Auto-Update: 2023-09-05T14:00:25.738677+00:00

This commit is contained in:
cad-safe-bot 2023-09-05 14:00:29 +00:00
parent 023c8e6ca4
commit 04d2d700ab
53 changed files with 330 additions and 121 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33220",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:11.847",
"lastModified": "2023-09-05T07:15:11.847",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33275",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:11.983",
"lastModified": "2023-09-05T07:15:11.983",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-40524",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.073",
"lastModified": "2023-09-05T07:15:12.073",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-40534",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.157",
"lastModified": "2023-09-05T07:15:12.157",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-41763",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-05T13:15:07.717",
"lastModified": "2023-09-05T13:33:34.903",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in NOKIA AMS 9.7.05. Remote Code Execution exists via the debugger of the ipAddress variable. A remote user, authenticated to the AMS server, could inject code in the PING function. The privileges of the command executed depend on the user that runs the service."
}
],
"metrics": {},
"references": [
{
"url": "https://www.gruppotim.it/it/footer/red-team.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20897",
"sourceIdentifier": "security@vmware.com",
"published": "2023-09-05T11:15:32.973",
"lastModified": "2023-09-05T11:15:32.973",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20898",
"sourceIdentifier": "security@vmware.com",
"published": "2023-09-05T11:15:33.300",
"lastModified": "2023-09-05T11:15:33.300",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21636",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.247",
"lastModified": "2023-09-05T07:15:12.247",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21644",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.327",
"lastModified": "2023-09-05T07:15:12.327",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21646",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.410",
"lastModified": "2023-09-05T07:15:12.410",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21653",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.490",
"lastModified": "2023-09-05T07:15:12.490",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21654",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.570",
"lastModified": "2023-09-05T07:15:12.570",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21655",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.697",
"lastModified": "2023-09-05T07:15:12.697",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21662",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.780",
"lastModified": "2023-09-05T07:15:12.780",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21663",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.863",
"lastModified": "2023-09-05T07:15:12.863",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21664",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.940",
"lastModified": "2023-09-05T07:15:12.940",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21667",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.020",
"lastModified": "2023-09-05T07:15:13.020",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28538",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.113",
"lastModified": "2023-09-05T07:15:13.113",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28543",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.197",
"lastModified": "2023-09-05T07:15:13.197",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28544",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.280",
"lastModified": "2023-09-05T07:15:13.280",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28548",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.360",
"lastModified": "2023-09-05T07:15:13.360",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28549",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.437",
"lastModified": "2023-09-05T07:15:13.437",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28557",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.517",
"lastModified": "2023-09-05T07:15:13.517",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28558",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.603",
"lastModified": "2023-09-05T07:15:13.603",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28559",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.687",
"lastModified": "2023-09-05T07:15:13.687",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28560",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.763",
"lastModified": "2023-09-05T07:15:13.763",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28562",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.843",
"lastModified": "2023-09-05T07:15:13.843",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28564",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.923",
"lastModified": "2023-09-05T07:15:13.923",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28565",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.000",
"lastModified": "2023-09-05T07:15:14.000",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28567",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.083",
"lastModified": "2023-09-05T07:15:14.083",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28573",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.167",
"lastModified": "2023-09-05T07:15:14.167",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28581",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.247",
"lastModified": "2023-09-05T07:15:14.247",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28584",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.323",
"lastModified": "2023-09-05T07:15:14.323",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,31 +2,101 @@
"id": "CVE-2023-31714",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-30T22:15:08.013",
"lastModified": "2023-08-31T10:02:10.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-05T12:29:00.033",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Chitor-CMS before v1.1.2 was discovered to contain multiple SQL injection vulnerabilities."
},
{
"lang": "es",
"value": "Se ha descubierto que Chitor-CMS antes de la versi\u00f3n 1.1.2 contiene m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL. "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:waqaskanju:chitor-cms:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.2",
"matchCriteriaId": "7A9BA737-3DCE-4D63-AE63-EEF6C64FE9A7"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/msd0pe-1/chitor-sqli",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/waqaskanju/Chitor-CMS/commit/69d34420ad382c91b0c285432418c1b0810128c1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/waqaskanju/Chitor-CMS/releases/tag/Chitor-cms",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.exploit-db.com/exploits/51383",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33015",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.407",
"lastModified": "2023-09-05T07:15:14.407",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33016",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.487",
"lastModified": "2023-09-05T07:15:14.487",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33019",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.560",
"lastModified": "2023-09-05T07:15:14.560",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33020",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.640",
"lastModified": "2023-09-05T07:15:14.640",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33021",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.717",
"lastModified": "2023-09-05T07:15:14.717",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3489",
"sourceIdentifier": "sirt@brocade.com",
"published": "2023-08-31T00:15:07.913",
"lastModified": "2023-08-31T10:02:10.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-05T12:46:37.377",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "sirt@brocade.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
},
{
"source": "sirt@brocade.com",
"type": "Secondary",
@ -46,10 +76,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:9.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F3045B8-D0C4-47D8-8EBB-F96B1DBBA1DC"
}
]
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22510",
"source": "sirt@brocade.com"
"source": "sirt@brocade.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36492",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T10:15:07.463",
"lastModified": "2023-09-05T10:15:07.463",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38569",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T10:15:07.643",
"lastModified": "2023-09-05T10:15:07.643",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38574",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:08.037",
"lastModified": "2023-09-05T09:15:08.037",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39448",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:08.803",
"lastModified": "2023-09-05T09:15:08.803",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39938",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:09.053",
"lastModified": "2023-09-05T09:15:09.053",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40535",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:09.213",
"lastModified": "2023-09-05T09:15:09.213",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40582",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-30T18:15:09.783",
"lastModified": "2023-08-31T10:02:10.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-05T12:57:14.317",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,14 +66,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:find-exec_project:find-exec:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "1.0.3",
"matchCriteriaId": "9D212061-F058-4CB9-A96E-23856D97B658"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/shime/find-exec/commit/74fb108097c229b03d6dba4cce81e36aa364b51c",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/shime/find-exec/security/advisories/GHSA-95rp-6gqp-6622",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40705",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:09.340",
"lastModified": "2023-09-05T09:15:09.340",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41908",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-05T07:15:14.810",
"lastModified": "2023-09-05T07:15:14.810",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41909",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-05T07:15:14.877",
"lastModified": "2023-09-05T07:15:14.877",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41910",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-05T07:15:14.927",
"lastModified": "2023-09-05T07:15:14.927",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-4540",
"sourceIdentifier": "cvd@cert.pl",
"published": "2023-09-05T08:15:40.017",
"lastModified": "2023-09-05T08:15:40.017",
"vulnStatus": "Received",
"lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Handling of Exceptional Conditions vulnerability in Daurnimator HTTP Library for Lua allows Excessive Allocation.This issue affects HTTP Library for Lua: before commit ddab283.\n\n"
"value": "Improper Handling of Exceptional Conditions vulnerability in Daurnimator lua-http library allows Excessive Allocation and a denial of service (DoS) attack to be executed by sending a properly crafted request to the server. \n\nThis issue affects lua-http: all versions before commit ddab283."
