From 3adc49558d172248f901f9251de884c7f6d7f1df Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 27 May 2023 04:00:27 +0000 Subject: [PATCH] Auto-Update: 2023-05-27T04:00:24.407727+00:00 --- CVE-2022/CVE-2022-363xx/CVE-2022-36328.json | 205 +++++++++++++++++++- CVE-2022/CVE-2022-423xx/CVE-2022-42336.json | 8 +- CVE-2023/CVE-2023-243xx/CVE-2023-24329.json | 6 +- CVE-2023/CVE-2023-25xx/CVE-2023-2587.json | 48 ++++- CVE-2023/CVE-2023-298xx/CVE-2023-29838.json | 68 ++++++- CVE-2023/CVE-2023-310xx/CVE-2023-31062.json | 54 +++++- CVE-2023/CVE-2023-310xx/CVE-2023-31064.json | 54 +++++- CVE-2023/CVE-2023-310xx/CVE-2023-31065.json | 54 +++++- CVE-2023/CVE-2023-310xx/CVE-2023-31066.json | 54 +++++- CVE-2023/CVE-2023-311xx/CVE-2023-31101.json | 57 +++++- CVE-2023/CVE-2023-311xx/CVE-2023-31103.json | 54 +++++- CVE-2023/CVE-2023-316xx/CVE-2023-31689.json | 64 +++++- CVE-2023/CVE-2023-317xx/CVE-2023-31708.json | 64 +++++- CVE-2023/CVE-2023-326xx/CVE-2023-32681.json | 6 +- CVE-2023/CVE-2023-337xx/CVE-2023-33785.json | 64 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33786.json | 64 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33787.json | 64 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33788.json | 64 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33789.json | 64 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33790.json | 64 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33791.json | 64 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33792.json | 64 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33793.json | 64 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33794.json | 64 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33795.json | 64 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33796.json | 64 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33797.json | 64 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33798.json | 64 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33799.json | 64 +++++- CVE-2023/CVE-2023-338xx/CVE-2023-33800.json | 64 +++++- README.md | 46 +++-- 31 files changed, 1737 insertions(+), 129 deletions(-) diff --git a/CVE-2022/CVE-2022-363xx/CVE-2022-36328.json b/CVE-2022/CVE-2022-363xx/CVE-2022-36328.json index 3858d6ad7bb..c1db3b32568 100644 --- a/CVE-2022/CVE-2022-363xx/CVE-2022-36328.json +++ b/CVE-2022/CVE-2022-363xx/CVE-2022-36328.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36328", "sourceIdentifier": "psirt@wdc.com", "published": "2023-05-18T18:15:09.947", - "lastModified": "2023-05-18T20:16:21.423", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:37:37.467", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "psirt@wdc.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "psirt@wdc.com", "type": "Secondary", @@ -46,14 +76,181 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:westerndigital:my_cloud_os_5:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.26.202", + "matchCriteriaId": "056AA1A3-F012-40A9-A351-628C905B3FEA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:my_cloud:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A9EE86B-05EE-4F2E-A912-624DDCF9C41B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:my_cloud_dl2100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E783EBC-7608-4527-B1AD-9B4E7A7A108C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:my_cloud_dl4100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3034F4A-239C-4E38-9BD6-217361A7C519" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A581EBA-A1F2-4ABC-8183-29973A46FA43" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:my_cloud_ex2100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABBBDC1E-2320-4767-B669-1BB2FFB1E1C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B78030F0-6655-4604-9D16-2FA1F3FD52FF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:my_cloud_mirror_g2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DE090BC-C847-4DF7-9C5F-52A300845558" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF58260B-2131-402C-A9DA-67B188136DE1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB0C2FD9-4792-4DA2-9698-E53109A499EC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:wd_cloud:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FDE0337-4329-4CE3-9B0B-61BE8361E910" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:westerndigital:my_cloud_home_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.4.0-191", + "matchCriteriaId": "D471C39A-0854-4755-9DF8-5BAABAB09619" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:my_cloud_home:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BE2FBAB-5BA0-4F09-A76E-4A6869668810" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:westerndigital:sandisk_ibi_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.4.0-191", + "matchCriteriaId": "13A2FB91-CCCF-42B1-BCE1-F4962D353593" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:sandisk_ibi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "296ADA43-16BA-4444-B472-DB945FB917B2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:westerndigital:my_cloud_home_duo_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.4.0-191", + "matchCriteriaId": "0A0368E6-53C8-4BD2-B0E8-44464B245832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:my_cloud_home_duo:-:*:*:*:*:*:*:*", + "matchCriteriaId": "124BBC79-65A2-465C-B784-D21E57E96F63" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.westerndigital.com/support/product-security/wdc-23003-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-9-4-0-191", - "source": "psirt@wdc.com" + "source": "psirt@wdc.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://www.westerndigital.com/support/product-security/wdc-23006-my-cloud-firmware-version-5-26-202", - "source": "psirt@wdc.com" + "source": "psirt@wdc.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-423xx/CVE-2022-42336.json b/CVE-2022/CVE-2022-423xx/CVE-2022-42336.json index a779ef87977..5b5662571cf 100644 --- a/CVE-2022/CVE-2022-423xx/CVE-2022-42336.json +++ b/CVE-2022/CVE-2022-423xx/CVE-2022-42336.