Auto-Update: 2023-08-16T10:00:30.633672+00:00

This commit is contained in:
cad-safe-bot 2023-08-16 10:00:34 +00:00
parent 9bed9e3ca3
commit 12f5e6eb4a
11 changed files with 113 additions and 85 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-2330", "id": "CVE-2023-2330",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2023-07-17T14:15:09.910", "published": "2023-07-17T14:15:09.910",
"lastModified": "2023-07-26T19:22:00.453", "lastModified": "2023-08-16T08:15:39.860",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Caldera Forms Google Sheets Connector WordPress plugin through 1.2 does not have CSRF check when updating its Access Code, which could allow attackers to make logged in admin change the access code to an arbitrary one via a CSRF attack" "value": "The Caldera Forms Google Sheets Connector WordPress plugin before 1.3 does not have CSRF check when updating its Access Code, which could allow attackers to make logged in admin change the access code to an arbitrary one via a CSRF attack"
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2886", "id": "CVE-2023-2886",
"sourceIdentifier": "cve@usom.gov.tr", "sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-05-25T09:15:12.303", "published": "2023-05-25T09:15:12.303",
"lastModified": "2023-08-02T17:16:08.137", "lastModified": "2023-08-16T08:15:40.977",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -17,20 +17,20 @@
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
"userInteraction": "REQUIRED", "userInteraction": "REQUIRED",
"scope": "UNCHANGED", "scope": "UNCHANGED",
"confidentialityImpact": "HIGH", "confidentialityImpact": "LOW",
"integrityImpact": "NONE", "integrityImpact": "LOW",
"availabilityImpact": "NONE", "availabilityImpact": "NONE",
"baseScore": 6.5, "baseScore": 5.4,
"baseSeverity": "MEDIUM" "baseSeverity": "MEDIUM"
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 3.6 "impactScore": 2.5
}, },
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -56,22 +56,22 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "nvd@nist.gov", "source": "cve@usom.gov.tr",
"type": "Primary", "type": "Primary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-346" "value": "CWE-1385"
} }
] ]
}, },
{ {
"source": "cve@usom.gov.tr", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-1385" "value": "CWE-346"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2959", "id": "CVE-2023-2959",
"sourceIdentifier": "cve@usom.gov.tr", "sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-07-17T14:15:10.157", "published": "2023-07-17T14:15:10.157",
"lastModified": "2023-07-27T19:59:26.280", "lastModified": "2023-08-16T08:15:41.177",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -13,7 +13,7 @@
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "cve@usom.gov.tr",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
@ -33,45 +33,45 @@
"impactScore": 3.6 "impactScore": 3.6
}, },
{ {
"source": "cve@usom.gov.tr", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
"userInteraction": "NONE", "userInteraction": "NONE",
"scope": "UNCHANGED", "scope": "UNCHANGED",
"confidentialityImpact": "HIGH", "confidentialityImpact": "HIGH",
"integrityImpact": "LOW", "integrityImpact": "NONE",
"availabilityImpact": "NONE", "availabilityImpact": "NONE",
"baseScore": 8.2, "baseScore": 7.5,
"baseSeverity": "HIGH" "baseSeverity": "HIGH"
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 4.2 "impactScore": 3.6
} }
] ]
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "nvd@nist.gov", "source": "cve@usom.gov.tr",
"type": "Primary", "type": "Primary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-287" "value": "CWE-305"
} }
] ]
}, },
{ {
"source": "cve@usom.gov.tr", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-305" "value": "CWE-287"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3446", "id": "CVE-2023-3446",
"sourceIdentifier": "openssl-security@openssl.org", "sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-07-19T12:15:10.003", "published": "2023-07-19T12:15:10.003",
