Auto-Update: 2023-12-22T15:00:24.651577+00:00

This commit is contained in:
cad-safe-bot 2023-12-22 15:00:28 +00:00
parent 7a6fcf0e8c
commit 00fda99e09
61 changed files with 578 additions and 128 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-8343",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-02-15T07:29:00.553",
"lastModified": "2019-02-15T13:52:11.560",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:08.127",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -101,6 +101,10 @@
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-09",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-21528",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:13.803",
"lastModified": "2023-08-25T18:05:21.120",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:08.300",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -77,6 +77,10 @@
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-09",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-41617",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-09-26T19:15:07.263",
"lastModified": "2023-11-07T03:38:59.313",
"lastModified": "2023-12-22T13:15:08.413",
"vulnStatus": "Modified",
"descriptions": [
{
@ -282,6 +282,10 @@
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5586",
"source": "cve@mitre.org"
},
{
"url": "https://www.openssh.com/security.html",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-44370",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-29T20:15:07.250",
"lastModified": "2023-06-06T13:41:58.380",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:08.587",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -78,6 +78,10 @@
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-09",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1729",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-15T22:15:10.350",
"lastModified": "2023-11-07T04:04:42.940",
"lastModified": "2023-12-22T13:15:08.680",
"vulnStatus": "Modified",
"descriptions": [
{
@ -46,7 +46,7 @@
]
},
{
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
@ -151,6 +151,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/",
"source": "secalert@redhat.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-08",
"source": "secalert@redhat.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5412",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20042",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2023-11-01T18:15:08.843",
"lastModified": "2023-11-14T15:56:45.287",
"lastModified": "2023-12-22T15:00:05.587",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -21,20 +21,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
"impactScore": 4.0
},
{
"source": "ykramarz@cisco.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20169",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2023-08-23T19:15:07.893",
"lastModified": "2023-08-31T15:00:30.660",
"lastModified": "2023-12-22T14:59:47.780",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -17,20 +17,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
"impactScore": 4.0
},
{
"source": "ykramarz@cisco.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28531",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-17T04:15:14.553",
"lastModified": "2023-07-21T19:21:51.437",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:08.797",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -105,6 +105,10 @@
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5586",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2023/03/15/8",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4068",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.513",
"lastModified": "2023-11-25T11:15:19.940",
"lastModified": "2023-12-22T13:15:09.043",
"vulnStatus": "Modified",
"descriptions": [
{
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4069",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.583",
"lastModified": "2023-11-25T11:15:20.020",
"lastModified": "2023-12-22T13:15:09.140",
"vulnStatus": "Modified",
"descriptions": [
{
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4070",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.647",
"lastModified": "2023-11-25T11:15:20.090",
"lastModified": "2023-12-22T13:15:09.207",
"vulnStatus": "Modified",
"descriptions": [
{
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4071",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.710",
"lastModified": "2023-11-25T11:15:20.153",
"lastModified": "2023-12-22T13:15:09.273",
"vulnStatus": "Modified",
"descriptions": [
{
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4072",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.773",
"lastModified": "2023-11-25T11:15:20.220",
"lastModified": "2023-12-22T13:15:09.327",
"vulnStatus": "Modified",
"descriptions": [
{
@ -92,6 +92,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4073",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.840",
"lastModified": "2023-11-25T11:15:20.290",
"lastModified": "2023-12-22T13:15:09.387",
"vulnStatus": "Modified",
"descriptions": [
{
@ -129,6 +129,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4074",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.903",
"lastModified": "2023-11-25T11:15:20.420",
"lastModified": "2023-12-22T13:15:09.453",
"vulnStatus": "Modified",
"descriptions": [
{
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4075",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.973",
"lastModified": "2023-11-25T11:15:20.500",
"lastModified": "2023-12-22T13:15:09.517",
"vulnStatus": "Modified",
"descriptions": [
{
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4076",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:12.037",
"lastModified": "2023-11-25T11:15:20.693",
"lastModified": "2023-12-22T13:15:09.583",
"vulnStatus": "Modified",
"descriptions": [
{
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4077",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:12.100",
"lastModified": "2023-11-25T11:15:20.787",
"lastModified": "2023-12-22T13:15:09.647",
"vulnStatus": "Modified",
"descriptions": [
{
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4078",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:12.167",
"lastModified": "2023-11-25T11:15:20.857",
"lastModified": "2023-12-22T13:15:09.707",
"vulnStatus": "Modified",
"descriptions": [
{
