Skip to content

Commit

Permalink
NVD Sync 2024-09-18 22:02
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Sep 18, 2024
1 parent 7715189 commit b925f48
Show file tree
Hide file tree
Showing 41 changed files with 41 additions and 22 deletions.
1 change: 1 addition & 0 deletions cpematch/06/067AC494-E4EE-415F-AC47-DE9B11F8E9E3.json
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
{"matchString": {"matchCriteriaId": "067AC494-E4EE-415F-AC47-DE9B11F8E9E3", "criteria": "cpe:2.3:a:eclipse:glassfish:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.1.0", "versionEndExcluding": "7.0.10", "lastModified": "2024-09-18T20:20:07.080", "cpeLastModified": "2024-09-18T20:20:07.080", "created": "2024-09-18T20:20:07.080", "status": "Active", "matches": [{"cpeName": "cpe:2.3:a:eclipse:glassfish:5.1.0:*:*:*:*:*:*:*", "cpeNameId": "6F3FEA54-3C6C-4BEE-94BA-1364110CB6E6"}, {"cpeName": "cpe:2.3:a:eclipse:glassfish:6.0.0:*:*:*:*:*:*:*", "cpeNameId": "4B29D674-9FD9-4A00-9904-DCA5DCA7DA73"}, {"cpeName": "cpe:2.3:a:eclipse:glassfish:6.2.5:*:*:*:*:*:*:*", "cpeNameId": "83F87514-BDC9-4963-878B-B8478AABCD5C"}, {"cpeName": "cpe:2.3:a:eclipse:glassfish:7.0.1:*:*:*:*:*:*:*", "cpeNameId": "EA55C5E2-9671-4227-BBDE-B2F5EE060D07"}]}}
1 change: 1 addition & 0 deletions cpematch/37/379E23C3-E298-4CEF-AEA8-B94BD1CA55BA.json

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions cpematch/80/802905B7-3C3C-4770-AD1D-F0B2C1CE526F.json

