": "53f830b8-0a3f-465b-8143-3b8a9948e749", + "source": "secalert@redhat.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5879.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5879.json new file mode 100644 index 00000000000..d3cc6af7b22 --- /dev/null +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5879.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-5879", + "sourceIdentifier": "cve@rapid7.con", + "published": "2024-01-03T20:15:21.737", + "lastModified": "2024-01-03T20:15:21.737", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Users\u2019 product account authentication data was stored in clear text in The Genie Company Aladdin Connect Mobile Application Version 5.65 Build 2075 (and below) on Android Devices. This allows the attacker, with access to the android device, to potentially retrieve users' clear text authentication credentials.\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cve@rapid7.con", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "references": [ + { + "url": "https://www.rapid7.com/blog/post/2024/01/03/genie-aladdin-connect-retrofit-garage-door-opener-multiple-vulnerabilities/", + "source": "cve@rapid7.con" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5880.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5880.json new file mode 100644 index 00000000000..3c9e8b48524 --- /dev/null +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5880.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-5880", + "sourceIdentifier": "cve@rapid7.con", + "published": "2024-01-03T20:15:21.833", + "lastModified": "2024-01-03T20:15:21.833", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "When the Genie Company Aladdin Connect garage door opener (Retrofit-Kit Model ALDCM) is placed into configuration mode the web servers \u201cGarage Door Control Module Setup\u201d page is vulnerable to XSS via a broadcast SSID name containing malicious code with client side Java Script and/or HTML. This allows the attacker to inject malicious\u00a0code with client side Java Script and/or HTML into the users' web browser.\u00a0\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cve@rapid7.con", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.rapid7.com/blog/post/2024/01/03/genie-aladdin-connect-retrofit-garage-door-opener-multiple-vulnerabilities/", + "source": "cve@rapid7.con" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5881.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5881.json new file mode 100644 index 00000000000..a5157f03d18 --- /dev/null +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5881.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-5881", + "sourceIdentifier": "cve@rapid7.con", + "published": "2024-01-03T20:15:21.903", + "lastModified": "2024-01-03T20:15:21.903", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unauthenticated access permitted to web interface page The Genie Company Aladdin Connect (Retrofit-Kit Model ALDCM) \"Garage Door Control Module Setup\" and modify the Garage door's SSID settings. \n\n\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cve@rapid7.con", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://www.rapid7.com/blog/post/2024/01/03/genie-aladdin-connect-retrofit-garage-door-opener-multiple-vulnerabilities/", + "source": "cve@rapid7.con" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5962.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5962.json index 0df76d1bcef..86ab9991187 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5962.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5962.json @@ -2,16 +2,40 @@ "id": "CVE-2023-5962", "sourceIdentifier": "psirt@moxa.com", "published": "2023-12-23T09:15:08.050", - "lastModified": "2023-12-25T03:08:20.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:04:06.947", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization.\n\n" + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de algoritmo criptogr\u00e1fico d\u00e9bil en las versiones de firmware de la serie ioLogik E1200 v3.3 y anteriores. Esta vulnerabilidad puede ayudar a un atacante a comprometer la confidencialidad de datos confidenciales. Esta vulnerabilidad puede llevar a un atacante a obtener una autorizaci\u00f3n inesperada." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "psirt@moxa.