mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2023-08-08T22:00:34.933677+00:00
This commit is contained in:
parent
8d1aafa7a8
commit
07067856fe
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2010-1685",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2010-05-04T16:00:35.543",
|
||||
"lastModified": "2010-05-04T16:00:35.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-08-08T20:15:09.693",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -71,9 +71,24 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://osvdb.org/64079",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/39575",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-031-zip-wrangler-1-20-buffer-overflow/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2010/Apr/331",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,27 +2,89 @@
|
||||
"id": "CVE-2022-41401",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-04T17:15:09.583",
|
||||
"lastModified": "2023-08-04T18:53:28.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-08T20:32:08.363",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenRefine <= v3.5.2 contains a Server-Side Request Forgery (SSRF) vulnerability, which permits unauthorized users to exploit the system, potentially leading to unauthorized access to internal resources and sensitive file disclosure."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.5.2",
|
||||
"matchCriteriaId": "3FBE270B-9569-4301-B543-5FDF33EC15AD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/OpenRefine/blob/30d6edb7b6586623bda09456c797c35983fb80ff/main/tests/server/src/com/google/refine/importing/ImportingUtilitiesTests.java#L180",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/OpenRefine/blob/cb55cdfdf6f9ca916839778dc847cce803688998/main/src/com/google/refine/importing/ImportingUtilities.java#L103",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ixSly/CVE-2022-41401",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0956",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-08-03T19:15:10.323",
|
||||
"lastModified": "2023-08-04T02:46:03.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-08T20:10:03.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
@ -34,18 +54,76 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tel-ster:telwin_scada_webinterface:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.2",
|
||||
"versionEndExcluding": "6.2",
|
||||
"matchCriteriaId": "BA0C69E3-ACEB-4DED-B6CD-6EDFCE6FEA9B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tel-ster:telwin_scada_webinterface:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0",
|
||||
"versionEndExcluding": "7.2",
|
||||
"matchCriteriaId": "5662B55B-7264-48DE-978D-C48A802663A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tel-ster:telwin_scada_webinterface:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2DFACE5-7AB7-44EC-8384-9EB9B9A95A08"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tel-ster:telwin_scada_webinterface:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41E91A9D-DDA1-45E4-9FED-2F125DFB5B7A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.pl/posts/2023/07/CVE-2023-0956/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-03",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.tel-ster.pl/index.php/telwin-scada/nowosci/372-telwin-scada-podatnosc-cve-2023-0956",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20569",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-08-08T18:15:11.530",
|
||||
"lastModified": "2023-08-08T19:15:09.757",
|
||||
"lastModified": "2023-08-08T21:15:09.367",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -12,6 +12,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/08/08/4",
|
||||
"source": "psirt@amd.com"
|
||||
},
|
||||
{
|
||||
"url": "http://xenbits.xen.org/xsa/advisory-434.html",
|
||||
"source": "psirt@amd.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20593",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-07-24T20:15:10.237",
|
||||
"lastModified": "2023-08-05T04:15:12.187",
|
||||
"lastModified": "2023-08-08T21:15:10.133",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -2066,6 +2066,18 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/08/08/6",
|
||||
"source": "psirt@amd.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/08/08/7",
|
||||
"source": "psirt@amd.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/08/08/8",
|
||||
"source": "psirt@amd.com"
|
||||
},
|
||||
{
|
||||
"url": "http://xenbits.xen.org/xsa/advisory-433.html",
|
||||
"source": "psirt@amd.com",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-22403",
|
||||
"sourceIdentifier": "sirt@juniper.net",
|
||||
"published": "2023-01-13T00:15:10.767",
|
||||
"lastModified": "2023-01-20T07:57:23.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-08-08T21:15:10.807",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Allocation of Resources Without Limits or Throttling vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). On QFX10k Series Inter-Chassis Control Protocol (ICCP) is used in MC-LAG topologies to exchange control information between the devices in the topology. ICCP connection flaps and sync issues will be observed due to excessive specific traffic to the local device. This issue affects Juniper Networks Junos OS: All versions prior to 20.2R3-S7; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2."
