Auto-Update: 2023-09-19T23:55:25.195838+00:00

This commit is contained in:
cad-safe-bot 2023-09-19 23:55:28 +00:00
parent c6aaf4d0b3
commit 122d94c705
23 changed files with 240 additions and 61 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-20391",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-22T22:15:10.080",
"lastModified": "2020-01-23T21:16:27.040",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-19T22:15:09.720",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -184,6 +184,10 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-20392",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-22T22:15:10.143",
"lastModified": "2020-01-23T21:18:43.547",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-19T22:15:10.183",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -174,6 +174,10 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-20393",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-22T22:15:10.237",
"lastModified": "2020-01-23T21:19:00.890",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-19T22:15:10.290",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -174,6 +174,10 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-20394",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-22T22:15:10.330",
"lastModified": "2020-01-23T21:29:09.497",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-19T22:15:10.397",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -184,6 +184,10 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-20395",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-22T22:15:10.423",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-19T22:15:10.490",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -172,6 +172,10 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-20396",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-22T22:15:10.470",
"lastModified": "2021-07-21T11:39:23.747",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-19T22:15:10.597",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -165,6 +165,10 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-20397",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-22T22:15:10.550",
"lastModified": "2020-01-23T21:18:09.840",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-19T22:15:10.693",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -173,6 +173,10 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-20398",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-22T22:15:10.627",
"lastModified": "2020-01-23T20:13:02.950",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-19T22:15:10.780",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -183,6 +183,10 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36440",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-03T16:15:07.287",
"lastModified": "2023-09-12T00:15:08.523",
"lastModified": "2023-09-19T22:15:10.907",
"vulnStatus": "Modified",
"descriptions": [
{
@ -79,6 +79,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3HU4PKLUVB5CTMOVQ2GV33TNUNMJCBGD/",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-40302",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-03T12:16:27.423",
"lastModified": "2023-09-12T00:15:08.693",
"lastModified": "2023-09-19T22:15:11.020",
"vulnStatus": "Modified",
"descriptions": [
{
@ -72,6 +72,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5495",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-40318",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-03T12:16:27.800",
"lastModified": "2023-09-12T00:15:08.787",
"lastModified": "2023-09-19T22:15:11.123",
"vulnStatus": "Modified",
"descriptions": [
{
@ -72,6 +72,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5495",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-43681",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-03T12:16:30.070",
"lastModified": "2023-09-12T00:15:08.860",
"lastModified": "2023-09-19T22:15:11.200",
"vulnStatus": "Modified",
"descriptions": [
{
@ -72,6 +72,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5495",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31490",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-09T16:15:14.757",
"lastModified": "2023-09-12T00:15:08.947",
"lastModified": "2023-09-19T22:15:11.297",
"vulnStatus": "Modified",
"descriptions": [
{
@ -73,6 +73,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5495",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38802",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-29T16:15:09.113",
"lastModified": "2023-09-12T00:15:09.043",
"lastModified": "2023-09-19T22:15:11.407",
"vulnStatus": "Modified",
"descriptions": [
{
@ -80,6 +80,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
"source": "cve@mitre.org"
},
{
"url": "https://news.ycombinator.com/item?id=37305800",
"source": "cve@mitre.org",

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-40931",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-19T23:15:09.153",
"lastModified": "2023-09-19T23:15:09.153",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability in Nagios XI from version 5.11.0 up to and including 5.11.1 allows authenticated attackers to execute arbitrary SQL commands via the ID parameter in the POST request to /nagiosxi/admin/banner_message-ajaxhelper.php"
}
],
"metrics": {},
"references": [
{
"url": "http://nagios.com",
"source": "cve@mitre.org"
},
{
"url": "https://outpost24.com/blog/nagios-xi-vulnerabilities/",
"source": "cve@mitre.org"
},
{
"url": "https://www.nagios.com/products/security/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-40932",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-19T23:15:10.237",
"lastModified": "2023-09-19T23:15:10.237",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Cross-site scripting (XSS) vulnerability in Nagios XI version 5.11.1 and below allows authenticated attackers with access to the custom logo component to inject arbitrary javascript or HTML via the alt-text field. This affects all pages containing the navbar including the login page which means the attacker is able to to steal plaintext credentials."
}
],
"metrics": {},
"references": [
{
"url": "http://nagios.com",
"source": "cve@mitre.org"
},
{
"url": "https://outpost24.com/blog/nagios-xi-vulnerabilities/",
"source": "cve@mitre.org"
},
{
"url": "https://www.nagios.com/products/security/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-40933",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-19T23:15:10.533",
"lastModified": "2023-09-19T23:15:10.533",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability in Nagios XI v5.11.1 and below allows authenticated attackers with announcement banner configuration privileges to execute arbitrary SQL commands via the ID parameter sent to the update_banner_message() function."