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42336", "sourceIdentifier": "security@xen.org", "published": "2023-05-17T01:15:09.480", - "lastModified": "2023-05-26T13:08:00.573", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T03:15:34.047", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,10 @@ } ], "references": [ + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTO3U3WYLAZW3KLPKJZ332FYUREXPZMQ/", + "source": "security@xen.org" + }, { "url": "https://xenbits.xenproject.org/xsa/advisory-431.txt", "source": "security@xen.org", diff --git a/CVE-2023/CVE-2023-243xx/CVE-2023-24329.json b/CVE-2023/CVE-2023-243xx/CVE-2023-24329.json index 33c135fa33e..9511a3cf70c 100644 --- a/CVE-2023/CVE-2023-243xx/CVE-2023-24329.json +++ b/CVE-2023/CVE-2023-243xx/CVE-2023-24329.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24329", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T15:15:12.243", - "lastModified": "2023-05-26T05:15:14.180", + "lastModified": "2023-05-27T03:15:34.627", "vulnStatus": "Modified", "descriptions": [ { @@ -84,6 +84,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/", "source": "cve@mitre.org" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/", + "source": "cve@mitre.org" + }, { "url": "https://pointernull.com/security/python-url-parse-problem.html", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2587.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2587.json index ceb0e1fc2f2..c7296d4febe 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2587.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2587.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2587", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T16:15:09.677", - "lastModified": "2023-05-22T16:15:51.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:31:37.057", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,10 +66,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:teltonika:remote_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.10.0", + "matchCriteriaId": "FBC0B044-049C-4538-A1C6-56B61073AADE" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29838.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29838.json index 1d58a222607..040ff32fe31 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29838.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29838.json @@ -2,23 +2,81 @@ "id": "CVE-2023-29838", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T20:15:10.493", - "lastModified": "2023-05-23T13:04:43.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T02:07:12.673", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Insecure Permission vulnerability found in Botkind/Siber Systems SyncApp v.19.0.3.0 allows a local attacker toe escalate privileges via the SyncService.exe file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:allwaysync:allwaysync:19.0.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "74F85F55-1D0B-4890-A767-8CD0801A431C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/IthacaLabs/Botkind/blob/main/Botkind_SyncApp/WeakServicePermissions_InsecureServiceExecutable_CVE-2023-29838.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/IthacaLabs/Botkind/tree/main/Botkind_SyncApp", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31062.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31062.json index 105c3ea4f7f..bb0f5e33333 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31062.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31062.json @@ -2,15 +2,38 @@ "id": "CVE-2023-31062", "sourceIdentifier": "security@apache.org", "published": "2023-05-22T16:15:09.900", - "lastModified": "2023-05-22T16:15:51.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T02:33:35.133", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Privilege Management Vulnerabilities in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0.\u00a0 When\u00a0the attacker has access to a valid (but unprivileged) account, the exploit can be executed using Burp Suite by sending a login\nrequest and following it with a subsequent HTTP request\nusing the returned cookie.\n\nUsers are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 to solve it.\n\n\n\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -23,10 +46,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.2.0", + "versionEndIncluding": "1.6.0", + "matchCriteriaId": "F5885ADE-6494-4EB2-BCCA-27499935E80C" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/btorjbo9o71h22tcvxzy076022hjdzq0", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31064.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31064.json index cfab6afa0d2..71985889d60 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31064.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31064.json @@ -2,15 +2,38 @@ "id": "CVE-2023-31064", "sourceIdentifier": "security@apache.org", "published": "2023-05-22T16:15:09.963", - "lastModified": "2023-05-22T16:15:51.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T02:44:54.597", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Files or Directories Accessible to External Parties vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0. the user in InLong could cancel an\u00a0application that doesn't belongs to it.\u00a0Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7799 https://github.com/apache/inlong/pull/7799 to solve it.\n\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -23,10 +46,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.2.0", + "versionEndIncluding": "1.6.0", + "matchCriteriaId": "F5885ADE-6494-4EB2-BCCA-27499935E80C" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/1osd2k3t3qol2wdsswqtr9gxdkf78n00", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31065.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31065.json index e92fb03b18e..9f7b72fdfb7 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31065.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31065.json @@ -2,15 +2,38 @@ "id": "CVE-2023-31065", "sourceIdentifier": "security@apache.org", "published": "2023-05-22T16:15:10.027", - "lastModified": "2023-05-22T16:15:51.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:21:33.713", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Insufficient Session Expiration vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0.\u00a0\n\n\nAn old session can be used by an attacker even after the user has been deleted or the password has been changed.\n\n\nUsers are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 , https://github.com/apache/inlong/pull/7884 https://github.com/apache/inlong/pull/7884 to solve it.