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions cpematch/BF/BFC8E15E-FC9F-410E-AEC2-D1D892324A06.json
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
{"matchString": {"matchCriteriaId": "BFC8E15E-FC9F-410E-AEC2-D1D892324A06", "criteria": "cpe:2.3:o:intelbras:incontrol:2.21.56:*:*:*:*:*:*:*", "lastModified": "2024-09-18T20:09:16.393", "cpeLastModified": "2024-09-18T20:09:16.393", "created": "2024-09-18T20:09:16.393", "status": "Active"}}
2 changes: 1 addition & 1 deletion cve/2021/CVE-2021-38131.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"cve": {"id": "CVE-2021-38131", "sourceIdentifier": "[email protected]", "published": "2024-09-12T13:15:09.700", "lastModified": "2024-09-12T18:14:03.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Possible Cross-Site Scripting (XSS) Vulnerability\n\nin eDirectory has been discovered in\nOpenText\u2122 eDirectory 9.2.5.0000."}], "metrics": {"cvssMetricV31": [{"source": "[email protected]", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.3, "impactScore": 2.7}]}, "weaknesses": [{"source": "[email protected]", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://www.netiq.com/documentation/edirectory-92/edirectory926_releasenotes/data/edirectory926_releasenotes.html", "source": "[email protected]"}]}}
{"cve": {"id": "CVE-2021-38131", "sourceIdentifier": "[email protected]", "published": "2024-09-12T13:15:09.700", "lastModified": "2024-09-18T21:00:30.420", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Possible Cross-Site Scripting (XSS) Vulnerability\n\nin eDirectory has been discovered in\nOpenText\u2122 eDirectory 9.2.5.0000."}, {"lang": "es", "value": "Se ha descubierto una posible vulnerabilidad de Cross-site Scripting (XSS) en eDirectory en OpenText\u2122 eDirectory 9.2.5.0000."}], "metrics": {"cvssMetricV31": [{"source": "[email protected]", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, {"source": "[email protected]", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.3, "impactScore": 2.7}]}, "weaknesses": [{"source": "[email protected]", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}, {"source": "[email protected]", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-79"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.2.5.0000", "matchCriteriaId": "622BA2A7-2931-4FCD-938D-EE573BC2AEBA"}]}]}], "references": [{"url": "https://www.netiq.com/documentation/edirectory-92/edirectory926_releasenotes/data/edirectory926_releasenotes.html", "source": "[email protected]", "tags": ["Vendor Advisory"]}]}}
2 changes: 1 addition & 1 deletion cve/2021/CVE-2021-38132.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"cve": {"id": "CVE-2021-38132", "sourceIdentifier": "[email protected]", "published": "2024-09-12T13:15:10.050", "lastModified": "2024-09-12T18:14:03.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Possible \nExternal Service Interaction attack\n\nin eDirectory has been discovered in\nOpenText\u2122 eDirectory. This impact all version before\u00a09.2.6.0000."}], "metrics": {"cvssMetricV31": [{"source": "[email protected]", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 3.9, "impactScore": 1.4}]}, "weaknesses": [{"source": "[email protected]", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-918"}]}], "references": [{"url": "https://www.netiq.com/documentation/edirectory-92/edirectory926_releasenotes/data/edirectory926_releasenotes.html", "source": "[email protected]"}]}}
{"cve": {"id": "CVE-2021-38132", "sourceIdentifier": "[email protected]", "published": "2024-09-12T13:15:10.050", "lastModified": "2024-09-18T21:04:11.840", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Possible \nExternal Service Interaction attack\n\nin eDirectory has been discovered in\nOpenText\u2122 eDirectory. This impact all version before\u00a09.2.6.0000."}, {"lang": "es", "value": "Se ha descubierto un posible ataque de interacci\u00f3n con servicios externos en eDirectory en OpenText\u2122 eDirectory. Esto afecta a todas las versiones anteriores a la 9.2.6.0000."}], "metrics": {"cvssMetricV31": [{"source": "[email protected]", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, {"source": "[email protected]", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 3.9, "impactScore": 1.4}]}, "weaknesses": [{"source": "[email protected]", "type": "Primary", "description": [{"lang": "en", "value": "CWE-918"}]}, {"source": "[email protected]", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-918"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.2.6.0000", "matchCriteriaId": "F14727F8-891A-4798-8A8B-F19EFE574D91"}]}]}], "references": [{"url": "https://www.netiq.com/documentation/edirectory-92/edirectory926_releasenotes/data/edirectory926_releasenotes.html", "source": "[email protected]", "tags": ["Vendor Advisory"]}]}}
2 changes: 1 addition & 1 deletion cve/2021/CVE-2021-38133.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"cve": {"id": "CVE-2021-38133", "sourceIdentifier": "[email protected]", "published": "2024-09-12T13:15:10.327", "lastModified": "2024-09-12T18:14:03.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [{"lang": "en", "value": "Possible \nExternal Service Interaction attack\n\nin eDirectory has been discovered in\nOpenText\u2122 eDirectory. This impact all version before\u00a09.2.6.0000."}], "metrics": {"cvssMetricV31": [{"source": "[email protected]", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 4.0}]}, "weaknesses": [{"source": "[email protected]", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-521"}]}], "references": [{"url": "https://www.netiq.com/documentation/edirectory-92/edirectory926_releasenotes/data/edirectory926_releasenotes.html", "source": "[email protected]"}]}}