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + }, { "source": "psirt@moxa.com", "type": "Secondary", @@ -46,10 +80,295 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:moxa:iologik_e1210_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3", + "matchCriteriaId": "CF14969B-6E9F-4553-96EB-7BE6C5834260" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:moxa:iologik_e1210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "67DDCD42-10D5-46B2-AB91-66EF30D5D645" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:moxa:iologik_e1211_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3", + "matchCriteriaId": "D03FA4E2-4A30-4ED9-BA4D-5546FC0BA939" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:moxa:iologik_e1211:-:*:*:*:*:*:*:*", + "matchCriteriaId": "308E46FB-488A-4907-9A69-AACDE23A3394" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:moxa:iologik_e1212_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3", + "matchCriteriaId": "BA133D93-4A1D-419A-92C5-C0C0A35187B5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:moxa:iologik_e1212:-:*:*:*:*:*:*:*", + "matchCriteriaId": "616E5D0B-0D3A-4808-8C15-2FDC35E8605C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:moxa:iologik_e1213_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3", + "matchCriteriaId": "6E39755B-9625-4D95-B425-BD28B60180CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:moxa:iologik_e1213:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9AAE4F4E-779C-401F-A75E-AC66757DD313" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:moxa:iologik_e1214_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3", + "matchCriteriaId": "F59B517D-63C4-4FE5-A89F-B2A235E8239A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:moxa:iologik_e1214:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0837606-60F7-4563-8F80-AE7C1CC3F469" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:moxa:iologik_e1240_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3", + "matchCriteriaId": "90601A69-F749-4E68-A034-74B9F046436F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:moxa:iologik_e1240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77A9D90D-0419-410C-AF65-0FFE0FF2882F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:moxa:iologik_e1241_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3", + "matchCriteriaId": "38280BA6-C262-45AC-AD33-813523F64DAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:moxa:iologik_e1241:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3239D045-8A7C-4407-B77C-E82C178D8B90" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:moxa:iologik_e1242_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3", + "matchCriteriaId": "EB237801-4287-4A30-8CE8-DB90FAB5C118" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:moxa:iologik_e1242:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D40DF4C-0EA9-44B0-8D8C-D1FC2AB5A357" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:moxa:iologik_e1260_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3", + "matchCriteriaId": "ACDAE3E7-675E-44BF-BD57-BF5C31B969A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:moxa:iologik_e1260:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0B4FA04-BF84-4B8A-A295-0312A3790F2E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:moxa:iologik_e1262_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3", + "matchCriteriaId": "485CCB1F-A642-48B2-A8AD-4A7EBB5791BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:moxa:iologik_e1262:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3366C39B-50FD-497B-A6A1-875CEB8913C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-235250-iologik-e1200-series-web-server-vulnerability", - "source": "psirt@moxa.com" + "source": "psirt@moxa.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7090.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7090.json index 0c016f5e439..1b1f20da2d4 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7090.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7090.json @@ -2,16 +2,40 @@ "id": "CVE-2023-7090", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-23T23:15:07.560", - "lastModified": "2023-12-25T03:08:09.833", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:22:11.147", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en sudo en el manejo de ipa_hostname, donde ipa_hostname de /etc/sssd/sssd.conf no se propag\u00f3 en sudo. Por lo tanto, genera una vulnerabilidad de mala gesti\u00f3n de privilegios en las aplicaciones, donde los hosts de los clientes conservan los privilegios incluso despu\u00e9s de retirarlos." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -46,18 +80,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.28", + "matchCriteriaId": "07F52D32-AC76-42B8-B59F-57D5E36010CB" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-7090", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255723", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://www.sudo.ws/releases/legacy/#1.8.28", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7094.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7094.json index e2672dc469b..a23176d69da 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7094.