}
],
"metrics": {},
"references": [
{
"url": "http://nagios.com",
"source": "cve@mitre.org"
},
{
"url": "https://outpost24.com/blog/nagios-xi-vulnerabilities/",
"source": "cve@mitre.org"
},
{
"url": "https://www.nagios.com/products/security/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-40934",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-19T23:15:10.677",
"lastModified": "2023-09-19T23:15:10.677",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability in Nagios XI 5.11.1 and below allows authenticated attackers with privileges to manage host escalations in the Core Configuration Manager to execute arbitrary SQL commands via the host escalation notification settings."
}
],
"metrics": {},
"references": [
{
"url": "http://nagios.com",
"source": "cve@mitre.org"
},
{
"url": "https://outpost24.com/blog/nagios-xi-vulnerabilities/",
"source": "cve@mitre.org"
},
{
"url": "https://www.nagios.com/products/security/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-41358",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-29T04:15:16.180",
"lastModified": "2023-09-12T00:15:09.387",
"lastModified": "2023-09-19T22:15:11.507",
"vulnStatus": "Modified",
"descriptions": [
{
@ -73,6 +73,10 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5495",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41360",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-29T04:15:16.957",
"lastModified": "2023-08-30T00:44:54.753",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-19T22:15:11.603",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -72,6 +72,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41361",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-29T04:15:17.027",
"lastModified": "2023-08-30T00:45:03.640",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-19T22:15:11.693",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -76,6 +76,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41909",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-05T07:15:14.877",
"lastModified": "2023-09-08T16:49:26.730",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-19T22:15:11.777",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -71,6 +71,10 @@
"tags": [
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-19T22:00:24.982772+00:00
2023-09-19T23:55:25.195838+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-19T21:26:49+00:00
2023-09-19T23:15:10.677000+00:00
```
### Last Data Feed Release
@ -29,46 +29,41 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
225839
225843
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `4`
* [CVE-2023-2995](CVE-2023/CVE-2023-29xx/CVE-2023-2995.json) (`2023-09-19T20:15:09.120`)
* [CVE-2023-4376](CVE-2023/CVE-2023-43xx/CVE-2023-4376.json) (`2023-09-19T20:15:09.380`)
* [CVE-2023-40931](CVE-2023/CVE-2023-409xx/CVE-2023-40931.json) (`2023-09-19T23:15:09.153`)
* [CVE-2023-40932](CVE-2023/CVE-2023-409xx/CVE-2023-40932.json) (`2023-09-19T23:15:10.237`)
* [CVE-2023-40933](CVE-2023/CVE-2023-409xx/CVE-2023-40933.json) (`2023-09-19T23:15:10.533`)
* [CVE-2023-40934](CVE-2023/CVE-2023-409xx/CVE-2023-40934.json) (`2023-09-19T23:15:10.677`)
### CVEs modified in the last Commit
Recently modified CVEs: `25`
Recently modified CVEs: `18`
* [CVE-2020-36766](CVE-2020/CVE-2020-367xx/CVE-2020-36766.json) (`2023-09-19T21:23:38.407`)
* [CVE-2022-28357](CVE-2022/CVE-2022-283xx/CVE-2022-28357.json) (`2023-09-19T21:26:22.240`)
* [CVE-2023-4972](CVE-2023/CVE-2023-49xx/CVE-2023-4972.json) (`2023-09-19T20:00:25.687`)
* [CVE-2023-32665](CVE-2023/CVE-2023-326xx/CVE-2023-32665.json) (`2023-09-19T20:06:11.567`)