}
],
"metrics": {},
@ -24,6 +24,10 @@
}
],
"references": [
{
"url": "https://cert.pl/posts/2023/09/CVE-2023-4540/",
"source": "cvd@cert.pl"
},
{
"url": "https://github.com/daurnimator/lua-http/commit/ddab2835c583d45dec62680ca8d3cbde55e0bae6",
"source": "cvd@cert.pl"

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-05T12:00:25.321378+00:00
2023-09-05T14:00:25.738677+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-05T11:43:01.273000+00:00
2023-09-05T13:33:34.903000+00:00
```
### Last Data Feed Release
@ -29,24 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
224191
224192
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `1`
* [CVE-2023-36492](CVE-2023/CVE-2023-364xx/CVE-2023-36492.json) (`2023-09-05T10:15:07.463`)
* [CVE-2023-38569](CVE-2023/CVE-2023-385xx/CVE-2023-38569.json) (`2023-09-05T10:15:07.643`)
* [CVE-2023-20897](CVE-2023/CVE-2023-208xx/CVE-2023-20897.json) (`2023-09-05T11:15:32.973`)
* [CVE-2023-20898](CVE-2023/CVE-2023-208xx/CVE-2023-20898.json) (`2023-09-05T11:15:33.300`)
* [CVE-2022-41763](CVE-2022/CVE-2022-417xx/CVE-2022-41763.json) (`2023-09-05T13:15:07.717`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `51`
* [CVE-2022-43151](CVE-2022/CVE-2022-431xx/CVE-2022-43151.json) (`2023-09-05T11:43:01.273`)
* [CVE-2023-21654](CVE-2023/CVE-2023-216xx/CVE-2023-21654.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-21655](CVE-2023/CVE-2023-216xx/CVE-2023-21655.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-21662](CVE-2023/CVE-2023-216xx/CVE-2023-21662.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-21663](CVE-2023/CVE-2023-216xx/CVE-2023-21663.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-21664](CVE-2023/CVE-2023-216xx/CVE-2023-21664.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-21667](CVE-2023/CVE-2023-216xx/CVE-2023-21667.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28538](CVE-2023/CVE-2023-285xx/CVE-2023-28538.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28543](CVE-2023/CVE-2023-285xx/CVE-2023-28543.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28544](CVE-2023/CVE-2023-285xx/CVE-2023-28544.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28548](CVE-2023/CVE-2023-285xx/CVE-2023-28548.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28549](CVE-2023/CVE-2023-285xx/CVE-2023-28549.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28557](CVE-2023/CVE-2023-285xx/CVE-2023-28557.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28558](CVE-2023/CVE-2023-285xx/CVE-2023-28558.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28559](CVE-2023/CVE-2023-285xx/CVE-2023-28559.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28560](CVE-2023/CVE-2023-285xx/CVE-2023-28560.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28562](CVE-2023/CVE-2023-285xx/CVE-2023-28562.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28564](CVE-2023/CVE-2023-285xx/CVE-2023-28564.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28565](CVE-2023/CVE-2023-285xx/CVE-2023-28565.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28567](CVE-2023/CVE-2023-285xx/CVE-2023-28567.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28573](CVE-2023/CVE-2023-285xx/CVE-2023-28573.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-21636](CVE-2023/CVE-2023-216xx/CVE-2023-21636.json) (`2023-09-05T12:54:56.227`)
* [CVE-2023-21644](CVE-2023/CVE-2023-216xx/CVE-2023-21644.json) (`2023-09-05T12:54:56.227`)
* [CVE-2023-21646](CVE-2023/CVE-2023-216xx/CVE-2023-21646.json) (`2023-09-05T12:54:56.227`)
* [CVE-2023-21653](CVE-2023/CVE-2023-216xx/CVE-2023-21653.json) (`2023-09-05T12:54:56.227`)
* [CVE-2023-40582](CVE-2023/CVE-2023-405xx/CVE-2023-40582.json) (`2023-09-05T12:57:14.317`)
## Download and Usage