diff --git a/2023/28xxx/CVE-2023-28131.json b/2023/28xxx/CVE-2023-28131.json index f4dbdbe9a17..2dca9f19b2f 100644 --- a/2023/28xxx/CVE-2023-28131.json +++ b/2023/28xxx/CVE-2023-28131.json @@ -48,6 +48,11 @@ "url": "https://blog.expo.dev/security-advisory-for-developers-using-authsessions-useproxy-options-and-auth-expo-io-e470fe9346df", "refsource": "MISC", "name": "https://blog.expo.dev/security-advisory-for-developers-using-authsessions-useproxy-options-and-auth-expo-io-e470fe9346df" + }, + { + "refsource": "MISC", + "name": "https://www.darkreading.com/endpoint/oauth-flaw-in-expo-platform-affects-hundreds-of-third-party-sites-apps", + "url": "https://www.darkreading.com/endpoint/oauth-flaw-in-expo-platform-affects-hundreds-of-third-party-sites-apps" } ] }, diff --git a/2023/2xxx/CVE-2023-2900.json b/2023/2xxx/CVE-2023-2900.json new file mode 100644 index 00000000000..1b03a1147ea --- /dev/null +++ b/2023/2xxx/CVE-2023-2900.json @@ -0,0 +1,106 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2023-2900", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability was found in NFine Rapid Development Platform 20230511. It has been classified as problematic. Affected is an unknown function of the file /Login/CheckLogin. The manipulation leads to use of weak hash. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-229974 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Es wurde eine problematische Schwachstelle in NFine Rapid Development Platform 20230511 ausgemacht. Betroffen hiervon ist ein unbekannter Ablauf der Datei /Login/CheckLogin. Durch Manipulieren mit unbekannten Daten kann eine use of weak hash-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie gilt als schwierig auszunutzen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-328 Use of Weak Hash", + "cweId": "CWE-328" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NFine", + "product": { + "product_data": [ + { + "product_name": "Rapid Development Platform", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "20230511" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.229974", + "refsource": "MISC", + "name": "https://vuldb.com/?id.229974" + }, + { + "url": "https://vuldb.com/?ctiid.229974", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.229974" + }, + { + "url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine-Rapid-development-platform-has-weak-password-vulnerability.md", + "refsource": "MISC", + "name": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine-Rapid-development-platform-has-weak-password-vulnerability.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "webray.com.cn (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.7, + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.7, + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 2.6, + "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseSeverity": "LOW" + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2901.json b/2023/2xxx/CVE-2023-2901.json new file mode 100644 index 00000000000..f90a4310f81 --- /dev/null +++ b/2023/2xxx/CVE-2023-2901.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2901", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2902.json b/2023/2xxx/CVE-2023-2902.json new file mode 100644 index 00000000000..3604de42af9 --- /dev/null +++ b/2023/2xxx/CVE-2023-2902.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2902", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2903.json b/2023/2xxx/CVE-2023-2903.json new file mode 100644 index 00000000000..b18f88c2574 --- /dev/null +++ b/2023/2xxx/CVE-2023-2903.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2903", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file