Auto-Update: 2023-08-24T10:00:29.975195+00:00

This commit is contained in:
cad-safe-bot 2023-08-24 10:00:33 +00:00
parent 8c9f1e3305
commit 1c67fbba94
5 changed files with 99 additions and 19 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-37581",
"sourceIdentifier": "security@apache.org",
"published": "2023-08-06T08:15:09.013",
"lastModified": "2023-08-16T12:15:13.800",
"lastModified": "2023-08-24T09:15:08.953",
"vulnStatus": "Modified",
"descriptions": [
{
@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-79"
}
]
},
@ -75,10 +75,6 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/08/16/1",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/n9mjhhlm7z7b7to646tkvf3otkf21flp",
"source": "security@apache.org",
@ -87,6 +83,10 @@
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.openwall.com/lists/oss-security/2023/08/16/1",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-3705",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2023-08-24T08:15:09.040",
"lastModified": "2023-08-24T08:15:09.040",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The vulnerability exists in CP-Plus NVR due to an improper input handling at the web-based management interface of the affected product. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device.\n\nSuccessful exploitation of this vulnerability could allow the remote attacker to obtain sensitive information on the targeted device.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0239",
"source": "vdisclose@cert-in.org.in"
}
]
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2023-38288",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-24T09:15:10.283",
"lastModified": "2023-08-24T09:15:10.283",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** Not a Security Issue."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2023-38289",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-24T09:15:10.510",
"lastModified": "2023-08-24T09:15:10.510",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** Not a Security Issue."
}
],
"metrics": {},
"references": []
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-24T08:00:48.315339+00:00
2023-08-24T10:00:29.975195+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-24T07:15:12.300000+00:00
2023-08-24T09:15:10.510000+00:00
```
### Last Data Feed Release
@ -29,28 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
223354
223357
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `3`
* [CVE-2023-4227](CVE-2023/CVE-2023-42xx/CVE-2023-4227.json) (`2023-08-24T06:15:44.177`)
* [CVE-2023-3704](CVE-2023/CVE-2023-37xx/CVE-2023-3704.json) (`2023-08-24T07:15:11.670`)
* [CVE-2023-4228](CVE-2023/CVE-2023-42xx/CVE-2023-4228.json) (`2023-08-24T07:15:11.823`)
* [CVE-2023-4229](CVE-2023/CVE-2023-42xx/CVE-2023-4229.json) (`2023-08-24T07:15:11.930`)
* [CVE-2023-4230](CVE-2023/CVE-2023-42xx/CVE-2023-4230.json) (`2023-08-24T07:15:12.013`)
* [CVE-2023-4511](CVE-2023/CVE-2023-45xx/CVE-2023-4511.json) (`2023-08-24T07:15:12.107`)
* [CVE-2023-4512](CVE-2023/CVE-2023-45xx/CVE-2023-4512.json) (`2023-08-24T07:15:12.207`)
* [CVE-2023-4513](CVE-2023/CVE-2023-45xx/CVE-2023-4513.json) (`2023-08-24T07:15:12.300`)
* [CVE-2023-3705](CVE-2023/CVE-2023-37xx/CVE-2023-3705.json) (`2023-08-24T08:15:09.040`)
* [CVE-2023-38288](CVE-2023/CVE-2023-382xx/CVE-2023-38288.json) (`2023-08-24T09:15:10.283`)
* [CVE-2023-38289](CVE-2023/CVE-2023-382xx/CVE-2023-38289.json) (`2023-08-24T09:15:10.510`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
* [CVE-2023-38898](CVE-2023/CVE-2023-388xx/CVE-2023-38898.json) (`2023-08-24T07:15:11.413`)
* [CVE-2023-37581](CVE-2023/CVE-2023-375xx/CVE-2023-37581.json) (`2023-08-24T09:15:08.953`)
## Download and Usage