mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-08-28T08:00:31.677577+00:00
This commit is contained in:
parent
b151709954
commit
2943fe287f
55
CVE-2023/CVE-2023-380xx/CVE-2023-38029.json
Normal file
55
CVE-2023/CVE-2023-380xx/CVE-2023-38029.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-38029",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2023-08-28T06:15:07.857",
|
||||
"lastModified": "2023-08-28T06:15:07.857",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nSaho\u2019s attendance devices ADM100 and ADM-100FP has insufficient filtering for special characters and file type within their file uploading function. A unauthenticate remote attacker authenticated can upload and execute arbitrary files to perform arbitrary system commands or disrupt service.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7336-35a94-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-380xx/CVE-2023-38030.json
Normal file
55
CVE-2023/CVE-2023-380xx/CVE-2023-38030.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-38030",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2023-08-28T07:15:09.513",
|
||||
"lastModified": "2023-08-28T07:15:09.513",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nSaho\u2019s attendance devices ADM100 and ADM-100FP have a vulnerability of missing authentication for critical functions. An unauthenticated remote attacker can execute system commands in partial website URLs to read sensitive device information without permissions.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7337-501df-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
43
README.md
43
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-08-28T06:00:39.893906+00:00
|
||||
2023-08-28T08:00:31.677577+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-08-28T05:16:07.333000+00:00
|
||||
2023-08-28T07:15:09.513000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,50 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
223527
|
||||
223529
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
* [CVE-2016-15035](CVE-2016/CVE-2016-150xx/CVE-2016-15035.json) (`2023-08-28T04:15:08.573`)
|
||||
* [CVE-2023-38024](CVE-2023/CVE-2023-380xx/CVE-2023-38024.json) (`2023-08-28T04:15:14.783`)
|
||||
* [CVE-2023-38025](CVE-2023/CVE-2023-380xx/CVE-2023-38025.json) (`2023-08-28T04:15:16.477`)
|
||||
* [CVE-2023-38026](CVE-2023/CVE-2023-380xx/CVE-2023-38026.json) (`2023-08-28T04:15:16.807`)
|
||||
* [CVE-2023-38027](CVE-2023/CVE-2023-380xx/CVE-2023-38027.json) (`2023-08-28T04:15:17.160`)
|
||||
* [CVE-2023-38028](CVE-2023/CVE-2023-380xx/CVE-2023-38028.json) (`2023-08-28T05:15:07.667`)
|
||||
* [CVE-2023-38029](CVE-2023/CVE-2023-380xx/CVE-2023-38029.json) (`2023-08-28T06:15:07.857`)
|
||||
* [CVE-2023-38030](CVE-2023/CVE-2023-380xx/CVE-2023-38030.json) (`2023-08-28T07:15:09.513`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `27`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2022-43909](CVE-2022/CVE-2022-439xx/CVE-2022-43909.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-20197](CVE-2023/CVE-2023-201xx/CVE-2023-20197.json) (`2023-08-28T04:15:11.803`)
|
||||
* [CVE-2023-33852](CVE-2023/CVE-2023-338xx/CVE-2023-33852.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-38730](CVE-2023/CVE-2023-387xx/CVE-2023-38730.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-4557](CVE-2023/CVE-2023-45xx/CVE-2023-4557.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-4558](CVE-2023/CVE-2023-45xx/CVE-2023-4558.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-4559](CVE-2023/CVE-2023-45xx/CVE-2023-4559.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-22877](CVE-2023/CVE-2023-228xx/CVE-2023-22877.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-23473](CVE-2023/CVE-2023-234xx/CVE-2023-23473.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-24959](CVE-2023/CVE-2023-249xx/CVE-2023-24959.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-26270](CVE-2023/CVE-2023-262xx/CVE-2023-26270.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-26271](CVE-2023/CVE-2023-262xx/CVE-2023-26271.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-26272](CVE-2023/CVE-2023-262xx/CVE-2023-26272.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-4560](CVE-2023/CVE-2023-45xx/CVE-2023-4560.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-4561](CVE-2023/CVE-2023-45xx/CVE-2023-4561.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-4544](CVE-2023/CVE-2023-45xx/CVE-2023-4544.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-4545](CVE-2023/CVE-2023-45xx/CVE-2023-4545.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-4546](CVE-2023/CVE-2023-45xx/CVE-2023-4546.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-4547](CVE-2023/CVE-2023-45xx/CVE-2023-4547.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-4548](CVE-2023/CVE-2023-45xx/CVE-2023-4548.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-4555](CVE-2023/CVE-2023-45xx/CVE-2023-4555.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-4556](CVE-2023/CVE-2023-45xx/CVE-2023-4556.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-30435](CVE-2023/CVE-2023-304xx/CVE-2023-30435.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-30436](CVE-2023/CVE-2023-304xx/CVE-2023-30436.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-30437](CVE-2023/CVE-2023-304xx/CVE-2023-30437.json) (`2023-08-28T05:16:07.333`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user