Auto-Update: 2023-09-15T12:00:24.977451+00:00

This commit is contained in:
cad-safe-bot 2023-09-15 12:00:28 +00:00
parent 8f93eaffa3
commit 337ca16ddd
5 changed files with 133 additions and 80 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-5180",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2016-10-03T15:59:03.270",
"lastModified": "2022-08-16T13:17:03.193",
"lastModified": "2023-09-15T11:42:43.053",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,118 +84,118 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "61649042-ABA9-490C-BCB4-0F3EAEA3DD24"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1290A1CC-6506-4D8A-A4A6-055A38D57547"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A9520259-8666-48B9-A0A3-A8B2E1358574"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5FB2A771-24BE-4FB5-87E9-25C385848AAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "886F1EA8-D38C-4045-AB39-4A65B6B6C149"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CE64E1CB-185E-481B-BC81-C28D216ED470"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FD3E83F8-E2E3-4D2C-B3E5-31BFE1817ED9"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "530ACB4D-6981-4B39-857E-CBB07EB0CA4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6DA56B75-A92A-40DB-9A46-76FA56E498C0"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3B33501E-65BA-45BB-860D-39FA94D010A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "75BB5E4D-4CD2-4AB4-B583-4DB3D2021FD8"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA3F962-8659-444F-BB08-6CBED2661C82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "85F8F1FC-A444-435D-9D94-73D06E669433"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "644E7D14-54E1-4F7E-A640-514A88E03D26"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F98575F2-5A2B-4F88-9882-459BB1BE4526"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4E515118-8774-4C7F-8261-305910EF643F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4E1ACE-25AD-4DAC-9638-B2BE9A9636A4"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C473F9-81E3-4555-8469-63A27DEDEDD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "618C306F-A085-4368-B85A-01F4BC7A3D25"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "19E695E5-93F5-49FD-AB58-D53169E1AB69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AE3F31DD-48D2-4398-A3F1-039141BD5FAC"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1B168912-2129-4833-B448-BC7616355885"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "44C19926-1EC7-4B9A-A365-BF754F717835"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47AD1736-F47B-4A93-9D59-C88BE0D10FA2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3041B8D-C4EC-4AEE-9109-FB27BF7AB878"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AA4D5F27-A8F0-41B4-9832-4F9830F96B26"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0308C3A1-A0BE-460B-8ED0-DFD4B094B50D"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "340C5CF0-AC09-4C17-9F15-6B0BEAC62629"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "585938B8-8527-4B48-B2A1-A4CAD172F938"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "44895917-6186-477B-9B72-AA7B20B3E3E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D2EE1010-04B7-4E63-A30B-98DA2BDB9D32"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FA26B2AA-395B-4D6C-8260-569E54751532"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF9A490-AA80-4CD7-A77C-340885C4D552"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "800D4E24-7E7A-4316-86F1-B8150DAE540C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "96A3279F-715E-44DA-92ED-655D30FC81BB"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3710921E-94D4-4D9E-BD45-86E23ECE8C7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FFC3032A-4D86-4D7F-9364-B0D768AA2E7A"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8883FA5A-CC60-4275-9C3B-31A7FBD2A073"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "69E739DA-F636-4AE3-BEBE-CC6EDC2E2918"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7BDB0FC-AA36-4C41-B3DC-201F0DE0191A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE42F91E-DF29-4B6F-B9FD-078A2FA13E89"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B38F8E2-7710-4303-A80F-9009619BEC7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F5618550-F2B3-46F7-9A09-DC1BEB44A4D9"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA1637EF-3393-4770-91AE-89EA53D57830"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B99ECD78-C494-4B46-B03E-8EF22D4C7559"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93FA2559-0DB1-49BE-A6E6-C73408F4AB57"
},
{
"vulnerable": true,
@ -298,6 +298,15 @@
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/93243",
"source": "cve-coordination@google.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/USN-3143-1",
"source": "cve-coordination@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-1000381",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-07-07T17:29:00.307",
"lastModified": "2022-08-16T13:01:59.460",