|
||||
"value": "\nAn Allocation of Resources Without Limits or Throttling vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).\n\n\n\nOn QFX10K Series, Inter-Chassis Control Protocol (ICCP) is used in MC-LAG topologies to exchange control information between the devices in the topology. ICCP connection flaps and sync issues will be observed due to excessive specific traffic to the local device.\n\n\n\nThis issue affects Juniper Networks Junos OS on QFX10K Series:\n\n * All versions prior to 20.2R3-S7;\n * 20.4 versions prior to 20.4R3-S4;\n * 21.1 versions prior to 21.1R3-S3;\n * 21.2 versions prior to 21.2R3-S1;\n * 21.3 versions prior to 21.3R3;\n * 21.4 versions prior to 21.4R3;\n * 22.1 versions prior to 22.1R2.\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,7 +36,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "sirt@juniper.net",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -46,7 +46,7 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "sirt@juniper.net",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
|
24
CVE-2023/CVE-2023-269xx/CVE-2023-26961.json
Normal file
24
CVE-2023/CVE-2023-269xx/CVE-2023-26961.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-26961",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-08T20:15:10.080",
|
||||
"lastModified": "2023-08-08T20:39:01.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Alteryx Server 2022.1.1.42590 does not employ file type verification for uploaded files. This vulnerability allows attackers to upload arbitrary files by changing the extension of the uploaded file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://alteryx.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/DylanGrl/4269ae834c5d0ec77c9b928ad35d3be3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,83 @@
|
||||
"id": "CVE-2023-33666",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-03T20:15:11.337",
|
||||
"lastModified": "2023-08-04T02:46:03.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-08T20:13:33.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ai-dev aioptimizedcombinations before v0.1.3 was discovered to contain a SQL injection vulnerability via the component /includes/ajax.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ai-dev:aioptimizedcombinations:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.1.3",
|
||||
"matchCriteriaId": "192ACB0E-EA9E-4F97-83C6-9553F77434BA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.friendsofpresta.org/modules/2023/08/03/aioptimizedcombinations.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.boutique.ai-dev.fr/en/ergonomie/59-optimized-combinations.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35081",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-08-03T18:15:11.303",
|
||||
"lastModified": "2023-08-04T02:46:03.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-08T20:25:09.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2023-07-31",
|
||||
"cisaActionDue": "2023-08-21",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
@ -38,10 +60,58 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.8.0",
|
||||
"versionEndExcluding": "11.8.1.2",
|
||||
"matchCriteriaId": "A8C4E79F-9A4D-4507-B262-01E475954B92"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.9.0",
|
||||
"versionEndExcluding": "11.9.1.2",
|
||||
"matchCriteriaId": "5A44EBED-1A3C-4951-B873-4E545F4432A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.10.0",
|
||||
"versionEndExcluding": "11.10.0.3",
|
||||
"matchCriteriaId": "F07E7E60-A611-4C0D-B5D0-0605D910B0F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/CVE-2023-35081-Arbitrary-File-Write?language=en_US",
|
||||
"source": "support@hackerone.com"
|
||||
"source": "support@hackerone.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35391",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-08-08T19:15:09.940",
|
||||
"lastModified": "2023-08-08T19:15:09.940",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-08T20:39:01.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,23 +2,85 @@
|
||||
"id": "CVE-2023-36213",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-03T17:15:11.977",
|
||||