"lastModified": "2023-08-03T15:15:30.680", "lastModified": "2023-08-16T08:15:41.420",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -138,6 +138,10 @@
"Patch" "Patch"
] ]
}, },
{
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html",
"source": "openssl-security@openssl.org"
},
{ {
"url": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/",
"source": "openssl-security@openssl.org" "source": "openssl-security@openssl.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35067", "id": "CVE-2023-35067",
"sourceIdentifier": "cve@usom.gov.tr", "sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-07-25T07:15:10.770", "published": "2023-07-25T07:15:10.770",
"lastModified": "2023-08-04T18:28:02.327", "lastModified": "2023-08-16T08:15:41.300",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -13,7 +13,7 @@
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "cve@usom.gov.tr",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
@ -33,45 +33,45 @@
"impactScore": 3.6 "impactScore": 3.6
}, },
{ {
"source": "cve@usom.gov.tr", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "NONE",
"userInteraction": "NONE", "userInteraction": "NONE",
"scope": "CHANGED", "scope": "UNCHANGED",
"confidentialityImpact": "HIGH", "confidentialityImpact": "HIGH",
"integrityImpact": "HIGH", "integrityImpact": "NONE",
"availabilityImpact": "HIGH", "availabilityImpact": "NONE",
"baseScore": 9.1, "baseScore": 7.5,
"baseSeverity": "CRITICAL" "baseSeverity": "HIGH"
}, },
"exploitabilityScore": 2.3, "exploitabilityScore": 3.9,
"impactScore": 6.0 "impactScore": 3.6
} }
] ]
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "nvd@nist.gov", "source": "cve@usom.gov.tr",
"type": "Primary", "type": "Primary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-522" "value": "CWE-256"
} }
] ]
}, },
{ {
"source": "cve@usom.gov.tr", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-256" "value": "CWE-522"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3632", "id": "CVE-2023-3632",
"sourceIdentifier": "cve@usom.gov.tr", "sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-08-09T09:15:14.297", "published": "2023-08-09T09:15:14.297",
"lastModified": "2023-08-15T18:56:10.700", "lastModified": "2023-08-16T08:15:41.550",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -13,7 +13,7 @@
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "cve@usom.gov.tr",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
@ -33,24 +33,24 @@
"impactScore": 5.9 "impactScore": 5.9
}, },
{ {
"source": "cve@usom.gov.tr", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "HIGH", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
"userInteraction": "NONE", "userInteraction": "NONE",
"scope": "CHANGED", "scope": "UNCHANGED",
"confidentialityImpact": "HIGH", "confidentialityImpact": "HIGH",
"integrityImpact": "HIGH", "integrityImpact": "HIGH",
"availabilityImpact": "HIGH", "availabilityImpact": "HIGH",
"baseScore": 9.0, "baseScore": 9.8,
"baseSeverity": "CRITICAL" "baseSeverity": "CRITICAL"
}, },
"exploitabilityScore": 2.2, "exploitabilityScore": 3.9,
"impactScore": 6.0 "impactScore": 5.9
} }
] ]
}, },

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3653", "id": "CVE-2023-3653",
"sourceIdentifier": "cve@usom.gov.tr", "sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-08-08T15:15:10.817", "published": "2023-08-08T15:15:10.817",
"lastModified": "2023-08-15T00:25:12.383", "lastModified": "2023-08-16T08:15:41.653",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -13,7 +13,7 @@
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "cve@usom.gov.tr",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
@ -33,23 +33,23 @@
"impactScore": 2.7 "impactScore": 2.7
}, },
{ {
"source": "cve@usom.gov.tr", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "LOW",
"userInteraction": "REQUIRED", "userInteraction": "REQUIRED",
"scope": "CHANGED", "scope": "CHANGED",
"confidentialityImpact": "LOW", "confidentialityImpact": "LOW",
"integrityImpact": "LOW", "integrityImpact": "LOW",
"availabilityImpact": "NONE", "availabilityImpact": "NONE",
"baseScore": 6.1, "baseScore": 5.4,
"baseSeverity": "MEDIUM" "baseSeverity": "MEDIUM"