* [CVE-2023-4893](CVE-2023/CVE-2023-48xx/CVE-2023-4893.json) (`2023-09-19T20:27:47.997`)
* [CVE-2023-3711](CVE-2023/CVE-2023-37xx/CVE-2023-3711.json) (`2023-09-19T20:35:35.727`)
* [CVE-2023-26142](CVE-2023/CVE-2023-261xx/CVE-2023-26142.json) (`2023-09-19T20:36:09.690`)
* [CVE-2023-3710](CVE-2023/CVE-2023-37xx/CVE-2023-3710.json) (`2023-09-19T20:42:18.100`)
* [CVE-2023-40868](CVE-2023/CVE-2023-408xx/CVE-2023-40868.json) (`2023-09-19T20:44:25.837`)
* [CVE-2023-4501](CVE-2023/CVE-2023-45xx/CVE-2023-4501.json) (`2023-09-19T20:53:36.317`)
* [CVE-2023-20243](CVE-2023/CVE-2023-202xx/CVE-2023-20243.json) (`2023-09-19T21:02:44.640`)
* [CVE-2023-41834](CVE-2023/CVE-2023-418xx/CVE-2023-41834.json) (`2023-09-19T21:15:25.203`)
* [CVE-2023-5031](CVE-2023/CVE-2023-50xx/CVE-2023-5031.json) (`2023-09-19T21:22:47.907`)
* [CVE-2023-41349](CVE-2023/CVE-2023-413xx/CVE-2023-41349.json) (`2023-09-19T21:23:04.903`)
* [CVE-2023-34999](CVE-2023/CVE-2023-349xx/CVE-2023-34999.json) (`2023-09-19T21:23:55.247`)
* [CVE-2023-42359](CVE-2023/CVE-2023-423xx/CVE-2023-42359.json) (`2023-09-19T21:24:04.917`)
* [CVE-2023-33831](CVE-2023/CVE-2023-338xx/CVE-2023-33831.json) (`2023-09-19T21:24:14.833`)
* [CVE-2023-39040](CVE-2023/CVE-2023-390xx/CVE-2023-39040.json) (`2023-09-19T21:24:29.890`)
* [CVE-2023-39039](CVE-2023/CVE-2023-390xx/CVE-2023-39039.json) (`2023-09-19T21:24:37.420`)
* [CVE-2023-37611](CVE-2023/CVE-2023-376xx/CVE-2023-37611.json) (`2023-09-19T21:24:44.943`)
* [CVE-2023-39049](CVE-2023/CVE-2023-390xx/CVE-2023-39049.json) (`2023-09-19T21:24:54.373`)
* [CVE-2023-39056](CVE-2023/CVE-2023-390xx/CVE-2023-39056.json) (`2023-09-19T21:25:03.967`)
* [CVE-2023-40788](CVE-2023/CVE-2023-407xx/CVE-2023-40788.json) (`2023-09-19T21:25:17.007`)
* [CVE-2023-41599](CVE-2023/CVE-2023-415xx/CVE-2023-41599.json) (`2023-09-19T21:26:38.307`)
* [CVE-2023-5060](CVE-2023/CVE-2023-50xx/CVE-2023-5060.json) (`2023-09-19T21:26:49.000`)
* [CVE-2019-20391](CVE-2019/CVE-2019-203xx/CVE-2019-20391.json) (`2023-09-19T22:15:09.720`)
* [CVE-2019-20392](CVE-2019/CVE-2019-203xx/CVE-2019-20392.json) (`2023-09-19T22:15:10.183`)
* [CVE-2019-20393](CVE-2019/CVE-2019-203xx/CVE-2019-20393.json) (`2023-09-19T22:15:10.290`)
* [CVE-2019-20394](CVE-2019/CVE-2019-203xx/CVE-2019-20394.json) (`2023-09-19T22:15:10.397`)
* [CVE-2019-20395](CVE-2019/CVE-2019-203xx/CVE-2019-20395.json) (`2023-09-19T22:15:10.490`)
* [CVE-2019-20396](CVE-2019/CVE-2019-203xx/CVE-2019-20396.json) (`2023-09-19T22:15:10.597`)
* [CVE-2019-20397](CVE-2019/CVE-2019-203xx/CVE-2019-20397.json) (`2023-09-19T22:15:10.693`)
* [CVE-2019-20398](CVE-2019/CVE-2019-203xx/CVE-2019-20398.json) (`2023-09-19T22:15:10.780`)
* [CVE-2022-36440](CVE-2022/CVE-2022-364xx/CVE-2022-36440.json) (`2023-09-19T22:15:10.907`)
* [CVE-2022-40302](CVE-2022/CVE-2022-403xx/CVE-2022-40302.json) (`2023-09-19T22:15:11.020`)
* [CVE-2022-40318](CVE-2022/CVE-2022-403xx/CVE-2022-40318.json) (`2023-09-19T22:15:11.123`)
* [CVE-2022-43681](CVE-2022/CVE-2022-436xx/CVE-2022-43681.json) (`2023-09-19T22:15:11.200`)
* [CVE-2023-31490](CVE-2023/CVE-2023-314xx/CVE-2023-31490.json) (`2023-09-19T22:15:11.297`)
* [CVE-2023-38802](CVE-2023/CVE-2023-388xx/CVE-2023-38802.json) (`2023-09-19T22:15:11.407`)
* [CVE-2023-41358](CVE-2023/CVE-2023-413xx/CVE-2023-41358.json) (`2023-09-19T22:15:11.507`)
* [CVE-2023-41360](CVE-2023/CVE-2023-413xx/CVE-2023-41360.json) (`2023-09-19T22:15:11.603`)
* [CVE-2023-41361](CVE-2023/CVE-2023-413xx/CVE-2023-41361.json) (`2023-09-19T22:15:11.693`)
* [CVE-2023-41909](CVE-2023/CVE-2023-419xx/CVE-2023-41909.json) (`2023-09-19T22:15:11.777`)
## Download and Usage