Auto-Update: 2023-05-15T04:00:24.002132+00:00

This commit is contained in:
René Helmke 2023-05-15 06:00:26 +02:00
parent 8283276dac
commit 298a2d3b7b
9 changed files with 81 additions and 46 deletions

View File

@ -2,39 +2,19 @@
"id": "CVE-2023-24838",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2023-03-27T04:15:09.917",
"lastModified": "2023-03-30T19:24:35.093",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-15T03:15:08.943",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "HGiga PowerStation has a vulnerability of Information Leakage. An unauthenticated remote attacker can exploit this vulnerability to obtain the administrator\u2019s credential, resulting in performing arbitrary system operation or disrupt service."
"value": "HGiga PowerStation has a vulnerability of Information Leakage. An unauthenticated remote attacker can exploit this vulnerability to obtain the administrator's credential. This credential can then be used to login PowerStation or Secure Shell to achieve remote code execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
@ -51,27 +31,47 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
"value": "CWE-200"
}
]
},
{
"source": "twcert@cert.org.tw",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-306"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27783",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-16T15:15:10.717",
"lastModified": "2023-03-23T18:08:03.170",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-15T03:15:09.097",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -80,6 +80,10 @@
"Issue Tracking",
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27784",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-16T15:15:10.767",
"lastModified": "2023-03-23T18:03:30.617",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-15T03:15:09.173",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -72,6 +72,10 @@
"Issue Tracking",
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27785",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-16T15:15:10.823",
"lastModified": "2023-03-23T17:45:03.773",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-15T03:15:09.230",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -72,6 +72,10 @@
"Issue Tracking",
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27786",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-16T15:15:10.877",
"lastModified": "2023-03-23T17:35:29.403",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-15T03:15:09.277",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -80,6 +80,10 @@
"Issue Tracking",
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27787",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-16T15:15:10.940",
"lastModified": "2023-03-23T17:32:24.713",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-15T03:15:09.327",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -72,6 +72,10 @@
"Issue Tracking",
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27788",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-16T15:15:11.000",
"lastModified": "2023-03-23T17:28:23.237",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-15T03:15:09.387",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -72,6 +72,10 @@
"Issue Tracking",
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27789",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-16T15:15:11.057",
"lastModified": "2023-03-23T17:26:57.160",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-15T03:15:09.447",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -80,6 +80,10 @@
"Issue Tracking",
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-15T02:00:24.485285+00:00
2023-05-15T04:00:24.002132+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-15T00:15:42.440000+00:00
2023-05-15T03:15:09.447000+00:00
```
### Last Data Feed Release
@ -40,9 +40,16 @@ Recently added CVEs: `0`
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `8`
* [CVE-2010-4645](CVE-2010/CVE-2010-46xx/CVE-2010-4645.json) (`2023-05-15T00:15:42.440`)
* [CVE-2023-24838](CVE-2023/CVE-2023-248xx/CVE-2023-24838.json) (`2023-05-15T03:15:08.943`)
* [CVE-2023-27783](CVE-2023/CVE-2023-277xx/CVE-2023-27783.json) (`2023-05-15T03:15:09.097`)
* [CVE-2023-27784](CVE-2023/CVE-2023-277xx/CVE-2023-27784.json) (`2023-05-15T03:15:09.173`)
* [CVE-2023-27785](CVE-2023/CVE-2023-277xx/CVE-2023-27785.json) (`2023-05-15T03:15:09.230`)
* [CVE-2023-27786](CVE-2023/CVE-2023-277xx/CVE-2023-27786.json) (`2023-05-15T03:15:09.277`)
* [CVE-2023-27787](CVE-2023/CVE-2023-277xx/CVE-2023-27787.json) (`2023-05-15T03:15:09.327`)
* [CVE-2023-27788](CVE-2023/CVE-2023-277xx/CVE-2023-27788.json) (`2023-05-15T03:15:09.387`)
* [CVE-2023-27789](CVE-2023/CVE-2023-277xx/CVE-2023-27789.json) (`2023-05-15T03:15:09.447`)
## Download and Usage