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-47787",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-18T16:15:10.097",
"lastModified": "2023-12-18T17:24:19.373",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-22T14:32:43.010",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce WooCommerce Bookings.This issue affects WooCommerce Bookings: from n/a through 2.0.3.\n\n"
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WooCommerce WooCommerce Bookings. Este problema afecta a WooCommerce Bookings: desde n/a hasta 2.0.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automattic:woocommerce_bookings:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.4",
"matchCriteriaId": "47B0C969-F9BB-490A-A421-BC2959DFE43A"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-bookings/wordpress-woocommerce-bookings-plugin-2-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-47789",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-18T16:15:10.313",
"lastModified": "2023-12-18T17:24:19.373",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-22T14:31:39.947",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce Canada Post Shipping Method.This issue affects Canada Post Shipping Method: from n/a through 2.8.3.\n\n"
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WooCommerce Canada Post Shipping Method. Este problema afecta a Canada Post Shipping Method: desde n/a hasta 2.8.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automattic:canada_post_shipping_method:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.8.4",
"matchCriteriaId": "26FA8E82-E87B-4487-8F4A-661973CFF12C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-shipping-canada-post/wordpress-woocommerce-canada-post-shipping-plugin-2-8-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4761",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-05T22:15:09.583",
"lastModified": "2023-11-25T11:15:20.943",
"lastModified": "2023-12-22T13:15:09.790",
"vulnStatus": "Modified",
"descriptions": [
{
@ -156,6 +156,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5491",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4762",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-05T22:15:09.677",
"lastModified": "2023-11-28T01:15:07.410",
"lastModified": "2023-12-22T13:15:09.940",
"vulnStatus": "Modified",
"descriptions": [
{
@ -161,6 +161,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5491",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4763",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-05T22:15:09.777",
"lastModified": "2023-11-25T11:15:21.110",
"lastModified": "2023-12-22T13:15:10.020",
"vulnStatus": "Modified",
"descriptions": [
{
@ -120,6 +120,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5491",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4764",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-05T22:15:09.883",
"lastModified": "2023-11-25T11:15:21.180",
"lastModified": "2023-12-22T13:15:10.100",
"vulnStatus": "Modified",
"descriptions": [
{
@ -120,6 +120,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5491",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48795",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-18T16:15:10.897",
"lastModified": "2023-12-22T04:15:08.980",
"lastModified": "2023-12-22T13:15:08.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -268,6 +268,10 @@
"url": "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5586",
"source": "cve@mitre.org"
},
{
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51384",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-18T19:15:08.720",
"lastModified": "2023-12-22T12:15:42.810",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:10.160",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -76,6 +76,10 @@
"Patch"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5586",
"source": "cve@mitre.org"
},
{
"url": "https://www.openssh.com/txt/release-9.6",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51385",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-18T19:15:08.773",
"lastModified": "2023-12-22T12:15:33.360",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T14:15:06.983",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -76,6 +76,14 @@
"Patch"
]
},
{
"url": "https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5586",
"source": "cve@mitre.org"
},
{
"url": "https://www.openssh.com/txt/release-9.6",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5218",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.443",
"lastModified": "2023-11-25T11:15:21.253",
"lastModified": "2023-12-22T13:15:10.290",
"vulnStatus": "Modified",
"descriptions": [
{
@ -144,6 +144,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5473",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.503",
"lastModified": "2023-11-25T11:15:21.333",
"lastModified": "2023-12-22T13:15:10.370",
"vulnStatus": "Modified",
"descriptions": [
{
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5474",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.557",
"lastModified": "2023-11-25T11:15:21.403",
"lastModified": "2023-12-22T13:15:10.457",
"vulnStatus": "Modified",
"descriptions": [
{
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5475",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.603",
"lastModified": "2023-11-25T11:15:21.530",
"lastModified": "2023-12-22T13:15:10.600",
"vulnStatus": "Modified",
"descriptions": [
{
@ -144,6 +144,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5476",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.650",
"lastModified": "2023-11-25T11:15:21.620",
"lastModified": "2023-12-22T13:15:10.680",
"vulnStatus": "Modified",
"descriptions": [
{
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5477",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.700",
"lastModified": "2023-11-25T11:15:21.697",
"lastModified": "2023-12-22T13:15:10.747",
"vulnStatus": "Modified",
"descriptions": [
{
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5478",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.747",
"lastModified": "2023-11-25T11:15:21.760",
"lastModified": "2023-12-22T13:15:10.830",
"vulnStatus": "Modified",
"descriptions": [
{
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5479",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.797",
"lastModified": "2023-11-25T11:15:21.953",
"lastModified": "2023-12-22T13:15:10.903",
"vulnStatus": "Modified",
