Auto-Update: 2023-07-26T14:00:26.082115+00:00

This commit is contained in:
cad-safe-bot 2023-07-26 14:00:29 +00:00
parent 6d90c4aab4
commit 04a1aae75b
19 changed files with 300 additions and 57 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-2502",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2023-07-26T06:15:09.760",
"lastModified": "2023-07-26T06:15:09.760",
"vulnStatus": "Received",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4608",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2023-07-26T06:15:10.220",
"lastModified": "2023-07-26T06:15:10.220",
"vulnStatus": "Received",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1401",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-07-26T07:15:09.103",
"lastModified": "2023-07-26T07:15:09.103",
"vulnStatus": "Received",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20891",
"sourceIdentifier": "security@vmware.com",
"published": "2023-07-26T06:15:10.637",
"lastModified": "2023-07-26T06:15:10.637",
"vulnStatus": "Received",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,27 +2,88 @@
"id": "CVE-2023-26564",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-12T21:15:09.047",
"lastModified": "2023-07-13T08:32:09.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-26T13:58:32.947",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Syncfusion EJ2 ASPCore File Provider 3ac357f is vulnerable to Models/PhysicalFileProvider.cs directory traversal. As a result, an unauthenticated attacker can list files within a directory, download any file, or upload any file to any directory accessible by the web server."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:syncfusion:ej2_aspcore_file_provider:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E9E184E-DCFE-49C7-97D5-F62AE009D575"
}
]
}
]
}
],
"references": [
{
"url": "https://ej2.syncfusion.com/documentation/file-manager/file-system-provider/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/RupturaInfoSec/CVE-2023-26563-26564-26565/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/SyncfusionExamples/ej2-aspcore-file-provider",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28130",
"sourceIdentifier": "cve@checkpoint.com",
"published": "2023-07-26T11:15:09.550",
"lastModified": "2023-07-26T11:15:09.550",
"vulnStatus": "Received",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32468",
"sourceIdentifier": "security_alert@emc.com",
"published": "2023-07-26T08:15:10.063",
"lastModified": "2023-07-26T08:15:10.063",
"vulnStatus": "Received",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-37049",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-26T13:15:10.173",
"lastModified": "2023-07-26T13:15:10.173",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "emlog 2.1.9 is vulnerable to Arbitrary file deletion via admin\\template.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Num-Nine/CVE/issues/1",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38433",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-07-26T08:15:10.227",
"lastModified": "2023-07-26T08:15:10.227",
"vulnStatus": "Received",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38555",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-07-26T08:15:10.317",
"lastModified": "2023-07-26T08:15:10.317",
"vulnStatus": "Received",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38647",
"sourceIdentifier": "security@apache.org",
"published": "2023-07-26T08:15:10.410",
"lastModified": "2023-07-26T08:15:10.410",
"vulnStatus": "Received",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38669",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2023-07-26T10:15:11.457",
"lastModified": "2023-07-26T10:15:11.457",
"vulnStatus": "Received",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38670",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2023-07-26T11:15:09.633",
"lastModified": "2023-07-26T11:15:09.633",
"vulnStatus": "Received",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38671",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2023-07-26T11:15:09.707",
"lastModified": "2023-07-26T11:15:09.707",
"vulnStatus": "Received",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-38672",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2023-07-26T12:15:09.563",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "FPE in paddle.trace in PaddlePaddle before 2.5.0. This flaw can cause a runtime crash and a denial of service.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-004.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-38673",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2023-07-26T12:15:09.640",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "PaddlePaddle before 2.5.0 has a command injection in fs.py. This resulted in\u00a0the ability to execute arbitrary commands on the operating system.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-005.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-39261",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-07-26T13:15:10.233",