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.3,
"impactScore": 2.7 "impactScore": 2.7
} }
] ]

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37581", "id": "CVE-2023-37581",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2023-08-06T08:15:09.013", "published": "2023-08-06T08:15:09.013",
"lastModified": "2023-08-10T15:53:37.093", "lastModified": "2023-08-16T09:15:11.027",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -36,22 +36,22 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "nvd@nist.gov", "source": "security@apache.org",
"type": "Primary", "type": "Primary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-79" "value": "CWE-20"
} }
] ]
}, },
{ {
"source": "security@apache.org", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-20" "value": "CWE-79"
} }
] ]
} }
@ -75,13 +75,6 @@
} }
], ],
"references": [ "references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Jul/43",
"source": "security@apache.org",
"tags": [
"Not Applicable"
]
},
{ {
"url": "https://lists.apache.org/thread/n9mjhhlm7z7b7to646tkvf3otkf21flp", "url": "https://lists.apache.org/thread/n9mjhhlm7z7b7to646tkvf3otkf21flp",
"source": "security@apache.org", "source": "security@apache.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3817", "id": "CVE-2023-3817",
"sourceIdentifier": "openssl-security@openssl.org", "sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-07-31T16:15:10.497", "published": "2023-07-31T16:15:10.497",
"lastModified": "2023-08-08T19:04:09.103", "lastModified": "2023-08-16T08:15:41.760",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -459,6 +459,10 @@
"Patch" "Patch"
] ]
}, },
{
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html",
"source": "openssl-security@openssl.org"
},
{ {
"url": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt",
"source": "openssl-security@openssl.org", "source": "openssl-security@openssl.org",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-39507",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-08-16T09:15:11.793",
"lastModified": "2023-08-16T09:15:11.793",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper authorization in the custom URL scheme handler in \"Rikunabi NEXT\" App for Android prior to ver. 11.5.0 allows a malicious intent to lead the vulnerable App to access an arbitrary website."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN84820712/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-08-16T06:00:35.231234+00:00 2023-08-16T10:00:30.633672+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-08-16T05:15:10.357000+00:00 2023-08-16T09:15:11.793000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -29,22 +29,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
222770 222771
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `3` Recently added CVEs: `1`
* [CVE-2023-26140](CVE-2023/CVE-2023-261xx/CVE-2023-26140.json) (`2023-08-16T05:15:09.810`) * [CVE-2023-39507](CVE-2023/CVE-2023-395xx/CVE-2023-39507.json) (`2023-08-16T09:15:11.793`)
* [CVE-2023-3958](CVE-2023/CVE-2023-39xx/CVE-2023-3958.json) (`2023-08-16T05:15:10.220`)
* [CVE-2023-4374](CVE-2023/CVE-2023-43xx/CVE-2023-4374.json) (`2023-08-16T05:15:10.357`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `9`
* [CVE-2023-2330](CVE-2023/CVE-2023-23xx/CVE-2023-2330.json) (`2023-08-16T08:15:39.860`)
* [CVE-2023-2886](CVE-2023/CVE-2023-28xx/CVE-2023-2886.json) (`2023-08-16T08:15:40.977`)
* [CVE-2023-2959](CVE-2023/CVE-2023-29xx/CVE-2023-2959.json) (`2023-08-16T08:15:41.177`)
* [CVE-2023-35067](CVE-2023/CVE-2023-350xx/CVE-2023-35067.json) (`2023-08-16T08:15:41.300`)
* [CVE-2023-3446](CVE-2023/CVE-2023-34xx/CVE-2023-3446.json) (`2023-08-16T08:15:41.420`)
* [CVE-2023-3632](CVE-2023/CVE-2023-36xx/CVE-2023-3632.json) (`2023-08-16T08:15:41.550`)
* [CVE-2023-3653](CVE-2023/CVE-2023-36xx/CVE-2023-3653.json) (`2023-08-16T08:15:41.653`)
* [CVE-2023-3817](CVE-2023/CVE-2023-38xx/CVE-2023-3817.json) (`2023-08-16T08:15:41.760`)
* [CVE-2023-37581](CVE-2023/CVE-2023-375xx/CVE-2023-37581.json) (`2023-08-16T09:15:11.027`)
## Download and Usage ## Download and Usage