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7094.json @@ -2,16 +2,40 @@ "id": "CVE-2023-7094", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-25T00:15:08.677", - "lastModified": "2023-12-25T03:08:09.833", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:33:22.497", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected by this vulnerability is an unknown functionality of the file /protocol/nsasg6.0.tgz. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248941 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Netentsec NS-ASG Application Security Gateway 6.3 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /protocol/nsasg6.0.tgz es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la divulgaci\u00f3n de informaci\u00f3n. El ataque se puede lanzar de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-248941. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna forma." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -61,8 +85,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -71,18 +105,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "7A708923-EF5F-4F53-86F3-DF0366E6FB58" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.248941", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.248941", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.yuque.com/wangjie-0l1rh/prbq8b/iyxa0t8rntyve4s0?singleDoc#%20%E3%80%8AThe%20information%20disclosure%20vulnerability%20in%20the%20Netentsec%20NS-ASG%20Application%20Security%20Gateway%E3%80%8B", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7095.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7095.json index abbeb690461..35eff0e5ac1 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7095.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7095.json @@ -2,16 +2,40 @@ "id": "CVE-2023-7095", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-25T01:15:08.203", - "lastModified": "2023-12-25T03:08:09.833", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-03T20:24:59.943", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Totolink A7100RU 7.4cu.2313_B20191024. Affected by this issue is the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument flag leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248942 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Totolink A7100RU 7.4cu.2313_B20191024 y clasificada como cr\u00edtica. La funci\u00f3n main del archivo /cgi-bin/cstecgi.cgi?action=login del componente HTTP POST Request Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del indicador de argumento provoca un desbordamiento de b\u00fafer. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-248942 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -71,18 +95,58 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a7100ru_firmware:7.4cu.2313_b20191024:*:*:*:*:*:*:*", + "matchCriteriaId": "83C47206-6608-4258-A2FE-D15C5637192D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a7100ru:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7DD0831-0EB3-4F09-B4E4-6165E53AB6A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/unpWn4bL3/iot-security/blob/main/2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.248942", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.248942", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 81ad3e72a26..2b519ffe892 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-03T19:00:24.743087+00:00 +2024-01-03T21:00:24.516862+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-03T18:55:45.153000+00:00 +2024-01-03T20:57:31.317000+00:00 ``` ### Last Data Feed Release @@ -29,51 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -234814 +234819 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `5` -* [CVE-2023-46739](CVE-2023/CVE-2023-467xx/CVE-2023-46739.json) (`2024-01-03T17:15:10.303`) -* [CVE-2023-46740](CVE-2023/CVE-2023-467xx/CVE-2023-46740.json) (`2024-01-03T17:15:10.590`) -* [CVE-2023-46741](CVE-2023/CVE-2023-467xx/CVE-2023-46741.json) (`2024-01-03T17:15:10.797`) -* [CVE-2023-46742](CVE-2023/CVE-2023-467xx/CVE-2023-46742.json) (`2024-01-03T17:15:11.010`) -* [CVE-2023-50253](CVE-2023/CVE-2023-502xx/CVE-2023-50253.json) (`2024-01-03T17:15:11.387`) -* [CVE-2023-6004](CVE-2023/CVE-2023-60xx/CVE-2023-6004.json) (`2024-01-03T17:15:11.623`) -* [CVE-2024-0217](CVE-2024/CVE-2024-02xx/CVE-2024-0217.json) (`2024-01-03T17:15:12.110`) -* [CVE-2024-21622](CVE-2024/CVE-2024-216xx/CVE-2024-21622.json) (`2024-01-03T17:15:12.330`) -* [CVE-2024-21631](CVE-2024/CVE-2024-216xx/CVE-2024-21631.json) (`2024-01-03T17:15:12.790`) -* [CVE-2024-21633](CVE-2024/CVE-2024-216xx/CVE-2024-21633.json) (`2024-01-03T17:15:13.103`) +* [CVE-2023-46929](CVE-2023/CVE-2023-469xx/CVE-2023-46929.json) (`2024-01-03T19:15:08.390`) +* [CVE-2023-50090](CVE-2023/CVE-2023-500xx/CVE-2023-50090.json) (`2024-01-03T20:15:21.660`) +* [CVE-2023-5879](CVE-2023/CVE-2023-58xx/CVE-2023-5879.json) (`2024-01-03T20:15:21.737`) +* [CVE-2023-5880](CVE-2023/CVE-2023-58xx/CVE-2023-5880.json) (`2024-01-03T20:15:21.833`) +* [CVE-2023-5881](CVE-2023/CVE-2023-58xx/CVE-2023-5881.json) (`2024-01-03T20:15:21.903`) ### CVEs