Auto-Update: 2023-07-03T04:00:25.922386+00:00

This commit is contained in:
cad-safe-bot 2023-07-03 04:00:29 +00:00
parent eec47b4913
commit 0f3d110c61
9 changed files with 43 additions and 44 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-3330",
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
"published": "2023-06-28T02:15:49.523",
"lastModified": "2023-06-28T12:34:43.903",
"lastModified": "2023-07-03T03:15:09.473",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2200HP all versions allows\u00a0a attacker\u00a0to\u00a0obtain specific files in the product\n\n."
"value": "Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\u00a0a attacker\u00a0to\u00a0obtain specific files in the product."
}
],
"metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-3331",
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
"published": "2023-06-28T02:15:49.590",
"lastModified": "2023-06-28T12:34:43.903",
"lastModified": "2023-07-03T03:15:09.560",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2200HP all versions allows\u00a0a attacker\u00a0to\u00a0delete\n\n specific files in the product."
"value": "Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\u00a0a attacker\u00a0to\u00a0delete\n\n specific files in the product."
}
],
"metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-3332",
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
"published": "2023-06-28T02:15:49.650",
"lastModified": "2023-06-28T12:34:43.903",
"lastModified": "2023-07-03T03:15:09.633",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation vulnerability in NEC Corporation Aterm WG2200HP all versions allows\u00a0a attacker\u00a0to\u00a0execute an arbitrary script, after obtaining a high privilege exploiting CVE-2023-3330 and CVE-2023-3331 vulnerabilities."
"value": "Improper Neutralization of Input During Web Page Generation vulnerability in NEC Corporation Aterm Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\u00a0a attacker\u00a0to\u00a0\n\nexecute an arbitrary script, after obtaining a high privilege exploiting CVE-2023-3330 and CVE-2023-3331 vulnerabilities."
}
],
"metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-3333",
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
"published": "2023-06-28T02:15:49.713",
"lastModified": "2023-06-28T12:34:43.903",
"lastModified": "2023-07-03T03:15:09.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an OS Command vulnerability in NEC Corporation Aterm WG2200HP all versions allows\u00a0a attacker\u00a0to\u00a0execute an arbitrary OS command with the root privilege, after obtaining a high privilege exploiting CVE-2023-3330 and CVE-2023-3331 vulnerabilities."
"value": "Improper Neutralization of Special Elements used in an OS Command vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\u00a0a attacker\u00a0to\u00a0execute an arbitrary OS command with the root privilege, after obtaining a high privilege exploiting CVE-2023-3330 and CVE-2023-3331 vulnerabilities."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3420",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-26T21:15:09.557",
"lastModified": "2023-07-01T03:23:35.513",
"vulnStatus": "Analyzed",
"lastModified": "2023-07-03T03:15:09.797",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -100,6 +100,10 @@
"Permissions Required"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5440",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3421",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-26T21:15:09.597",
"lastModified": "2023-07-01T03:23:17.043",
"vulnStatus": "Analyzed",
"lastModified": "2023-07-03T03:15:09.883",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -100,6 +100,10 @@
"Permissions Required"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5440",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3422",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-26T21:15:09.640",
"lastModified": "2023-07-01T03:23:07.117",
"vulnStatus": "Analyzed",
"lastModified": "2023-07-03T03:15:10.110",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -100,6 +100,10 @@
"Permissions Required"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5440",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36191",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-23T02:15:09.597",
"lastModified": "2023-06-30T16:30:51.853",
"vulnStatus": "Analyzed",
"lastModified": "2023-07-03T03:15:09.370",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -64,6 +64,10 @@
}
],
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL/",
"source": "cve@mitre.org"
},
{
"url": "https://www.sqlite.org/forum/forumpost/19f55ef73b",
"source": "cve@mitre.org",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-07-03T02:00:26.226658+00:00
2023-07-03T04:00:25.922386+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-07-03T01:10:10.103000+00:00
2023-07-03T03:15:10.110000+00:00
```
### Last Data Feed Release
@ -40,33 +40,16 @@ Recently added CVEs: `0`
### CVEs modified in the last Commit
Recently modified CVEs: `75`
Recently modified CVEs: `8`
* [CVE-2023-29147](CVE-2023/CVE-2023-291xx/CVE-2023-29147.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-35946](CVE-2023/CVE-2023-359xx/CVE-2023-35946.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-35947](CVE-2023/CVE-2023-359xx/CVE-2023-35947.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-1206](CVE-2023/CVE-2023-12xx/CVE-2023-1206.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-22815](CVE-2023/CVE-2023-228xx/CVE-2023-22815.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-22816](CVE-2023/CVE-2023-228xx/CVE-2023-22816.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-29241](CVE-2023/CVE-2023-292xx/CVE-2023-29241.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-2908](CVE-2023/CVE-2023-29xx/CVE-2023-2908.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-33298](CVE-2023/CVE-2023-332xx/CVE-2023-33298.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-3117](CVE-2023/CVE-2023-31xx/CVE-2023-3117.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-3338](CVE-2023/CVE-2023-33xx/CVE-2023-3338.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-3490](CVE-2023/CVE-2023-34xx/CVE-2023-3490.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-3491](CVE-2023/CVE-2023-34xx/CVE-2023-3491.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-3493](CVE-2023/CVE-2023-34xx/CVE-2023-3493.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-36144](CVE-2023/CVE-2023-361xx/CVE-2023-36144.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-36812](CVE-2023/CVE-2023-368xx/CVE-2023-36812.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-22814](CVE-2023/CVE-2023-228xx/CVE-2023-22814.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-28323](CVE-2023/CVE-2023-283xx/CVE-2023-28323.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-28324](CVE-2023/CVE-2023-283xx/CVE-2023-28324.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-28364](CVE-2023/CVE-2023-283xx/CVE-2023-28364.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-28365](CVE-2023/CVE-2023-283xx/CVE-2023-28365.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-30586](CVE-2023/CVE-2023-305xx/CVE-2023-30586.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-30589](CVE-2023/CVE-2023-305xx/CVE-2023-30589.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-31997](CVE-2023/CVE-2023-319xx/CVE-2023-31997.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-26136](CVE-2023/CVE-2023-261xx/CVE-2023-26136.json) (`2023-07-03T01:10:10.103`)
* [CVE-2023-36191](CVE-2023/CVE-2023-361xx/CVE-2023-36191.json) (`2023-07-03T03:15:09.370`)
* [CVE-2023-3330](CVE-2023/CVE-2023-33xx/CVE-2023-3330.json) (`2023-07-03T03:15:09.473`)
* [CVE-2023-3331](CVE-2023/CVE-2023-33xx/CVE-2023-3331.json) (`2023-07-03T03:15:09.560`)
* [CVE-2023-3332](CVE-2023/CVE-2023-33xx/CVE-2023-3332.json) (`2023-07-03T03:15:09.633`)
* [CVE-2023-3333](CVE-2023/CVE-2023-33xx/CVE-2023-3333.json) (`2023-07-03T03:15:09.713`)
* [CVE-2023-3420](CVE-2023/CVE-2023-34xx/CVE-2023-3420.json) (`2023-07-03T03:15:09.797`)
* [CVE-2023-3421](CVE-2023/CVE-2023-34xx/CVE-2023-3421.json) (`2023-07-03T03:15:09.883`)
* [CVE-2023-3422](CVE-2023/CVE-2023-34xx/CVE-2023-3422.json) (`2023-07-03T03:15:10.110`)
## Download and Usage