"descriptions": [
{
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5480",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:09.930",
"lastModified": "2023-12-13T21:46:02.867",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:10.973",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5481",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.850",
"lastModified": "2023-11-25T11:15:22.240",
"lastModified": "2023-12-22T13:15:11.070",
"vulnStatus": "Modified",
"descriptions": [
{
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5482",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:09.973",
"lastModified": "2023-12-13T21:45:45.527",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:11.130",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5483",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.897",
"lastModified": "2023-11-25T11:15:22.620",
"lastModified": "2023-12-22T13:15:11.210",
"vulnStatus": "Modified",
"descriptions": [
{
@ -109,6 +109,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5484",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.950",
"lastModified": "2023-11-25T11:15:22.710",
"lastModified": "2023-12-22T13:15:11.330",
"vulnStatus": "Modified",
"descriptions": [
{
@ -144,6 +144,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5485",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:11.007",
"lastModified": "2023-11-25T11:15:22.853",
"lastModified": "2023-12-22T13:15:11.477",
"vulnStatus": "Modified",
"descriptions": [
{
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5486",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:11.060",
"lastModified": "2023-11-25T11:15:22.950",
"lastModified": "2023-12-22T13:15:11.593",
"vulnStatus": "Modified",
"descriptions": [
{
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5487",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:11.110",
"lastModified": "2023-11-25T11:15:23.053",
"lastModified": "2023-12-22T13:15:11.650",
"vulnStatus": "Modified",
"descriptions": [
{
@ -139,6 +139,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5849",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.107",
"lastModified": "2023-12-13T21:45:35.673",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:11.717",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5850",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.160",
"lastModified": "2023-12-13T21:39:27.273",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:11.783",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -158,6 +158,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5851",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.207",
"lastModified": "2023-12-13T21:39:13.400",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:11.847",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5852",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.253",
"lastModified": "2023-12-13T21:38:37.770",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:11.923",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5853",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.300",
"lastModified": "2023-12-13T21:38:26.543",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:12.047",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5854",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.343",
"lastModified": "2023-12-13T21:37:20.133",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:12.133",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5855",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.387",
"lastModified": "2023-12-13T21:37:03.353",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:12.210",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5856",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.433",
"lastModified": "2023-12-13T21:36:32.260",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:12.273",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5857",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.477",
"lastModified": "2023-12-13T21:36:13.590",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:12.350",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5858",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.517",
"lastModified": "2023-12-13T21:35:54.510",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:12.413",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5859",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.563",
"lastModified": "2023-12-13T21:35:27.487",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-22T13:15:12.480",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5996",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-08T20:15:07.637",
"lastModified": "2023-11-25T11:15:24.920",
"lastModified": "2023-12-22T13:15:12.557",
"vulnStatus": "Modified",
"descriptions": [
{
@ -141,6 +141,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5551",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5997",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-15T18:15:06.873",
"lastModified": "2023-11-28T03:15:07.510",
"lastModified": "2023-12-22T13:15:12.693",
"vulnStatus": "Modified",
"descriptions": [
{
@ -100,6 +100,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5556",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6112",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-15T18:15:06.933",
"lastModified": "2023-11-28T03:15:07.577",
"lastModified": "2023-12-22T13:15:12.793",
"vulnStatus": "Modified",
"descriptions": [
{
@ -120,6 +120,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5556",
"source": "chrome-cve-admin@google.com",

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-6778",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-12-18T15:15:10.030",
"lastModified": "2023-12-18T17:24:19.373",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-22T14:54:34.047",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository allegroai/clearml-server prior to 1.13.0. This vulnerability affects the ClearML Open Source Server which is not designed to be used as a publicly available service. Security recommendations stress it should be placed behind a company firewall or VPN. This vulnerability only affects users within the same organisation (I.e when a malicious party already has access to the internal network and to a user's ClearML login credentials)."
