diff --git a/CVE-2020/CVE-2020-284xx/CVE-2020-28407.json b/CVE-2020/CVE-2020-284xx/CVE-2020-28407.json new file mode 100644 index 00000000000..cc05ed47722 --- /dev/null +++ b/CVE-2020/CVE-2020-284xx/CVE-2020-28407.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2020-28407", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-03T04:15:15.447", + "lastModified": "2023-11-03T04:15:15.447", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In swtpm before 0.4.2 and 0.5.x before 0.5.1, a local attacker may be able to overwrite arbitrary files via a symlink attack against a temporary file such as TMP2-00.permall." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1198395", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/stefanberger/swtpm/releases/tag/v0.4.2", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/stefanberger/swtpm/releases/tag/v0.5.1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-343xx/CVE-2022-34300.json b/CVE-2022/CVE-2022-343xx/CVE-2022-34300.json index 8c6639f9295..453c028d49b 100644 --- a/CVE-2022/CVE-2022-343xx/CVE-2022-34300.json +++ b/CVE-2022/CVE-2022-343xx/CVE-2022-34300.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34300", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-23T17:15:18.460", - "lastModified": "2023-09-07T03:15:07.537", + "lastModified": "2023-11-03T03:15:07.587", "vulnStatus": "Modified", "descriptions": [ { @@ -102,6 +102,14 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I4YMGAN6AV4H4HPDINUHBKX7XE4T5THF/", + "source": "cve@mitre.org" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFCXR2EJGIE24DV45AWX6JJM7RQAT5CY/", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQCZL36LTOHWCQ25R5WTRSD5QMM436Q6/", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31102.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31102.json new file mode 100644 index 00000000000..aa57a210196 --- /dev/null +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31102.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-31102", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-03T04:15:20.793", + "lastModified": "2023-11-03T04:15:20.793", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "7-Zip through 22.01 on Linux allows an integer underflow and code execution via a crafted 7Z archive." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/713c8a8269/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.7-zip.org/download.html", + "source": "cve@mitre.org" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1165/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34259.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34259.json new file mode 100644 index 00000000000..e609f89bca4 --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34259.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-34259", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-03T04:15:20.853", + "lastModified": "2023-11-03T04:15:20.853", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow /wlmdeu%2f%2e%2e%2f%2e%2e directory traversal to read arbitrary files on the filesystem, even files that require root privileges. NOTE: this issue exists because of an incomplete fix for CVE-2020-23575." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://sec-consult.com/vulnerability-lab/", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2023/Jul/15", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34260.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34260.json new file mode 100644 index 00000000000..db7c5765733 --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34260.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-34260", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-03T04:15:20.907", + "lastModified": "2023-11-03T04:15:20.907", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow a denial of service (service outage) via /wlmdeu%2f%2e%2e%2f%2e%2e followed by a directory reference such as %2fetc%00index.htm to try to read the /etc directory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://sec-consult.com/vulnerability-lab/", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2023/Jul/15", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34261.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34261.json new file mode 100644 index 00000000000..552c3e7bda9 --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34261.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-34261", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-03T04:15:20.963", + "lastModified": "2023-11-03T04:15:20.963", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow identification of valid user accounts via username enumeration because they lead to a \"nicht einloggen\" error rather than a falsch error." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://sec-consult.com/vulnerability-lab/", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2023/Jul/15", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35896.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35896.json new file mode 100644 index 00000000000..83d113cc4dc --- /dev/null +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35896.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35896", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-11-03T03:15:07.720", + "lastModified": "2023-11-03T03:15:07.720", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Content Navigator 3.0.13 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 259247." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/259247", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7065203", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36620.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36620.json new file mode 100644 index 00000000000..bee85c7a7df --- /dev/null +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36620.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-36620", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-03T04:15:21.023", + "lastModified": "2023-11-03T04:15:21.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the Boomerang Parental Control application before 13.83 for Android. The app is missing the android:allowBackup=\"false\" attribute in the manifest. This allows the user to backup the internal memory of the app to a PC. This gives the user access to the API token that is used to authenticate requests to the API." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2023/Jul/12", + "source": "cve@mitre.org" + }, + { + "url": "https://useboomerang.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36621.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36621.json new file mode 100644 index 00000000000..0bc03d9e084 --- /dev/null +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36621.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-36621", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-03T04:15:21.083", + "lastModified": "2023-11-03T04:15:21.083", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the Boomerang Parental Control application through 13.83 for Android. The child can use Safe Mode to remove all restrictions temporarily or uninstall the application without the parents noticing." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2023/Jul/12", + "source": "cve@mitre.org" + }, + { + "url": "https://useboomerang.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45803.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45803.json index ce50c2e8714..3b2c029f1b8 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45803.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45803.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45803", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-17T20:15:10.070", - "lastModified": "2023-10-25T17:21:39.427", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-03T03:15:07.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -60,22 +60,22 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security-advisories@github.com", "type": "Primary", "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-200" } ] }, { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-200" + "value": "NVD-CWE-noinfo" } ] } @@ -135,6 +135,10 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/", + "source": "security-advisories@github.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/", "source": "security-advisories@github.com", diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46954.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46954.json new file mode 100644 index 00000000000..bdafb5aeee2 --- /dev/null +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46954.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-46954", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-03T03:15:07.920", + "lastModified": "2023-11-03T03:15:07.920", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in Relativity ODA LLC RelativityOne v.12.1.537.3 Patch 2 and earlier allows a remote attacker to execute arbitrary code via the name parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jakedmurphy1/CVE-2023-46954", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5472.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5472.json index 3f8e7eae297..2e70cfe2c4c 100644 --- a/CVE-2023/CVE-2023-54xx/CVE-2023-5472.json +++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5472.