"lastModified": "2023-08-04T02:46:03.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-08T20:39:53.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in MotoCMS v.3.4.3 allows a remote attacker to gain privileges via the keyword parameter of the search function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:motocms:motocms:3.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AB7A4D6-633C-40C5-87FF-C0006F41C7D2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/172698/MotoCMS-3.4.3-SQL-Injection.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/51504",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-363xx/CVE-2023-36344.json
Normal file
24
CVE-2023/CVE-2023-363xx/CVE-2023-36344.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-36344",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-08T20:15:10.170",
|
||||
"lastModified": "2023-08-08T20:39:01.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Diebold Nixdorf Vynamic View Console v.5.3.1 and before allows a local attacker to execute arbitrary code via not restricting the search path for required DLLs and not verifying the signature."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/173990/Diebold-Nixdorf-Vynamic-View-Console-5.3.1-DLL-Hijacking.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/view/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-364xx/CVE-2023-36482.json
Normal file
20
CVE-2023/CVE-2023-364xx/CVE-2023-36482.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-36482",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-08T20:15:10.230",
|
||||
"lastModified": "2023-08-08T20:39:01.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Samsung NFC S3NRN4V, S3NSN4V, S3NSEN4, SEN82AB, and S3NRN82. A buffer copy without checking its input size can cause an NFC service restart."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36873",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-08-08T19:15:10.057",
|
||||
"lastModified": "2023-08-08T19:15:10.057",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-08T20:39:01.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36899",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-08-08T19:15:10.277",
|
||||
"lastModified": "2023-08-08T19:15:10.277",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-08T20:39:01.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38180",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-08-08T19:15:10.367",
|
||||
"lastModified": "2023-08-08T19:15:10.367",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-08T20:39:01.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38494",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-04T16:15:10.177",
|
||||
"lastModified": "2023-08-04T17:10:50.263",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-08T20:24:08.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -36,8 +56,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -46,14 +76,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:metersphere:metersphere:*:*:*:*:lts:*:*:*",
|
||||
"versionEndExcluding": "2.10.4",
|
||||
"matchCriteriaId": "34BBA850-D024-4FED-9794-74C62218EF49"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/metersphere/metersphere/commit/a23f75d93b666901fd148d834df9384f6f24cf28",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/metersphere/metersphere/security/advisories/GHSA-fjp5-95pv-5253",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,76 @@
|
||||
"id": "CVE-2023-38948",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-03T16:15:12.077",
|
||||
"lastModified": "2023-08-03T16:56:53.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-08T20:53:51.983",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file download vulnerability in the /c/PluginsController.php component of jizhi CMS 1.9.5 allows attackers to execute arbitrary code via downloading a crafted plugin."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-552"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jizhicms:jizhicms:1.9.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07898D32-45C7-4692-AABE-5D7728D8B8B7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/CTF-hacker/pwn/issues/I7LI4E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,75 @@
|
||||
"id": "CVE-2023-38964",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-04T16:15:10.697",
|
||||