},
{
"lang": "es",
"value": "Cross-Site Scripting (XSS) almacenado en el repositorio de GitHub allegroai/clearml-server anterior a 1.13.0. Esta vulnerabilidad afecta al servidor de c\u00f3digo abierto ClearML, que no est\u00e1 dise\u00f1ado para usarse como un servicio disponible p\u00fablicamente. Las recomendaciones de seguridad enfatizan que debe colocarse detr\u00e1s de un firewall o VPN de la empresa. Esta vulnerabilidad solo afecta a los usuarios dentro de la misma organizaci\u00f3n (es decir, cuando una parte malintencionada ya tiene acceso a la red interna y a las credenciales de inicio de sesi\u00f3n de ClearML de un usuario)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@huntr.dev",
"type": "Secondary",
@ -46,14 +70,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clear:clearml_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.13.0",
"matchCriteriaId": "885DBA48-94E2-4F63-9E10-5AD4CBABBB48"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/allegroai/clearml-server/commit/4684fd5b74af582c894b67a0a06e865c948b763a",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/5f3fffac-0358-48e6-a500-81bac13e0e2b",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2023-7076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-22T14:15:07.093",
"lastModified": "2023-12-22T14:15:07.093",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in slawkens MyAAC up to 0.8.13. It has been declared as problematic. This vulnerability affects unknown code of the file system/pages/bugtracker.php. The manipulation of the argument bug[2]['subject']/bug[2]['text']/report['subject'] leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.8.14 is able to address this issue. The name of the patch is 83a91ec540072d319dd338abff45f8d5ebf48190. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-248848."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/otsoft/myaac/commit/83a91ec540072d319dd338abff45f8d5ebf48190",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/slawkens/myaac/releases/tag/v0.8.14",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.248848",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.248848",
"source": "cna@vuldb.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-12-22T13:00:25.280449+00:00
2023-12-22T15:00:24.651577+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-12-22T12:18:32.690000+00:00
2023-12-22T15:00:05.587000+00:00
```
### Last Data Feed Release
@ -29,47 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
234078
234079
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `1`
* [CVE-2023-49391](CVE-2023/CVE-2023-493xx/CVE-2023-49391.json) (`2023-12-22T11:15:07.517`)
* [CVE-2023-50569](CVE-2023/CVE-2023-505xx/CVE-2023-50569.json) (`2023-12-22T11:15:07.840`)
* [CVE-2023-7075](CVE-2023/CVE-2023-70xx/CVE-2023-7075.json) (`2023-12-22T12:15:27.410`)
* [CVE-2023-7076](CVE-2023/CVE-2023-70xx/CVE-2023-7076.json) (`2023-12-22T14:15:07.093`)
### CVEs modified in the last Commit
Recently modified CVEs: `107`
Recently modified CVEs: `59`
* [CVE-2023-48308](CVE-2023/CVE-2023-483xx/CVE-2023-48308.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-49086](CVE-2023/CVE-2023-490xx/CVE-2023-49086.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-49684](CVE-2023/CVE-2023-496xx/CVE-2023-49684.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-49685](CVE-2023/CVE-2023-496xx/CVE-2023-49685.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-49686](CVE-2023/CVE-2023-496xx/CVE-2023-49686.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-49687](CVE-2023/CVE-2023-496xx/CVE-2023-49687.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-49688](CVE-2023/CVE-2023-496xx/CVE-2023-49688.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-49689](CVE-2023/CVE-2023-496xx/CVE-2023-49689.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-49690](CVE-2023/CVE-2023-496xx/CVE-2023-49690.