"lastModified": "2023-09-15T11:42:43.053",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,23 +84,28 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "69E739DA-F636-4AE3-BEBE-CC6EDC2E2918"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7BDB0FC-AA36-4C41-B3DC-201F0DE0191A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE42F91E-DF29-4B6F-B9FD-078A2FA13E89"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B38F8E2-7710-4303-A80F-9009619BEC7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F5618550-F2B3-46F7-9A09-DC1BEB44A4D9"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA1637EF-3393-4770-91AE-89EA53D57830"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B99ECD78-C494-4B46-B03E-8EF22D4C7559"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93FA2559-0DB1-49BE-A6E6-C73408F4AB57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares:c-ares:1.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B92EADF5-3500-4F37-808E-41DC48DE8D68"
},
{
"vulnerable": true,
@ -111,11 +116,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.11.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "476034B6-69BF-4130-8139-D5DDC1EB0028"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "754802ED-54D6-44D5-AB44-C37EBE4B74E2"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14354",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-05-13T14:15:17.503",
"lastModified": "2022-04-26T16:05:04.770",
"lastModified": "2023-09-15T11:42:43.053",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -102,8 +102,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "097AC553-C44C-4A6F-AAEA-3C778958A3CF"
"criteria": "cpe:2.3:a:c-ares:c-ares:1.16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "59640538-D3DC-457C-B042-5D2B8F445A46"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2023-4959",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-15T10:15:07.697",
"lastModified": "2023-09-15T10:15:07.697",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Quay. Cross-site request forgery (CSRF) attacks force a user to perform unwanted actions in an application. During the pentest, it was detected that the config-editor page is vulnerable to CSRF. The config-editor page is used to configure the Quay instance. By coercing the victim\u2019s browser into sending an attacker-controlled request from another domain, it is possible to reconfigure the Quay instance (including adding users with admin privileges)."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en Quay. Los ataques de Cross-site request forgery (CSRF) obligan al usuario a realizar acciones no deseadas en una aplicaci\u00f3n. Durante la prueba de penetraci\u00f3n, se detect\u00f3 que la p\u00e1gina del editor de configuraci\u00f3n es vulnerable a CSRF. La p\u00e1gina del editor de configuraci\u00f3n se utiliza para configurar la instancia de Quay. Al forzar al navegador de la v\u00edctima a enviar una solicitud controlada por el atacante desde otro dominio, es posible reconfigurar la instancia de Quay (incluido agregar usuarios con privilegios de administrador)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4959",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238908",
"source": "secalert@redhat.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-15T10:00:25.192627+00:00
2023-09-15T12:00:24.977451+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-15T09:15:08.607000+00:00
2023-09-15T11:42:43.053000+00:00
```
### Last Data Feed Release
@ -29,30 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
225663
225664
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `1`
* [CVE-2023-4231](CVE-2023/CVE-2023-42xx/CVE-2023-4231.json) (`2023-09-15T08:15:07.867`)
* [CVE-2023-4670](CVE-2023/CVE-2023-46xx/CVE-2023-4670.json) (`2023-09-15T08:15:08.063`)
* [CVE-2023-4831](CVE-2023/CVE-2023-48xx/CVE-2023-4831.json) (`2023-09-15T08:15:08.147`)
* [CVE-2023-4661](CVE-2023/CVE-2023-46xx/CVE-2023-4661.json) (`2023-09-15T09:15:07.907`)
* [CVE-2023-4662](CVE-2023/CVE-2023-46xx/CVE-2023-4662.json) (`2023-09-15T09:15:08.040`)
* [CVE-2023-4663](CVE-2023/CVE-2023-46xx/CVE-2023-4663.json) (`2023-09-15T09:15:08.133`)
* [CVE-2023-4664](CVE-2023/CVE-2023-46xx/CVE-2023-4664.json) (`2023-09-15T09:15:08.230`)
* [CVE-2023-4665](CVE-2023/CVE-2023-46xx/CVE-2023-4665.json) (`2023-09-15T09:15:08.330`)
* [CVE-2023-4833](CVE-2023/CVE-2023-48xx/CVE-2023-4833.json) (`2023-09-15T09:15:08.423`)
* [CVE-2023-4835](CVE-2023/CVE-2023-48xx/CVE-2023-4835.json) (`2023-09-15T09:15:08.607`)
* [CVE-2023-4959](CVE-2023/CVE-2023-49xx/CVE-2023-4959.json) (`2023-09-15T10:15:07.697`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `3`
* [CVE-2020-22217](CVE-2020/CVE-2020-222xx/CVE-2020-22217.json) (`2023-09-15T09:15:07.617`)
* [CVE-2016-5180](CVE-2016/CVE-2016-51xx/CVE-2016-5180.json) (`2023-09-15T11:42:43.053`)
* [CVE-2017-1000381](CVE-2017/CVE-2017-10003xx/CVE-2017-1000381.json) (`2023-09-15T11:42:43.053`)
* [CVE-2020-14354](CVE-2020/CVE-2020-143xx/CVE-2020-14354.json) (`2023-09-15T11:42:43.053`)
## Download and Usage