{"cve": {"id": "CVE-2021-38133", "sourceIdentifier": "[email protected]", "published": "2024-09-12T13:15:10.327", "lastModified": "2024-09-18T21:05:17.027", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "Possible \nExternal Service Interaction attack\n\nin eDirectory has been discovered in\nOpenText\u2122 eDirectory. This impact all version before\u00a09.2.6.0000."}, {"lang": "es", "value": "Se ha descubierto un posible ataque de interacci\u00f3n con servicios externos en eDirectory en OpenText\u2122 eDirectory. Esto afecta a todas las versiones anteriores a la 9.2.6.0000."}], "metrics": {"cvssMetricV31": [{"source": "[email protected]", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, {"source": "[email protected]", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 4.0}]}, "weaknesses": [{"source": "[email protected]", "type": "Primary", "description": [{"lang": "en", "value": "CWE-521"}]}, {"source": "[email protected]", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-521"}]}], "configurations": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.2.6.0000", "matchCriteriaId": "F14727F8-891A-4798-8A8B-F19EFE574D91"}]}]}], "references": [{"url": "https://www.netiq.com/documentation/edirectory-92/edirectory926_releasenotes/data/edirectory926_releasenotes.html", "source": "[email protected]", "tags": ["Vendor Advisory"]}]}}
1 change: 1 addition & 0 deletions cve/2022/CVE-2022-25768.json
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
{"cve": {"id": "CVE-2022-25768", "sourceIdentifier": "[email protected]", "published": "2024-09-18T21:15:12.860", "lastModified": "2024-09-18T21:15:12.860", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "The logic in place to facilitate the update process via the user interface lacks access control to verify if permission exists to perform the tasks. Prior to this patch being applied it might be possible for an attacker to access the Mautic version number or to execute parts of the upgrade process without permission. As upgrading in the user interface is deprecated, this functionality is no longer required."}], "metrics": {"cvssMetricV31": [{"source": "[email protected]", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.2, "impactScore": 4.7}]}, "weaknesses": [{"source": "[email protected]", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-287"}]}], "references": [{"url": "https://github.com/mautic/mautic/security/advisories/GHSA-x3jx-5w6m-q2fc", "source": "[email protected]"}]}}
1 change: 1 addition & 0 deletions cve/2023/CVE-2023-30464.json
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
{"cve": {"id": "CVE-2023-30464", "sourceIdentifier": "[email protected]", "published": "2024-09-18T21:15:13.080", "lastModified": "2024-09-18T21:15:13.080", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack."}], "metrics": {}, "references": [{"url": "https://gist.github.com/idealeer/e41c7fb3b661d4262d0b6f21e12168ba", "source": "[email protected]"}]}}
2 changes: 1 addition & 1 deletion cve/2023/CVE-2023-44959.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"cve": {"id": "CVE-2023-44959", "sourceIdentifier": "[email protected]", "published": "2023-10-10T03:15:09.923", "lastModified": "2023-10-11T19:17:07.777", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue found in D-Link DSL-3782 v.1.03 and before allows remote authenticated users to execute arbitrary code as root via the Router IP Address fields of the network settings page."}, {"lang": "es", "value": "Un problema encontrado en D-Link DSL-3782 v.1.03 y anteriores permite a usuarios remotos autenticados ejecutar c\u00f3digo arbitrario como root a trav\u00e9s de los campos de Direcci\u00f3n IP del Router de la p\u00e1gina de configuraci\u00f3n de red."}], "metrics": {"cvssMetricV31": [{"source": "[email protected]", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "[email protected]", "type": "Primary", "description": [{"lang": "en", "value": "CWE-77"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:dlink:dsl-3782_firmware:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.03", "matchCriteriaId": "20C4F2D4-37F6-44E7-8681-2D1C7EAC0E5B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:dlink:dsl-3782:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F8D1900-34CB-45D3-8DF3-503E10B75E5B"}]}]}], "references": [{"url": "https://github.com/FzBacon/CVE-2023-27216_D-Link_DSL-3782_Router_command_injection/blob/master/CVE-2023-27216_D-Link_DSL-3782_Router_command_injection.md#cve-2023-27216_d-link_dsl-3782_router_command_injection", "source": "[email protected]", "tags": ["Exploit", "Third Party Advisory"]}]}}
{"cve": {"id": "CVE-2023-44959", "sourceIdentifier": "[email protected]", "published": "2023-10-10T03:15:09.923", "lastModified": "2024-09-18T20:35:03.950", "vulnStatus": "Modified", "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue found in D-Link DSL-3782 v.1.03 and before allows remote authenticated users to execute arbitrary code as root via the Router IP Address fields of the network settings page."}, {"lang": "es", "value": "Un problema encontrado en D-Link DSL-3782 v.1.03 y anteriores permite a usuarios remotos autenticados ejecutar c\u00f3digo arbitrario como root a trav\u00e9s de los campos de Direcci\u00f3n IP del Router de la p\u00e1gina de configuraci\u00f3n de red."}], "metrics": {"cvssMetricV31": [{"source": "[email protected]", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}]}, "weaknesses": [{"source": "[email protected]", "type": "Primary", "description": [{"lang": "en", "value": "CWE-77"}]}, {"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [{"lang": "en", "value": "CWE-77"}]}], "configurations": [{"operator": "AND", "nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:dlink:dsl-3782_firmware:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.03", "matchCriteriaId": "20C4F2D4-37F6-44E7-8681-2D1C7EAC0E5B"}]}, {"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": false, "criteria": "cpe:2.3:h:dlink:dsl-3782:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F8D1900-34CB-45D3-8DF3-503E10B75E5B"}]}]}], "references": [{"url": "https://github.com/FzBacon/CVE-2023-27216_D-Link_DSL-3782_Router_command_injection/blob/master/CVE-2023-27216_D-Link_DSL-3782_Router_command_injection.md#cve-2023-27216_d-link_dsl-3782_router_command_injection", "source": "[email protected]", "tags": ["Exploit", "Third Party Advisory"]}]}}
Loading

0 comments on commit b925f48

Please sign in to comment.