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-7052](CVE-2023/CVE-2023-70xx/CVE-2023-7052.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-51704](CVE-2023/CVE-2023-517xx/CVE-2023-51704.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-51707](CVE-2023/CVE-2023-517xx/CVE-2023-51707.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-51708](CVE-2023/CVE-2023-517xx/CVE-2023-51708.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-7053](CVE-2023/CVE-2023-70xx/CVE-2023-7053.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-7054](CVE-2023/CVE-2023-70xx/CVE-2023-7054.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-51713](CVE-2023/CVE-2023-517xx/CVE-2023-51713.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-7055](CVE-2023/CVE-2023-70xx/CVE-2023-7055.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-7056](CVE-2023/CVE-2023-70xx/CVE-2023-7056.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-24609](CVE-2023/CVE-2023-246xx/CVE-2023-24609.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-7057](CVE-2023/CVE-2023-70xx/CVE-2023-7057.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-7058](CVE-2023/CVE-2023-70xx/CVE-2023-7058.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-7059](CVE-2023/CVE-2023-70xx/CVE-2023-7059.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-43116](CVE-2023/CVE-2023-431xx/CVE-2023-43116.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-43741](CVE-2023/CVE-2023-437xx/CVE-2023-43741.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-49356](CVE-2023/CVE-2023-493xx/CVE-2023-49356.json) (`2023-12-22T12:18:32.690`)
* [CVE-2023-5483](CVE-2023/CVE-2023-54xx/CVE-2023-5483.json) (`2023-12-22T13:15:11.210`)
* [CVE-2023-5484](CVE-2023/CVE-2023-54xx/CVE-2023-5484.json) (`2023-12-22T13:15:11.330`)
* [CVE-2023-5485](CVE-2023/CVE-2023-54xx/CVE-2023-5485.json) (`2023-12-22T13:15:11.477`)
* [CVE-2023-5486](CVE-2023/CVE-2023-54xx/CVE-2023-5486.json) (`2023-12-22T13:15:11.593`)
* [CVE-2023-5487](CVE-2023/CVE-2023-54xx/CVE-2023-5487.json) (`2023-12-22T13:15:11.650`)
* [CVE-2023-5849](CVE-2023/CVE-2023-58xx/CVE-2023-5849.json) (`2023-12-22T13:15:11.717`)
* [CVE-2023-5850](CVE-2023/CVE-2023-58xx/CVE-2023-5850.json) (`2023-12-22T13:15:11.783`)
* [CVE-2023-5851](CVE-2023/CVE-2023-58xx/CVE-2023-5851.json) (`2023-12-22T13:15:11.847`)
* [CVE-2023-5852](CVE-2023/CVE-2023-58xx/CVE-2023-5852.json) (`2023-12-22T13:15:11.923`)
* [CVE-2023-5853](CVE-2023/CVE-2023-58xx/CVE-2023-5853.json) (`2023-12-22T13:15:12.047`)
* [CVE-2023-5854](CVE-2023/CVE-2023-58xx/CVE-2023-5854.json) (`2023-12-22T13:15:12.133`)
* [CVE-2023-5855](CVE-2023/CVE-2023-58xx/CVE-2023-5855.json) (`2023-12-22T13:15:12.210`)
* [CVE-2023-5856](CVE-2023/CVE-2023-58xx/CVE-2023-5856.json) (`2023-12-22T13:15:12.273`)
* [CVE-2023-5857](CVE-2023/CVE-2023-58xx/CVE-2023-5857.json) (`2023-12-22T13:15:12.350`)
* [CVE-2023-5858](CVE-2023/CVE-2023-58xx/CVE-2023-5858.json) (`2023-12-22T13:15:12.413`)
* [CVE-2023-5859](CVE-2023/CVE-2023-58xx/CVE-2023-5859.json) (`2023-12-22T13:15:12.480`)
* [CVE-2023-5996](CVE-2023/CVE-2023-59xx/CVE-2023-5996.json) (`2023-12-22T13:15:12.557`)
* [CVE-2023-5997](CVE-2023/CVE-2023-59xx/CVE-2023-5997.json) (`2023-12-22T13:15:12.693`)
* [CVE-2023-6112](CVE-2023/CVE-2023-61xx/CVE-2023-6112.json) (`2023-12-22T13:15:12.793`)
* [CVE-2023-51385](CVE-2023/CVE-2023-513xx/CVE-2023-51385.json) (`2023-12-22T14:15:06.983`)
* [CVE-2023-47789](CVE-2023/CVE-2023-477xx/CVE-2023-47789.json) (`2023-12-22T14:31:39.947`)
* [CVE-2023-47787](CVE-2023/CVE-2023-477xx/CVE-2023-47787.json) (`2023-12-22T14:32:43.010`)
* [CVE-2023-6778](CVE-2023/CVE-2023-67xx/CVE-2023-6778.json) (`2023-12-22T14:54:34.047`)
* [CVE-2023-20169](CVE-2023/CVE-2023-201xx/CVE-2023-20169.json) (`2023-12-22T14:59:47.780`)
* [CVE-2023-20042](CVE-2023/CVE-2023-200xx/CVE-2023-20042.json) (`2023-12-22T15:00:05.587`)
## Download and Usage