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5472", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-10-25T18:17:43.667", - "lastModified": "2023-11-01T19:04:53.977", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-03T03:15:07.963", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -119,6 +119,10 @@ "Permissions Required" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5TWIUD4VIISLZWEQ4WLWFZT34T3KOXZB/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDMQG42VVOZ5USSI4NSNT3VJPGBPNSIW/", "source": "chrome-cve-admin@google.com", diff --git a/README.md b/README.md index 116217cad56..f706d819909 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-03T03:00:19.927592+00:00 +2023-11-03T05:00:19.731004+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-03T02:55:08.753000+00:00 +2023-11-03T04:15:21.083000+00:00 ``` ### Last Data Feed Release @@ -29,49 +29,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -229680 +229689 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `9` -* [CVE-2017-7252](CVE-2017/CVE-2017-72xx/CVE-2017-7252.json) (`2023-11-03T01:15:07.777`) -* [CVE-2023-36022](CVE-2023/CVE-2023-360xx/CVE-2023-36022.json) (`2023-11-03T01:15:07.907`) -* [CVE-2023-36029](CVE-2023/CVE-2023-360xx/CVE-2023-36029.json) (`2023-11-03T01:15:07.980`) -* [CVE-2023-36034](CVE-2023/CVE-2023-360xx/CVE-2023-36034.json) (`2023-11-03T01:15:08.047`) -* [CVE-2023-46176](CVE-2023/CVE-2023-461xx/CVE-2023-46176.json) (`2023-11-03T01:15:08.117`) +* [CVE-2020-28407](CVE-2020/CVE-2020-284xx/CVE-2020-28407.json) (`2023-11-03T04:15:15.447`) +* [CVE-2023-35896](CVE-2023/CVE-2023-358xx/CVE-2023-35896.json) (`2023-11-03T03:15:07.720`) +* [CVE-2023-46954](CVE-2023/CVE-2023-469xx/CVE-2023-46954.json) (`2023-11-03T03:15:07.920`) +* [CVE-2023-31102](CVE-2023/CVE-2023-311xx/CVE-2023-31102.json) (`2023-11-03T04:15:20.793`) +* [CVE-2023-34259](CVE-2023/CVE-2023-342xx/CVE-2023-34259.json) (`2023-11-03T04:15:20.853`) +* [CVE-2023-34260](CVE-2023/CVE-2023-342xx/CVE-2023-34260.json) (`2023-11-03T04:15:20.907`) +* [CVE-2023-34261](CVE-2023/CVE-2023-342xx/CVE-2023-34261.json) (`2023-11-03T04:15:20.963`) +* [CVE-2023-36620](CVE-2023/CVE-2023-366xx/CVE-2023-36620.json) (`2023-11-03T04:15:21.023`) +* [CVE-2023-36621](CVE-2023/CVE-2023-366xx/CVE-2023-36621.json) (`2023-11-03T04:15:21.083`) ### CVEs modified in the last Commit -Recently modified CVEs: `63` +Recently modified CVEs: `3` -* [CVE-2022-34185](CVE-2022/CVE-2022-341xx/CVE-2022-34185.json) (`2023-11-03T02:53:49.573`) -* [CVE-2022-25318](CVE-2022/CVE-2022-253xx/CVE-2022-25318.json) (`2023-11-03T02:54:55.067`) -* [CVE-2022-29529](CVE-2022/CVE-2022-295xx/CVE-2022-29529.json) (`2023-11-03T02:55:08.753`) -* [CVE-2023-24432](CVE-2023/CVE-2023-244xx/CVE-2023-24432.json) (`2023-11-03T01:43:10.883`) -* [CVE-2023-24430](CVE-2023/CVE-2023-244xx/CVE-2023-24430.json) (`2023-11-03T01:45:22.703`) -* [CVE-2023-24429](CVE-2023/CVE-2023-244xx/CVE-2023-24429.json) (`2023-11-03T01:49:40.803`) -* [CVE-2023-24431](CVE-2023/CVE-2023-244xx/CVE-2023-24431.json) (`2023-11-03T01:50:55.897`) -* [CVE-2023-24433](CVE-2023/CVE-2023-244xx/CVE-2023-24433.json) (`2023-11-03T01:51:35.530`) -* [CVE-2023-24434](CVE-2023/CVE-2023-244xx/CVE-2023-24434.json) (`2023-11-03T01:52:57.313`) -* [CVE-2023-24435](CVE-2023/CVE-2023-244xx/CVE-2023-24435.json) (`2023-11-03T01:53:24.537`) -* [CVE-2023-24436](CVE-2023/CVE-2023-244xx/CVE-2023-24436.json) (`2023-11-03T01:55:43.407`) -* [CVE-2023-25764](CVE-2023/CVE-2023-257xx/CVE-2023-25764.json) (`2023-11-03T01:57:13.527`) -* [CVE-2023-25762](CVE-2023/CVE-2023-257xx/CVE-2023-25762.json) (`2023-11-03T01:58:18.033`) -* [CVE-2023-25761](CVE-2023/CVE-2023-257xx/CVE-2023-25761.json) (`2023-11-03T01:59:17.893`) -* [CVE-2023-25763](CVE-2023/CVE-2023-257xx/CVE-2023-25763.json) (`2023-11-03T01:59:48.757`) -* [CVE-2023-25765](CVE-2023/CVE-2023-257xx/CVE-2023-25765.json) (`2023-11-03T02:00:58.373`) -* [CVE-2023-25767](CVE-2023/CVE-2023-257xx/CVE-2023-25767.json) (`2023-11-03T02:02:37.800`) -* [CVE-2023-25768](CVE-2023/CVE-2023-257xx/CVE-2023-25768.json) (`2023-11-03T02:04:03.650`) -* [CVE-2023-25766](CVE-2023/CVE-2023-257xx/CVE-2023-25766.json) (`2023-11-03T02:06:20.837`) -* [CVE-2023-40592](CVE-2023/CVE-2023-405xx/CVE-2023-40592.json) (`2023-11-03T02:12:20.743`) -* [CVE-2023-40593](CVE-2023/CVE-2023-405xx/CVE-2023-40593.json) (`2023-11-03T02:13:51.010`) -* [CVE-2023-40594](CVE-2023/CVE-2023-405xx/CVE-2023-40594.json) (`2023-11-03T02:16:11.283`) -* [CVE-2023-40595](CVE-2023/CVE-2023-405xx/CVE-2023-40595.json) (`2023-11-03T02:21:10.870`) -* [CVE-2023-40597](CVE-2023/CVE-2023-405xx/CVE-2023-40597.json) (`2023-11-03T02:22:28.370`) -* [CVE-2023-40598](CVE-2023/CVE-2023-405xx/CVE-2023-40598.json) (`2023-11-03T02:23:14.207`) +* [CVE-2022-34300](CVE-2022/CVE-2022-343xx/CVE-2022-34300.json) (`2023-11-03T03:15:07.587`) +* [CVE-2023-45803](CVE-2023/CVE-2023-458xx/CVE-2023-45803.json) (`2023-11-03T03:15:07.807`) +* [CVE-2023-5472](CVE-2023/CVE-2023-54xx/CVE-2023-5472.json) (`2023-11-03T03:15:07.963`) ## Download and Usage