Auto-Update: 2023-11-03T05:00:19.731004+00:00

This commit is contained in:
cad-safe-bot 2023-11-03 05:00:23 +00:00
parent 2a2043582a
commit 2ff1297c05
13 changed files with 305 additions and 44 deletions

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2020-28407",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T04:15:15.447",
"lastModified": "2023-11-03T04:15:15.447",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In swtpm before 0.4.2 and 0.5.x before 0.5.1, a local attacker may be able to overwrite arbitrary files via a symlink attack against a temporary file such as TMP2-00.permall."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1198395",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/stefanberger/swtpm/releases/tag/v0.4.2",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/stefanberger/swtpm/releases/tag/v0.5.1",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34300",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-06-23T17:15:18.460",
"lastModified": "2023-09-07T03:15:07.537",
"lastModified": "2023-11-03T03:15:07.587",
"vulnStatus": "Modified",
"descriptions": [
{
@ -102,6 +102,14 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I4YMGAN6AV4H4HPDINUHBKX7XE4T5THF/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFCXR2EJGIE24DV45AWX6JJM7RQAT5CY/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQCZL36LTOHWCQ25R5WTRSD5QMM436Q6/",
"source": "cve@mitre.org"

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-31102",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T04:15:20.793",
"lastModified": "2023-11-03T04:15:20.793",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "7-Zip through 22.01 on Linux allows an integer underflow and code execution via a crafted 7Z archive."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/713c8a8269/",
"source": "cve@mitre.org"
},
{
"url": "https://www.7-zip.org/download.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1165/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-34259",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T04:15:20.853",
"lastModified": "2023-11-03T04:15:20.853",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow /wlmdeu%2f%2e%2e%2f%2e%2e directory traversal to read arbitrary files on the filesystem, even files that require root privileges. NOTE: this issue exists because of an incomplete fix for CVE-2020-23575."
}
],
"metrics": {},
"references": [
{
"url": "https://sec-consult.com/vulnerability-lab/",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2023/Jul/15",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-34260",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T04:15:20.907",
"lastModified": "2023-11-03T04:15:20.907",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow a denial of service (service outage) via /wlmdeu%2f%2e%2e%2f%2e%2e followed by a directory reference such as %2fetc%00index.htm to try to read the /etc directory."
}
],
"metrics": {},
"references": [
{
"url": "https://sec-consult.com/vulnerability-lab/",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2023/Jul/15",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-34261",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T04:15:20.963",
"lastModified": "2023-11-03T04:15:20.963",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow identification of valid user accounts via username enumeration because they lead to a \"nicht einloggen\" error rather than a falsch error."
}
],
"metrics": {},
"references": [
{
"url": "https://sec-consult.com/vulnerability-lab/",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2023/Jul/15",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-35896",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-11-03T03:15:07.720",
"lastModified": "2023-11-03T03:15:07.720",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM Content Navigator 3.0.13 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 259247."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/259247",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7065203",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-36620",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T04:15:21.023",
"lastModified": "2023-11-03T04:15:21.023",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the Boomerang Parental Control application before 13.83 for Android. The app is missing the android:allowBackup=\"false\" attribute in the manifest. This allows the user to backup the internal memory of the app to a PC. This gives the user access to the API token that is used to authenticate requests to the API."
}
],
"metrics": {},
"references": [
{
"url": "https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2023/Jul/12",
"source": "cve@mitre.org"
},
{
"url": "https://useboomerang.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-36621",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T04:15:21.083",
"lastModified": "2023-11-03T04:15:21.083",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the Boomerang Parental Control application through 13.83 for Android. The child can use Safe Mode to remove all restrictions temporarily or uninstall the application without the parents noticing."