"lastModified": "2023-07-26T13:15:10.233",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains IntelliJ IDEA before 2023.2 plugin for Space was requesting excessive permissions"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.0,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-250"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3946",
"sourceIdentifier": "trellixpsirt@trellix.com",
"published": "2023-07-26T06:15:11.080",
"lastModified": "2023-07-26T06:15:11.080",
"vulnStatus": "Received",
"lastModified": "2023-07-26T12:53:08.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-07-26T12:00:27.390467+00:00
2023-07-26T14:00:26.082115+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-07-26T11:15:09.707000+00:00
2023-07-26T13:58:32.947000+00:00
```
### Last Data Feed Release
@ -29,40 +29,37 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
221050
221054
```
### CVEs added in the last Commit
Recently added CVEs: `4`
* [CVE-2023-38669](CVE-2023/CVE-2023-386xx/CVE-2023-38669.json) (`2023-07-26T10:15:11.457`)
* [CVE-2023-28130](CVE-2023/CVE-2023-281xx/CVE-2023-28130.json) (`2023-07-26T11:15:09.550`)
* [CVE-2023-38670](CVE-2023/CVE-2023-386xx/CVE-2023-38670.json) (`2023-07-26T11:15:09.633`)
* [CVE-2023-38671](CVE-2023/CVE-2023-386xx/CVE-2023-38671.json) (`2023-07-26T11:15:09.707`)
* [CVE-2023-38672](CVE-2023/CVE-2023-386xx/CVE-2023-38672.json) (`2023-07-26T12:15:09.563`)
* [CVE-2023-38673](CVE-2023/CVE-2023-386xx/CVE-2023-38673.json) (`2023-07-26T12:15:09.640`)
* [CVE-2023-37049](CVE-2023/CVE-2023-370xx/CVE-2023-37049.json) (`2023-07-26T13:15:10.173`)
* [CVE-2023-39261](CVE-2023/CVE-2023-392xx/CVE-2023-39261.json) (`2023-07-26T13:15:10.233`)
### CVEs modified in the last Commit
Recently modified CVEs: `17`
Recently modified CVEs: `14`
* [CVE-2023-1547](CVE-2023/CVE-2023-15xx/CVE-2023-1547.json) (`2023-07-26T10:15:09.940`)
* [CVE-2023-1803](CVE-2023/CVE-2023-18xx/CVE-2023-1803.json) (`2023-07-26T10:15:10.057`)
* [CVE-2023-1833](CVE-2023/CVE-2023-18xx/CVE-2023-1833.json) (`2023-07-26T10:15:10.173`)
* [CVE-2023-2703](CVE-2023/CVE-2023-27xx/CVE-2023-2703.json) (`2023-07-26T10:15:10.277`)
* [CVE-2023-2712](CVE-2023/CVE-2023-27xx/CVE-2023-2712.json) (`2023-07-26T10:15:10.397`)
* [CVE-2023-2713](CVE-2023/CVE-2023-27xx/CVE-2023-2713.json) (`2023-07-26T10:15:10.510`)
* [CVE-2023-2851](CVE-2023/CVE-2023-28xx/CVE-2023-2851.json) (`2023-07-26T10:15:10.630`)
* [CVE-2023-2882](CVE-2023/CVE-2023-28xx/CVE-2023-2882.json) (`2023-07-26T10:15:10.750`)
* [CVE-2023-2884](CVE-2023/CVE-2023-28xx/CVE-2023-2884.json) (`2023-07-26T10:15:10.860`)
* [CVE-2023-2885](CVE-2023/CVE-2023-28xx/CVE-2023-2885.json) (`2023-07-26T10:15:10.963`)
* [CVE-2023-2886](CVE-2023/CVE-2023-28xx/CVE-2023-2886.json) (`2023-07-26T10:15:11.063`)
* [CVE-2023-2887](CVE-2023/CVE-2023-28xx/CVE-2023-2887.json) (`2023-07-26T10:15:11.163`)
* [CVE-2023-2958](CVE-2023/CVE-2023-29xx/CVE-2023-2958.json) (`2023-07-26T10:15:11.257`)
* [CVE-2023-35069](CVE-2023/CVE-2023-350xx/CVE-2023-35069.json) (`2023-07-26T10:15:11.360`)
* [CVE-2023-3048](CVE-2023/CVE-2023-30xx/CVE-2023-3048.json) (`2023-07-26T10:15:11.547`)
* [CVE-2023-3049](CVE-2023/CVE-2023-30xx/CVE-2023-3049.json) (`2023-07-26T10:15:11.660`)
* [CVE-2023-3319](CVE-2023/CVE-2023-33xx/CVE-2023-3319.json) (`2023-07-26T10:15:11.750`)
* [CVE-2022-2502](CVE-2022/CVE-2022-25xx/CVE-2022-2502.json) (`2023-07-26T12:53:08.817`)
* [CVE-2022-4608](CVE-2022/CVE-2022-46xx/CVE-2022-4608.json) (`2023-07-26T12:53:08.817`)
* [CVE-2023-20891](CVE-2023/CVE-2023-208xx/CVE-2023-20891.json) (`2023-07-26T12:53:08.817`)
* [CVE-2023-3946](CVE-2023/CVE-2023-39xx/CVE-2023-3946.json) (`2023-07-26T12:53:08.817`)
* [CVE-2023-1401](CVE-2023/CVE-2023-14xx/CVE-2023-1401.json) (`2023-07-26T12:53:08.817`)
* [CVE-2023-32468](CVE-2023/CVE-2023-324xx/CVE-2023-32468.json) (`2023-07-26T12:53:08.817`)
* [CVE-2023-38433](CVE-2023/CVE-2023-384xx/CVE-2023-38433.json) (`2023-07-26T12:53:08.817`)
* [CVE-2023-38555](CVE-2023/CVE-2023-385xx/CVE-2023-38555.json) (`2023-07-26T12:53:08.817`)
* [CVE-2023-38647](CVE-2023/CVE-2023-386xx/CVE-2023-38647.json) (`2023-07-26T12:53:08.817`)
* [CVE-2023-38669](CVE-2023/CVE-2023-386xx/CVE-2023-38669.json) (`2023-07-26T12:53:08.817`)
* [CVE-2023-28130](CVE-2023/CVE-2023-281xx/CVE-2023-28130.json) (`2023-07-26T12:53:08.817`)
* [CVE-2023-38670](CVE-2023/CVE-2023-386xx/CVE-2023-38670.json) (`2023-07-26T12:53:08.817`)
* [CVE-2023-38671](CVE-2023/CVE-2023-386xx/CVE-2023-38671.json) (`2023-07-26T12:53:08.817`)
* [CVE-2023-26564](CVE-2023/CVE-2023-265xx/CVE-2023-26564.json) (`2023-07-26T13:58:32.947`)
## Download and Usage