modified in the last Commit -Recently modified CVEs: `22` - -* [CVE-2014-125108](CVE-2014/CVE-2014-1251xx/CVE-2014-125108.json) (`2024-01-03T18:34:51.040`) -* [CVE-2019-15592](CVE-2019/CVE-2019-155xx/CVE-2019-15592.json) (`2024-01-03T18:55:45.153`) -* [CVE-2021-45967](CVE-2021/CVE-2021-459xx/CVE-2021-45967.json) (`2024-01-03T18:55:26.920`) -* [CVE-2023-7042](CVE-2023/CVE-2023-70xx/CVE-2023-7042.json) (`2024-01-03T17:05:12.947`) -* [CVE-2023-6348](CVE-2023/CVE-2023-63xx/CVE-2023-6348.json) (`2024-01-03T17:15:11.823`) -* [CVE-2023-7101](CVE-2023/CVE-2023-71xx/CVE-2023-7101.json) (`2024-01-03T17:15:11.930`) -* [CVE-2023-41097](CVE-2023/CVE-2023-410xx/CVE-2023-41097.json) (`2024-01-03T17:22:03.797`) -* [CVE-2023-37607](CVE-2023/CVE-2023-376xx/CVE-2023-37607.json) (`2024-01-03T17:26:57.957`) -* [CVE-2023-50093](CVE-2023/CVE-2023-500xx/CVE-2023-50093.json) (`2024-01-03T17:26:57.957`) -* [CVE-2023-45559](CVE-2023/CVE-2023-455xx/CVE-2023-45559.json) (`2024-01-03T17:26:57.957`) -* [CVE-2023-30617](CVE-2023/CVE-2023-306xx/CVE-2023-30617.json) (`2024-01-03T17:26:57.957`) -* [CVE-2023-46738](CVE-2023/CVE-2023-467xx/CVE-2023-46738.json) (`2024-01-03T17:26:57.957`) -* [CVE-2023-42465](CVE-2023/CVE-2023-424xx/CVE-2023-42465.json) (`2024-01-03T17:40:23.540`) -* [CVE-2023-51387](CVE-2023/CVE-2023-513xx/CVE-2023-51387.json) (`2024-01-03T17:43:59.510`) -* [CVE-2023-51449](CVE-2023/CVE-2023-514xx/CVE-2023-51449.json) (`2024-01-03T17:57:42.490`) -* [CVE-2023-51651](CVE-2023/CVE-2023-516xx/CVE-2023-51651.json) (`2024-01-03T18:32:41.760`) -* [CVE-2024-0193](CVE-2024/CVE-2024-01xx/CVE-2024-0193.json) (`2024-01-03T17:15:12.000`) -* [CVE-2024-21907](CVE-2024/CVE-2024-219xx/CVE-2024-21907.json) (`2024-01-03T17:26:57.957`) -* [CVE-2024-21908](CVE-2024/CVE-2024-219xx/CVE-2024-21908.json) (`2024-01-03T17:26:57.957`) -* [CVE-2024-21909](CVE-2024/CVE-2024-219xx/CVE-2024-21909.json) (`2024-01-03T17:26:57.957`) -* [CVE-2024-21910](CVE-2024/CVE-2024-219xx/CVE-2024-21910.json) (`2024-01-03T17:26:57.957`) -* [CVE-2024-21911](CVE-2024/CVE-2024-219xx/CVE-2024-21911.json) (`2024-01-03T17:26:57.957`) +Recently modified CVEs: `24` + +* [CVE-2016-15036](CVE-2016/CVE-2016-150xx/CVE-2016-15036.json) (`2024-01-03T20:48:43.957`) +* [CVE-2022-43675](CVE-2022/CVE-2022-436xx/CVE-2022-43675.json) (`2024-01-03T20:57:31.317`) +* [CVE-2023-31417](CVE-2023/CVE-2023-314xx/CVE-2023-31417.json) (`2024-01-03T19:02:34.430`) +* [CVE-2023-5215](CVE-2023/CVE-2023-52xx/CVE-2023-5215.json) (`2024-01-03T19:03:11.570`) +* [CVE-2023-51662](CVE-2023/CVE-2023-516xx/CVE-2023-51662.json) (`2024-01-03T19:27:28.663`) +* [CVE-2023-51385](CVE-2023/CVE-2023-513xx/CVE-2023-51385.json) (`2024-01-03T19:40:07.653`) +* [CVE-2023-51650](CVE-2023/CVE-2023-516xx/CVE-2023-51650.json) (`2024-01-03T19:53:37.357`) +* [CVE-2023-5962](CVE-2023/CVE-2023-59xx/CVE-2023-5962.json) (`2024-01-03T20:04:06.947`) +* [CVE-2023-51649](CVE-2023/CVE-2023-516xx/CVE-2023-51649.json) (`2024-01-03T20:05:01.863`) +* [CVE-2023-50259](CVE-2023/CVE-2023-502xx/CVE-2023-50259.json) (`2024-01-03T20:07:07.073`) +* [CVE-2023-50258](CVE-2023/CVE-2023-502xx/CVE-2023-50258.json) (`2024-01-03T20:10:06.117`) +* [CVE-2023-50254](CVE-2023/CVE-2023-502xx/CVE-2023-50254.json) (`2024-01-03T20:12:07.347`) +* [CVE-2023-7090](CVE-2023/CVE-2023-70xx/CVE-2023-7090.json) (`2024-01-03T20:22:11.147`) +* [CVE-2023-7095](CVE-2023/CVE-2023-70xx/CVE-2023-7095.json) (`2024-01-03T20:24:59.943`) +* [CVE-2023-7094](CVE-2023/CVE-2023-70xx/CVE-2023-7094.json) (`2024-01-03T20:33:22.497`) +* [CVE-2023-24609](CVE-2023/CVE-2023-246xx/CVE-2023-24609.json) (`2024-01-03T20:34:37.670`) +* [CVE-2023-31297](CVE-2023/CVE-2023-312xx/CVE-2023-31297.json) (`2024-01-03T20:35:00.150`) +* [CVE-2023-28872](CVE-2023/CVE-2023-288xx/CVE-2023-28872.json) (`2024-01-03T20:35:33.797`) +* [CVE-2023-51772](CVE-2023/CVE-2023-517xx/CVE-2023-51772.json) (`2024-01-03T20:37:31.497`) +* [CVE-2023-49594](CVE-2023/CVE-2023-495xx/CVE-2023-49594.json) (`2024-01-03T20:40:02.443`) +* [CVE-2023-49328](CVE-2023/CVE-2023-493xx/CVE-2023-49328.json) (`2024-01-03T20:43:29.493`) +* [CVE-2023-51451](CVE-2023/CVE-2023-514xx/CVE-2023-51451.json) (`2024-01-03T20:52:26.203`) +* [CVE-2023-51763](CVE-2023/CVE-2023-517xx/CVE-2023-51763.json) (`2024-01-03T20:54:40.243`) +* [CVE-2023-48654](CVE-2023/CVE-2023-486xx/CVE-2023-48654.json) (`2024-01-03T20:54:40.840`) ## Download and Usage