"lastModified": "2023-08-04T17:10:50.263",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-08T20:22:36.270",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Creative Item Academy LMS 6.0 was discovered to contain a cross-site scripting (XSS) vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:creativeitem:academy_learning_management_system:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6755A0FD-32C7-47DC-AC89-32CDB7A5A082"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vida03.gitbook.io/redteam/web/cve-2023-38964",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-390xx/CVE-2023-39086.json
Normal file
28
CVE-2023/CVE-2023-390xx/CVE-2023-39086.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-39086",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-08T20:15:10.303",
|
||||
"lastModified": "2023-08-08T20:39:01.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ASUS RT-AC66U B1 3.0.0.4.286_51665 was discovered to transmit sensitive information in cleartext."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://121.41.98.87/2023/08/04/info/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://asus.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://na.com",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,75 @@
|
||||
"id": "CVE-2023-39112",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-04T17:15:11.300",
|
||||
"lastModified": "2023-08-04T18:53:28.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-08T20:09:47.073",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ECShop v4.1.16 contains an arbitrary file deletion vulnerability in the Admin Panel."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:shopex:ecshop:4.1.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C808BB3-5048-437D-A494-301254A4B578"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Luci4n555/vul_report/blob/master/vul_1.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,101 @@
|
||||
"id": "CVE-2023-39143",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-04T17:15:11.510",
|
||||
"lastModified": "2023-08-07T18:15:10.093",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-08-08T20:07:16.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PaperCut NG and PaperCut MF before 22.1.3 on Windows allow path traversal, enabling attackers to upload, read, or delete arbitrary files. This leads to remote code execution when external device integration is enabled (a very common configuration)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "22.1.3",
|
||||
"matchCriteriaId": "2D1E7B69-F906-49B6-A5AE-BC95E528AB81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "22.1.3",
|
||||
"matchCriteriaId": "AE9EEC66-6455-4B4E-879D-7109E6E16199"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.horizon3.ai/cve-2023-39143-papercut-path-traversal-file-upload-rce-vulnerability/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.papercut.com/kb/Main/securitybulletinjuly2023/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39518",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-08T19:15:10.533",
|
||||
"lastModified": "2023-08-08T19:15:10.533",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-08T20:39:01.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39533",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-08T19:15:10.657",
|
||||
"lastModified": "2023-08-08T19:15:10.657",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-08T20:39:01.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40041",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-08T19:15:10.800",
|
||||
"lastModified": "2023-08-08T19:15:10.800",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-08T20:39:01.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40042",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-08T19:15:10.873",
|
||||
"lastModified": "2023-08-08T19:15:10.873",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-08T20:39:01.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4158",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-08-04T18:15:17.873",
|
||||
"lastModified": "2023-08-04T18:53:22.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-08T20:36:47.257",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -46,14 +68,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:omeka:omeka_s:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.0.3",