}
],
"metrics": {},
"references": [
{
"url": "https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2023/Jul/12",
"source": "cve@mitre.org"
},
{
"url": "https://useboomerang.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45803",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-17T20:15:10.070",
"lastModified": "2023-10-25T17:21:39.427",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-03T03:15:07.807",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -60,22 +60,22 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-200"
}
]
},
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "NVD-CWE-noinfo"
}
]
}
@ -135,6 +135,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/",
"source": "security-advisories@github.com",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-46954",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T03:15:07.920",
"lastModified": "2023-11-03T03:15:07.920",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in Relativity ODA LLC RelativityOne v.12.1.537.3 Patch 2 and earlier allows a remote attacker to execute arbitrary code via the name parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jakedmurphy1/CVE-2023-46954",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5472",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-25T18:17:43.667",
"lastModified": "2023-11-01T19:04:53.977",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-03T03:15:07.963",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -119,6 +119,10 @@
"Permissions Required"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5TWIUD4VIISLZWEQ4WLWFZT34T3KOXZB/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDMQG42VVOZ5USSI4NSNT3VJPGBPNSIW/",
"source": "chrome-cve-admin@google.com",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-03T03:00:19.927592+00:00
2023-11-03T05:00:19.731004+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-03T02:55:08.753000+00:00
2023-11-03T04:15:21.083000+00:00
```
### Last Data Feed Release
@ -29,49 +29,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
229680
229689
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `9`
* [CVE-2017-7252](CVE-2017/CVE-2017-72xx/CVE-2017-7252.json) (`2023-11-03T01:15:07.777`)
* [CVE-2023-36022](CVE-2023/CVE-2023-360xx/CVE-2023-36022.json) (`2023-11-03T01:15:07.907`)
* [CVE-2023-36029](CVE-2023/CVE-2023-360xx/CVE-2023-36029.json) (`2023-11-03T01:15:07.980`)
* [CVE-2023-36034](CVE-2023/CVE-2023-360xx/CVE-2023-36034.json) (`2023-11-03T01:15:08.047`)
* [CVE-2023-46176](CVE-2023/CVE-2023-461xx/CVE-2023-46176.json) (`2023-11-03T01:15:08.117`)
* [CVE-2020-28407](CVE-2020/CVE-2020-284xx/CVE-2020-28407.json) (`2023-11-03T04:15:15.447`)
* [CVE-2023-35896](CVE-2023/CVE-2023-358xx/CVE-2023-35896.json) (`2023-11-03T03:15:07.720`)
* [CVE-2023-46954](CVE-2023/CVE-2023-469xx/CVE-2023-46954.json) (`2023-11-03T03:15:07.920`)
* [CVE-2023-31102](CVE-2023/CVE-2023-311xx/CVE-2023-31102.json) (`2023-11-03T04:15:20.793`)
* [CVE-2023-34259](CVE-2023/CVE-2023-342xx/CVE-2023-34259.json) (`2023-11-03T04:15:20.853`)