\n\n\n\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -23,10 +46,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.4.0", + "versionEndIncluding": "1.6.0", + "matchCriteriaId": "4A7AAC7B-2146-46D9-8FD9-DA2B5903BB6E" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/to7o0n2cks0omtwo6mhh5cs2vfdbplqf", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31066.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31066.json index 6d49b203753..47222222368 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31066.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31066.json @@ -2,15 +2,38 @@ "id": "CVE-2023-31066", "sourceIdentifier": "security@apache.org", "published": "2023-05-22T16:15:10.090", - "lastModified": "2023-05-22T16:15:51.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:24:41.447", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Files or Directories Accessible to External Parties vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0. Different users in InLong could\u00a0delete, edit, stop, and start others' sources!\u00a0Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7775 https://github.com/apache/inlong/pull/7775 to solve it.\n\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -23,10 +46,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.4.0", + "versionEndIncluding": "1.6.0", + "matchCriteriaId": "4A7AAC7B-2146-46D9-8FD9-DA2B5903BB6E" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/x7y05wo37sq5l9fnmmsjh2dr9kcjrcxf", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31101.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31101.json index cbcd8ec35ed..295bf8a1b89 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31101.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31101.json @@ -2,15 +2,38 @@ "id": "CVE-2023-31101", "sourceIdentifier": "security@apache.org", "published": "2023-05-22T16:15:10.210", - "lastModified": "2023-05-22T16:15:51.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T02:26:38.467", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Insecure Default Initialization of Resource Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.5.0 through 1.6.0. Users registered in InLong who joined later can see deleted users' data. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 to solve it.\n\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -23,10 +46,36 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:inlong:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "899C3A43-FC72-4DAB-9CD1-61257F56DE73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:inlong:1.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1111D51A-BD74-41AE-9825-6D0D0E31FBC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/shvwwr6toqz5rr39rwh4k03z08sh9jmr", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31103.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31103.json index b548c3c5f6c..f90bd3d0ad0 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31103.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31103.json @@ -2,15 +2,38 @@ "id": "CVE-2023-31103", "sourceIdentifier": "security@apache.org", "published": "2023-05-22T16:15:10.277", - "lastModified": "2023-05-22T16:15:51.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T02:19:27.643", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Exposure of Resource to Wrong Sphere Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0.\u00a0\nAttackers can change the immutable name and type of cluster of InLong.\u00a0Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7891 https://github.com/apache/inlong/pull/7891 to solve it.\n\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -23,10 +46,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.4.0", + "versionEndIncluding": "1.6.0", + "matchCriteriaId": "4A7AAC7B-2146-46D9-8FD9-DA2B5903BB6E" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/bv51zhjookcnfbz8b0xsl9wv78sn0j1p", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31689.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31689.json index 92c025d1787..a17c0f435cf 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31689.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31689.json @@ -2,19 +2,75 @@ "id": "CVE-2023-31689", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T20:15:10.887", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T02:12:59.433", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Wcms 0.3.2, an attacker can send a crafted request from a vulnerable web application backend server /wcms/wex/html.php via the finish parameter and the textAreaCode parameter. It can write arbitrary strings into custom file names and upload any files, and write malicious code to execute scripts to trigger command execution." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wcms:wcms:0.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "95CE7D1E-E919-449E-88D4-F6A0FCADFAF0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vedees/wcms/issues/15", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31708.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31708.json index 8a7348f29aa..a5211d29bcf 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31708.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31708.json @@ -2,19 +2,75 @@ "id": "CVE-2023-31708", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:09.960", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:39:56.307", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) in EyouCMS v1.6.2 allows attackers to execute arbitrary commands via a supplying a crafted HTML file to the Upload software format function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/weng-xianhu/eyoucms/issues/41", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32681.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32681.json index cf895dda7c2..dac9895af6b 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32681.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32681.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32681", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-26T18:15:14.147", - "lastModified": "2023-05-26T18:15:14.147", + "lastModified": "2023-05-27T03:15:34.727", "vulnStatus": "Received", "descriptions": [ { @@ -58,6 +58,10 @@ { "url": "https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q", "source": "security-advisories@github.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33785.