|
||||
"matchCriteriaId": "B619F3B7-C1D9-4056-9C23-8E39B1185F3D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/omeka/omeka-s/commit/2a7fb26452167c8a1d95f207ae5328c6b1b0fcf8",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/e0e462ae-d7cb-4a84-b6fe-5f5de20e3d15",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
87
README.md
87
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-08-08T20:00:34.994278+00:00
|
||||
2023-08-08T22:00:34.933677+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-08-08T19:58:23.307000+00:00
|
||||
2023-08-08T21:15:10.807000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,69 +29,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
222103
|
||||
222107
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `99`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2023-35381](CVE-2023/CVE-2023-353xx/CVE-2023-35381.json) (`2023-08-08T18:15:12.930`)
|
||||
* [CVE-2023-35382](CVE-2023/CVE-2023-353xx/CVE-2023-35382.json) (`2023-08-08T18:15:13.010`)
|
||||
* [CVE-2023-35383](CVE-2023/CVE-2023-353xx/CVE-2023-35383.json) (`2023-08-08T18:15:13.093`)
|
||||
* [CVE-2023-35384](CVE-2023/CVE-2023-353xx/CVE-2023-35384.json) (`2023-08-08T18:15:13.177`)
|
||||
* [CVE-2023-35385](CVE-2023/CVE-2023-353xx/CVE-2023-35385.json) (`2023-08-08T18:15:13.263`)
|
||||
* [CVE-2023-35386](CVE-2023/CVE-2023-353xx/CVE-2023-35386.json) (`2023-08-08T18:15:13.343`)
|
||||
* [CVE-2023-35387](CVE-2023/CVE-2023-353xx/CVE-2023-35387.json) (`2023-08-08T18:15:13.420`)
|
||||
* [CVE-2023-35388](CVE-2023/CVE-2023-353xx/CVE-2023-35388.json) (`2023-08-08T18:15:13.507`)
|
||||
* [CVE-2023-20555](CVE-2023/CVE-2023-205xx/CVE-2023-20555.json) (`2023-08-08T18:15:11.173`)
|
||||
* [CVE-2023-20556](CVE-2023/CVE-2023-205xx/CVE-2023-20556.json) (`2023-08-08T18:15:11.340`)
|
||||
* [CVE-2023-20561](CVE-2023/CVE-2023-205xx/CVE-2023-20561.json) (`2023-08-08T18:15:11.407`)
|
||||
* [CVE-2023-20562](CVE-2023/CVE-2023-205xx/CVE-2023-20562.json) (`2023-08-08T18:15:11.467`)
|
||||
* [CVE-2023-20586](CVE-2023/CVE-2023-205xx/CVE-2023-20586.json) (`2023-08-08T18:15:11.593`)
|
||||
* [CVE-2023-20588](CVE-2023/CVE-2023-205xx/CVE-2023-20588.json) (`2023-08-08T18:15:11.653`)
|
||||
* [CVE-2023-20589](CVE-2023/CVE-2023-205xx/CVE-2023-20589.json) (`2023-08-08T18:15:11.717`)
|
||||
* [CVE-2023-20569](CVE-2023/CVE-2023-205xx/CVE-2023-20569.json) (`2023-08-08T18:15:11.530`)
|
||||
* [CVE-2023-35391](CVE-2023/CVE-2023-353xx/CVE-2023-35391.json) (`2023-08-08T19:15:09.940`)
|
||||
* [CVE-2023-36873](CVE-2023/CVE-2023-368xx/CVE-2023-36873.json) (`2023-08-08T19:15:10.057`)
|
||||
* [CVE-2023-36899](CVE-2023/CVE-2023-368xx/CVE-2023-36899.json) (`2023-08-08T19:15:10.277`)
|
||||
* [CVE-2023-38180](CVE-2023/CVE-2023-381xx/CVE-2023-38180.json) (`2023-08-08T19:15:10.367`)
|
||||
* [CVE-2023-38815](CVE-2023/CVE-2023-388xx/CVE-2023-38815.json) (`2023-08-08T19:15:10.463`)
|
||||
* [CVE-2023-39518](CVE-2023/CVE-2023-395xx/CVE-2023-39518.json) (`2023-08-08T19:15:10.533`)
|
||||
* [CVE-2023-39533](CVE-2023/CVE-2023-395xx/CVE-2023-39533.json) (`2023-08-08T19:15:10.657`)
|
||||
* [CVE-2023-40041](CVE-2023/CVE-2023-400xx/CVE-2023-40041.json) (`2023-08-08T19:15:10.800`)
|
||||
* [CVE-2023-40042](CVE-2023/CVE-2023-400xx/CVE-2023-40042.json) (`2023-08-08T19:15:10.873`)
|
||||
* [CVE-2023-26961](CVE-2023/CVE-2023-269xx/CVE-2023-26961.json) (`2023-08-08T20:15:10.080`)
|
||||
* [CVE-2023-36344](CVE-2023/CVE-2023-363xx/CVE-2023-36344.json) (`2023-08-08T20:15:10.170`)
|
||||
* [CVE-2023-36482](CVE-2023/CVE-2023-364xx/CVE-2023-36482.json) (`2023-08-08T20:15:10.230`)
|
||||
* [CVE-2023-39086](CVE-2023/CVE-2023-390xx/CVE-2023-39086.json) (`2023-08-08T20:15:10.303`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `47`
|
||||
Recently modified CVEs: `23`
|
||||
|
||||
* [CVE-2023-36135](CVE-2023/CVE-2023-361xx/CVE-2023-36135.json) (`2023-08-08T19:01:10.757`)
|
||||
* [CVE-2023-36134](CVE-2023/CVE-2023-361xx/CVE-2023-36134.json) (`2023-08-08T19:01:33.350`)
|
||||
* [CVE-2023-38952](CVE-2023/CVE-2023-389xx/CVE-2023-38952.json) (`2023-08-08T19:01:48.613`)
|
||||
* [CVE-2023-38951](CVE-2023/CVE-2023-389xx/CVE-2023-38951.json) (`2023-08-08T19:02:13.353`)
|
||||
* [CVE-2023-38950](CVE-2023/CVE-2023-389xx/CVE-2023-38950.json) (`2023-08-08T19:02:30.850`)