* [CVE-2023-34260](CVE-2023/CVE-2023-342xx/CVE-2023-34260.json) (`2023-11-03T04:15:20.907`)
* [CVE-2023-34261](CVE-2023/CVE-2023-342xx/CVE-2023-34261.json) (`2023-11-03T04:15:20.963`)
* [CVE-2023-36620](CVE-2023/CVE-2023-366xx/CVE-2023-36620.json) (`2023-11-03T04:15:21.023`)
* [CVE-2023-36621](CVE-2023/CVE-2023-366xx/CVE-2023-36621.json) (`2023-11-03T04:15:21.083`)
### CVEs modified in the last Commit
Recently modified CVEs: `63`
Recently modified CVEs: `3`
* [CVE-2022-34185](CVE-2022/CVE-2022-341xx/CVE-2022-34185.json) (`2023-11-03T02:53:49.573`)
* [CVE-2022-25318](CVE-2022/CVE-2022-253xx/CVE-2022-25318.json) (`2023-11-03T02:54:55.067`)
* [CVE-2022-29529](CVE-2022/CVE-2022-295xx/CVE-2022-29529.json) (`2023-11-03T02:55:08.753`)
* [CVE-2023-24432](CVE-2023/CVE-2023-244xx/CVE-2023-24432.json) (`2023-11-03T01:43:10.883`)
* [CVE-2023-24430](CVE-2023/CVE-2023-244xx/CVE-2023-24430.json) (`2023-11-03T01:45:22.703`)
* [CVE-2023-24429](CVE-2023/CVE-2023-244xx/CVE-2023-24429.json) (`2023-11-03T01:49:40.803`)
* [CVE-2023-24431](CVE-2023/CVE-2023-244xx/CVE-2023-24431.json) (`2023-11-03T01:50:55.897`)
* [CVE-2023-24433](CVE-2023/CVE-2023-244xx/CVE-2023-24433.json) (`2023-11-03T01:51:35.530`)
* [CVE-2023-24434](CVE-2023/CVE-2023-244xx/CVE-2023-24434.json) (`2023-11-03T01:52:57.313`)
* [CVE-2023-24435](CVE-2023/CVE-2023-244xx/CVE-2023-24435.json) (`2023-11-03T01:53:24.537`)
* [CVE-2023-24436](CVE-2023/CVE-2023-244xx/CVE-2023-24436.json) (`2023-11-03T01:55:43.407`)
* [CVE-2023-25764](CVE-2023/CVE-2023-257xx/CVE-2023-25764.json) (`2023-11-03T01:57:13.527`)
* [CVE-2023-25762](CVE-2023/CVE-2023-257xx/CVE-2023-25762.json) (`2023-11-03T01:58:18.033`)
* [CVE-2023-25761](CVE-2023/CVE-2023-257xx/CVE-2023-25761.json) (`2023-11-03T01:59:17.893`)
* [CVE-2023-25763](CVE-2023/CVE-2023-257xx/CVE-2023-25763.json) (`2023-11-03T01:59:48.757`)
* [CVE-2023-25765](CVE-2023/CVE-2023-257xx/CVE-2023-25765.json) (`2023-11-03T02:00:58.373`)
* [CVE-2023-25767](CVE-2023/CVE-2023-257xx/CVE-2023-25767.json) (`2023-11-03T02:02:37.800`)
* [CVE-2023-25768](CVE-2023/CVE-2023-257xx/CVE-2023-25768.json) (`2023-11-03T02:04:03.650`)
* [CVE-2023-25766](CVE-2023/CVE-2023-257xx/CVE-2023-25766.json) (`2023-11-03T02:06:20.837`)
* [CVE-2023-40592](CVE-2023/CVE-2023-405xx/CVE-2023-40592.json) (`2023-11-03T02:12:20.743`)
* [CVE-2023-40593](CVE-2023/CVE-2023-405xx/CVE-2023-40593.json) (`2023-11-03T02:13:51.010`)
* [CVE-2023-40594](CVE-2023/CVE-2023-405xx/CVE-2023-40594.json) (`2023-11-03T02:16:11.283`)
* [CVE-2023-40595](CVE-2023/CVE-2023-405xx/CVE-2023-40595.json) (`2023-11-03T02:21:10.870`)
* [CVE-2023-40597](CVE-2023/CVE-2023-405xx/CVE-2023-40597.json) (`2023-11-03T02:22:28.370`)
* [CVE-2023-40598](CVE-2023/CVE-2023-405xx/CVE-2023-40598.json) (`2023-11-03T02:23:14.207`)
* [CVE-2022-34300](CVE-2022/CVE-2022-343xx/CVE-2022-34300.json) (`2023-11-03T03:15:07.587`)
* [CVE-2023-45803](CVE-2023/CVE-2023-458xx/CVE-2023-45803.json) (`2023-11-03T03:15:07.807`)
* [CVE-2023-5472](CVE-2023/CVE-2023-54xx/CVE-2023-5472.json) (`2023-11-03T03:15:07.963`)
## Download and Usage