Auto-Update: 2023-11-24T15:00:24.926692+00:00

This commit is contained in:
cad-safe-bot 2023-11-24 15:00:28 +00:00
parent a58264d370
commit 286a093c72
10 changed files with 186 additions and 19 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-10095",
"sourceIdentifier": "security@apache.org",
"published": "2021-09-02T17:15:07.787",
"lastModified": "2023-11-07T03:02:23.480",
"lastModified": "2023-11-24T14:15:07.710",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202311-04",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-13929",
"sourceIdentifier": "security@apache.org",
"published": "2021-09-02T17:15:07.860",
"lastModified": "2023-11-07T03:17:00.290",
"lastModified": "2023-11-24T14:15:07.847",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
{
"url": "https://lists.apache.org/thread.html/r99529e175a7c1c9a26bd41a02802c8af7aa97319fe561874627eb999%40%3Cusers.zeppelin.apache.org%3E",
"source": "security@apache.org"
},
{
"url": "https://security.gentoo.org/glsa/202311-04",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-27578",
"sourceIdentifier": "security@apache.org",
"published": "2021-09-02T17:15:08.453",
"lastModified": "2023-11-07T03:31:58.867",
"lastModified": "2023-11-24T14:15:07.950",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202311-04",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-31239",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-09T02:15:08.907",
"lastModified": "2023-11-07T03:34:55.690",
"lastModified": "2023-11-24T14:15:08.023",
"vulnStatus": "Modified",
"descriptions": [
{
@ -80,6 +80,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/",
"source": "cve@mitre.org"
},
{
"url": "https://security.gentoo.org/glsa/202311-03",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230609-0010/",
"source": "cve@mitre.org"

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-40734",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-14T23:15:09.583",
"lastModified": "2022-09-17T01:46:21.447",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-24T14:15:08.130",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "UniSharp laravel-filemanager (aka Laravel Filemanager) through 2.5.1 allows download?working_dir=%2F.. directory traversal to read arbitrary files, as exploited in the wild in June 2022."
"value": "UniSharp laravel-filemanager (aka Laravel Filemanager) before 2.6.4 allows download?working_dir=%2F.. directory traversal to read arbitrary files, as exploited in the wild in June 2022. This is related to league/flysystem before 2.0.0."
},
{
"lang": "es",
@ -77,6 +77,14 @@
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46908",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-12T06:15:10.793",
"lastModified": "2023-03-07T18:21:59.017",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-24T14:15:08.220",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -75,6 +75,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202311-03",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230203-0005/",
"source": "cve@mitre.org",

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2023-38914",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-24T13:15:07.267",
"lastModified": "2023-11-24T13:15:07.267",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-46575",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-24T14:15:08.337",
"lastModified": "2023-11-24T14:15:08.337",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability in Meshery before 0.6.179 allows a remote attacker to obtain sensitive information and execute arbitrary code via the order parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/meshery/meshery/commit/ffe00967acfe4444a5db08ff3a4cafb9adf6013f",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/meshery/meshery/compare/v0.6.178...v0.6.179",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/meshery/meshery/pull/9372",
"source": "cve@mitre.org"
},
{
"url": "https://meshery.io",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-6274",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-24T14:15:08.413",
"lastModified": "2023-11-24T14:15:08.413",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Beijing Baichuo Smart S80 up to 20231108. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /sysmanage/updatelib.php of the component PHP File Handler. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246103. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/Carol7S/cve/blob/main/rce.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.246103",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.246103",
"source": "cna@vuldb.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-24T13:00:50.975512+00:00
2023-11-24T15:00:24.926692+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-24T12:15:07.310000+00:00
2023-11-24T14:15:08.413000+00:00
```
### Last Data Feed Release
@ -29,24 +29,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
231472
231475
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `3`
* [CVE-2023-38914](CVE-2023/CVE-2023-389xx/CVE-2023-38914.json) (`2023-11-24T13:15:07.267`)
* [CVE-2023-46575](CVE-2023/CVE-2023-465xx/CVE-2023-46575.json) (`2023-11-24T14:15:08.337`)
* [CVE-2023-6274](CVE-2023/CVE-2023-62xx/CVE-2023-6274.json) (`2023-11-24T14:15:08.413`)
### CVEs modified in the last Commit
Recently modified CVEs: `5`
Recently modified CVEs: `6`
* [CVE-2023-39544](CVE-2023/CVE-2023-395xx/CVE-2023-39544.json) (`2023-11-24T12:15:06.883`)
* [CVE-2023-39545](CVE-2023/CVE-2023-395xx/CVE-2023-39545.json) (`2023-11-24T12:15:07.150`)
* [CVE-2023-39546](CVE-2023/CVE-2023-395xx/CVE-2023-39546.json) (`2023-11-24T12:15:07.200`)
* [CVE-2023-39547](CVE-2023/CVE-2023-395xx/CVE-2023-39547.json) (`2023-11-24T12:15:07.260`)
* [CVE-2023-39548](CVE-2023/CVE-2023-395xx/CVE-2023-39548.json) (`2023-11-24T12:15:07.310`)
* [CVE-2019-10095](CVE-2019/CVE-2019-100xx/CVE-2019-10095.json) (`2023-11-24T14:15:07.710`)
* [CVE-2020-13929](CVE-2020/CVE-2020-139xx/CVE-2020-13929.json) (`2023-11-24T14:15:07.847`)
* [CVE-2021-27578](CVE-2021/CVE-2021-275xx/CVE-2021-27578.json) (`2023-11-24T14:15:07.950`)
* [CVE-2021-31239](CVE-2021/CVE-2021-312xx/CVE-2021-31239.json) (`2023-11-24T14:15:08.023`)
* [CVE-2022-40734](CVE-2022/CVE-2022-407xx/CVE-2022-40734.json) (`2023-11-24T14:15:08.130`)
* [CVE-2022-46908](CVE-2022/CVE-2022-469xx/CVE-2022-46908.json) (`2023-11-24T14:15:08.220`)
## Download and Usage