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33785.json index bafdb9c5272..85bc8ecabfe 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33785.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33785.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33785", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:10.210", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:40:16.407", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Rack Roles (/dcim/rack-roles/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33786.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33786.json index 7ce5b12f0ec..679257170b1 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33786.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33786.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33786", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:10.263", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:41:10.783", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Circuit Types (/circuits/circuit-types/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33787.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33787.json index 3eb5bf807d8..047a70cf106 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33787.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33787.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33787", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:10.317", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:41:18.673", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Tenant Groups (/tenancy/tenant-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33788.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33788.json index 0797fb2e3e0..097062ae05a 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33788.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33788.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33788", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:10.373", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:42:43.693", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Providers (/circuits/providers/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33789.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33789.json index c745ed74793..cd3a44e173c 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33789.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33789.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33789", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:10.430", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:42:41.827", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Contact Groups (/tenancy/contact-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33790.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33790.json index 3e69ed4a915..f219c40df06 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33790.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33790.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33790", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:10.487", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:42:39.840", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Locations (/dcim/locations/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33791.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33791.json index 0253299539c..39fbdbf3286 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33791.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33791.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33791", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:10.543", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:42:37.457", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Provider Accounts (/circuits/provider-accounts/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33792.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33792.json index 006a96ea4c7..578cc8f1670 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33792.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33792.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33792", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:10.607", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:42:34.913", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Site Groups (/dcim/site-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/10", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33793.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33793.json index 4f5547f8567..1e93127f18d 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33793.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33793.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33793", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:10.663", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:42:32.437", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Power Panels (/dcim/power-panels/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33794.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33794.json index 4c0f5680f8e..ee995139e06 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33794.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33794.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33794", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:10.717", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:42:30.167", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Tenants (/tenancy/tenants/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33795.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33795.json index edef6cc42a5..df0fe5c1403 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33795.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33795.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33795", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:10.773", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:42:13.380", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Contact Roles (/tenancy/contact-roles/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/15", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33796.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33796.json index b92ab8c25a1..ce3b02448cc 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33796.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33796.