diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2876.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2876.json new file mode 100644 index 00000000000..885454ca2a8 --- /dev/null +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2876.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-2876", + "sourceIdentifier": "cybersecurity@ch.abb.com", + "published": "2023-06-13T04:15:10.307", + "lastModified": "2023-06-13T04:15:10.307", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Sensitive Cookie Without 'HttpOnly' Flag vulnerability in ABB REX640 PCL1 (firmware modules), ABB REX640 PCL2 (Firmware modules), ABB REX640 PCL3 (firmware modules) allows Cross-Site Scripting (XSS).This issue affects REX640 PCL1: from 1.0;0 before 1.0.8; REX640 PCL2: from 1.0;0 before 1.1.4; REX640 PCL3: from 1.0;0 before 1.2.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1004" + } + ] + } + ], + "references": [ + { + "url": "https://search.abb.com/library/Download.aspx?DocumentID=2NGA001423&LanguageCode=en&DocumentPartId=&Action=Launch", + "source": "cybersecurity@ch.abb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index bd33ce8b689..97d16df08ae 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-13T04:00:25.580218+00:00 +2023-06-13T06:00:28.569136+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-13T03:15:09.837000+00:00 +2023-06-13T04:15:10.307000+00:00 ``` ### Last Data Feed Release @@ -29,37 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -217497 +217498 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `1` -* [CVE-2023-2277](CVE-2023/CVE-2023-22xx/CVE-2023-2277.json) (`2023-06-13T02:15:09.330`) -* [CVE-2023-2278](CVE-2023/CVE-2023-22xx/CVE-2023-2278.json) (`2023-06-13T02:15:09.433`) -* [CVE-2023-2351](CVE-2023/CVE-2023-23xx/CVE-2023-2351.json) (`2023-06-13T02:15:09.507`) -* [CVE-2023-2563](CVE-2023/CVE-2023-25xx/CVE-2023-2563.json) (`2023-06-13T02:15:09.620`) -* [CVE-2023-2827](CVE-2023/CVE-2023-28xx/CVE-2023-2827.json) (`2023-06-13T03:15:09.223`) -* [CVE-2023-32114](CVE-2023/CVE-2023-321xx/CVE-2023-32114.json) (`2023-06-13T03:15:09.393`) -* [CVE-2023-32115](CVE-2023/CVE-2023-321xx/CVE-2023-32115.json) (`2023-06-13T03:15:09.473`) -* [CVE-2023-33984](CVE-2023/CVE-2023-339xx/CVE-2023-33984.json) (`2023-06-13T03:15:09.567`) -* [CVE-2023-33985](CVE-2023/CVE-2023-339xx/CVE-2023-33985.json) (`2023-06-13T03:15:09.667`) -* [CVE-2023-33986](CVE-2023/CVE-2023-339xx/CVE-2023-33986.json) (`2023-06-13T03:15:09.760`) -* [CVE-2023-33991](CVE-2023/CVE-2023-339xx/CVE-2023-33991.json) (`2023-06-13T03:15:09.837`) +* [CVE-2023-2876](CVE-2023/CVE-2023-28xx/CVE-2023-2876.json) (`2023-06-13T04:15:10.307`) ### CVEs modified in the last Commit -Recently modified CVEs: `7` +Recently modified CVEs: `0` -* [CVE-2021-4377](CVE-2021/CVE-2021-43xx/CVE-2021-4377.json) (`2023-06-13T02:05:08.623`) -* [CVE-2021-4376](CVE-2021/CVE-2021-43xx/CVE-2021-4376.json) (`2023-06-13T02:05:33.037`) -* [CVE-2021-4375](CVE-2021/CVE-2021-43xx/CVE-2021-4375.json) (`2023-06-13T02:05:45.717`) -* [CVE-2021-4374](CVE-2021/CVE-2021-43xx/CVE-2021-4374.json) (`2023-06-13T02:05:58.907`) -* [CVE-2021-4373](CVE-2021/CVE-2021-43xx/CVE-2021-4373.json) (`2023-06-13T02:08:22.460`) -* [CVE-2021-4372](CVE-2021/CVE-2021-43xx/CVE-2021-4372.json) (`2023-06-13T02:08:38.943`) -* [CVE-2023-31084](CVE-2023/CVE-2023-310xx/CVE-2023-31084.json) (`2023-06-13T03:15:09.317`) ## Download and Usage