|
||||
* [CVE-2023-38949](CVE-2023/CVE-2023-389xx/CVE-2023-38949.json) (`2023-08-08T19:02:37.480`)
|
||||
* [CVE-2023-30958](CVE-2023/CVE-2023-309xx/CVE-2023-30958.json) (`2023-08-08T19:02:55.393`)
|
||||
* [CVE-2023-30952](CVE-2023/CVE-2023-309xx/CVE-2023-30952.json) (`2023-08-08T19:03:14.770`)
|
||||
* [CVE-2023-20204](CVE-2023/CVE-2023-202xx/CVE-2023-20204.json) (`2023-08-08T19:03:28.583`)
|
||||
* [CVE-2023-3817](CVE-2023/CVE-2023-38xx/CVE-2023-3817.json) (`2023-08-08T19:04:09.103`)
|
||||
* [CVE-2023-39121](CVE-2023/CVE-2023-391xx/CVE-2023-39121.json) (`2023-08-08T19:04:41.457`)
|
||||
* [CVE-2023-36884](CVE-2023/CVE-2023-368xx/CVE-2023-36884.json) (`2023-08-08T19:15:10.140`)
|
||||
* [CVE-2023-3669](CVE-2023/CVE-2023-36xx/CVE-2023-3669.json) (`2023-08-08T19:15:21.743`)
|
||||
* [CVE-2023-33665](CVE-2023/CVE-2023-336xx/CVE-2023-33665.json) (`2023-08-08T19:26:59.550`)
|
||||
* [CVE-2023-4145](CVE-2023/CVE-2023-41xx/CVE-2023-4145.json) (`2023-08-08T19:33:04.777`)
|
||||
* [CVE-2023-4138](CVE-2023/CVE-2023-41xx/CVE-2023-4138.json) (`2023-08-08T19:39:05.930`)
|
||||
* [CVE-2023-33363](CVE-2023/CVE-2023-333xx/CVE-2023-33363.json) (`2023-08-08T19:49:16.247`)
|
||||
* [CVE-2023-33377](CVE-2023/CVE-2023-333xx/CVE-2023-33377.json) (`2023-08-08T19:49:32.947`)
|
||||
* [CVE-2023-33378](CVE-2023/CVE-2023-333xx/CVE-2023-33378.json) (`2023-08-08T19:50:32.190`)
|
||||
* [CVE-2023-33376](CVE-2023/CVE-2023-333xx/CVE-2023-33376.json) (`2023-08-08T19:51:32.797`)
|
||||
* [CVE-2023-33375](CVE-2023/CVE-2023-333xx/CVE-2023-33375.json) (`2023-08-08T19:52:05.723`)
|
||||
* [CVE-2023-33373](CVE-2023/CVE-2023-333xx/CVE-2023-33373.json) (`2023-08-08T19:53:07.920`)
|
||||
* [CVE-2023-33374](CVE-2023/CVE-2023-333xx/CVE-2023-33374.json) (`2023-08-08T19:53:38.237`)
|
||||
* [CVE-2023-33372](CVE-2023/CVE-2023-333xx/CVE-2023-33372.json) (`2023-08-08T19:54:55.223`)
|
||||
* [CVE-2023-25524](CVE-2023/CVE-2023-255xx/CVE-2023-25524.json) (`2023-08-08T19:58:23.307`)
|
||||
* [CVE-2010-1685](CVE-2010/CVE-2010-16xx/CVE-2010-1685.json) (`2023-08-08T20:15:09.693`)
|
||||
* [CVE-2022-41401](CVE-2022/CVE-2022-414xx/CVE-2022-41401.json) (`2023-08-08T20:32:08.363`)
|
||||
* [CVE-2023-39143](CVE-2023/CVE-2023-391xx/CVE-2023-39143.json) (`2023-08-08T20:07:16.543`)
|
||||
* [CVE-2023-39112](CVE-2023/CVE-2023-391xx/CVE-2023-39112.json) (`2023-08-08T20:09:47.073`)
|
||||
* [CVE-2023-0956](CVE-2023/CVE-2023-09xx/CVE-2023-0956.json) (`2023-08-08T20:10:03.717`)
|
||||
* [CVE-2023-33666](CVE-2023/CVE-2023-336xx/CVE-2023-33666.json) (`2023-08-08T20:13:33.970`)
|
||||
* [CVE-2023-38964](CVE-2023/CVE-2023-389xx/CVE-2023-38964.json) (`2023-08-08T20:22:36.270`)
|
||||
* [CVE-2023-38494](CVE-2023/CVE-2023-384xx/CVE-2023-38494.json) (`2023-08-08T20:24:08.943`)
|
||||
* [CVE-2023-35081](CVE-2023/CVE-2023-350xx/CVE-2023-35081.json) (`2023-08-08T20:25:09.337`)
|
||||
* [CVE-2023-4158](CVE-2023/CVE-2023-41xx/CVE-2023-4158.json) (`2023-08-08T20:36:47.257`)
|
||||
* [CVE-2023-35391](CVE-2023/CVE-2023-353xx/CVE-2023-35391.json) (`2023-08-08T20:39:01.517`)
|
||||
* [CVE-2023-36873](CVE-2023/CVE-2023-368xx/CVE-2023-36873.json) (`2023-08-08T20:39:01.517`)
|
||||
* [CVE-2023-36899](CVE-2023/CVE-2023-368xx/CVE-2023-36899.json) (`2023-08-08T20:39:01.517`)
|
||||
* [CVE-2023-38180](CVE-2023/CVE-2023-381xx/CVE-2023-38180.json) (`2023-08-08T20:39:01.517`)
|
||||
* [CVE-2023-39518](CVE-2023/CVE-2023-395xx/CVE-2023-39518.json) (`2023-08-08T20:39:01.517`)
|
||||
* [CVE-2023-39533](CVE-2023/CVE-2023-395xx/CVE-2023-39533.json) (`2023-08-08T20:39:01.517`)
|
||||
* [CVE-2023-40041](CVE-2023/CVE-2023-400xx/CVE-2023-40041.json) (`2023-08-08T20:39:01.517`)
|
||||
* [CVE-2023-40042](CVE-2023/CVE-2023-400xx/CVE-2023-40042.json) (`2023-08-08T20:39:01.517`)
|
||||
* [CVE-2023-36213](CVE-2023/CVE-2023-362xx/CVE-2023-36213.json) (`2023-08-08T20:39:53.627`)
|
||||
* [CVE-2023-38948](CVE-2023/CVE-2023-389xx/CVE-2023-38948.json) (`2023-08-08T20:53:51.983`)
|
||||
* [CVE-2023-20569](CVE-2023/CVE-2023-205xx/CVE-2023-20569.json) (`2023-08-08T21:15:09.367`)
|
||||
* [CVE-2023-20593](CVE-2023/CVE-2023-205xx/CVE-2023-20593.json) (`2023-08-08T21:15:10.133`)
|
||||
* [CVE-2023-22403](CVE-2023/CVE-2023-224xx/CVE-2023-22403.json) (`2023-08-08T21:15:10.807`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user