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33796", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:10.827", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:42:05.720", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability in Netbox v3.5.1 allows unauthenticated attackers to execute queries against the GraphQL database, granting them access to sensitive data stored in the database." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/16", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33797.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33797.json index 8ef7bfe9385..7d66d1c7ba6 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33797.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33797.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33797", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:10.893", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:41:35.667", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Sites (/dcim/sites/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/12", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33798.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33798.json index 133af491378..a2e21eff6dd 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33798.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33798.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33798", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:10.947", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:41:30.023", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Rack (/dcim/rack/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/13", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33799.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33799.json index aefe6e7651c..67814c8e27e 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33799.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33799.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33799", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:11.003", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:41:24.217", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Contacts (/tenancy/contacts/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/14", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33800.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33800.json index 0008df98081..c4ae7ab5e44 100644 --- a/CVE-2023/CVE-2023-338xx/CVE-2023-33800.json +++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33800.json @@ -2,19 +2,75 @@ "id": "CVE-2023-33800", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T20:15:11.060", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-27T03:41:22.007", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in the Create Regions (/dcim/regions/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anhdq201/netbox/issues/11", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index f3cfb396eea..04c6ffbc180 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-27T02:00:30.631682+00:00 +2023-05-27T04:00:24.407727+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-27T01:59:16.440000+00:00 +2023-05-27T03:42:43.693000+00:00 ``` ### Last Data Feed Release @@ -34,27 +34,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `0` -* [CVE-2023-32325](CVE-2023/CVE-2023-323xx/CVE-2023-32325.json) (`2023-05-27T00:15:09.600`) ### CVEs modified in the last Commit -Recently modified CVEs: `12` +Recently modified CVEs: `30` -* [CVE-2022-46680](CVE-2022/CVE-2022-466xx/CVE-2022-46680.json) (`2023-05-27T00:54:48.257`) -* [CVE-2023-28709](CVE-2023/CVE-2023-287xx/CVE-2023-28709.json) (`2023-05-27T00:46:23.903`) -* [CVE-2023-31058](CVE-2023/CVE-2023-310xx/CVE-2023-31058.json) (`2023-05-27T00:48:58.773`) -* [CVE-2023-23759](CVE-2023/CVE-2023-237xx/CVE-2023-23759.json) (`2023-05-27T00:59:33.827`) -* [CVE-2023-2790](CVE-2023/CVE-2023-27xx/CVE-2023-2790.json) (`2023-05-27T01:14:11.647`) -* [CVE-2023-31453](CVE-2023/CVE-2023-314xx/CVE-2023-31453.json) (`2023-05-27T01:20:20.410`) -* [CVE-2023-31454](CVE-2023/CVE-2023-314xx/CVE-2023-31454.json) (`2023-05-27T01:26:39.903`) -* [CVE-2023-27066](CVE-2023/CVE-2023-270xx/CVE-2023-27066.json) (`2023-05-27T01:34:58.670`) -* [CVE-2023-27067](CVE-2023/CVE-2023-270xx/CVE-2023-27067.json) (`2023-05-27T01:43:42.960`) -* [CVE-2023-28467](CVE-2023/CVE-2023-284xx/CVE-2023-28467.json) (`2023-05-27T01:49:32.293`) -* [CVE-2023-23830](CVE-2023/CVE-2023-238xx/CVE-2023-23830.json) (`2023-05-27T01:51:18.730`) -* [CVE-2023-28386](CVE-2023/CVE-2023-283xx/CVE-2023-28386.json) (`2023-05-27T01:59:16.440`) +* [CVE-2023-31101](CVE-2023/CVE-2023-311xx/CVE-2023-31101.json) (`2023-05-27T02:26:38.467`) +* [CVE-2023-31062](CVE-2023/CVE-2023-310xx/CVE-2023-31062.json) (`2023-05-27T02:33:35.133`) +* [CVE-2023-31064](CVE-2023/CVE-2023-310xx/CVE-2023-31064.json) (`2023-05-27T02:44:54.597`) +* [CVE-2023-24329](CVE-2023/CVE-2023-243xx/CVE-2023-24329.json) (`2023-05-27T03:15:34.627`) +* [CVE-2023-32681](CVE-2023/CVE-2023-326xx/CVE-2023-32681.json) (`2023-05-27T03:15:34.727`) +* [CVE-2023-31065](CVE-2023/CVE-2023-310xx/CVE-2023-31065.json) (`2023-05-27T03:21:33.713`) +* [CVE-2023-31066](CVE-2023/CVE-2023-310xx/CVE-2023-31066.json) (`2023-05-27T03:24:41.447`) +* [CVE-2023-2587](CVE-2023/CVE-2023-25xx/CVE-2023-2587.json) (`2023-05-27T03:31:37.057`) +* [CVE-2023-31708](CVE-2023/CVE-2023-317xx/CVE-2023-31708.json) (`2023-05-27T03:39:56.307`) +* [CVE-2023-33785](CVE-2023/CVE-2023-337xx/CVE-2023-33785.json) (`2023-05-27T03:40:16.407`) +* [CVE-2023-33786](CVE-2023/CVE-2023-337xx/CVE-2023-33786.json) (`2023-05-27T03:41:10.783`) +* [CVE-2023-33787](CVE-2023/CVE-2023-337xx/CVE-2023-33787.json) (`2023-05-27T03:41:18.673`) +* [CVE-2023-33800](CVE-2023/CVE-2023-338xx/CVE-2023-33800.json) (`2023-05-27T03:41:22.007`) +* [CVE-2023-33799](CVE-2023/CVE-2023-337xx/CVE-2023-33799.json) (`2023-05-27T03:41:24.217`) +* [CVE-2023-33798](CVE-2023/CVE-2023-337xx/CVE-2023-33798.json) (`2023-05-27T03:41:30.023`) +* [CVE-2023-33797](CVE-2023/CVE-2023-337xx/CVE-2023-33797.json) (`2023-05-27T03:41:35.667`) +* [CVE-2023-33796](CVE-2023/CVE-2023-337xx/CVE-2023-33796.json) (`2023-05-27T03:42:05.720`) +* [CVE-2023-33795](CVE-2023/CVE-2023-337xx/CVE-2023-33795.json) (`2023-05-27T03:42:13.380`) +* [CVE-2023-33794](CVE-2023/CVE-2023-337xx/CVE-2023-33794.json) (`2023-05-27T03:42:30.167`) +* [CVE-2023-33793](CVE-2023/CVE-2023-337xx/CVE-2023-33793.json) (`2023-05-27T03:42:32.437`) +* [CVE-2023-33792](CVE-2023/CVE-2023-337xx/CVE-2023-33792.json) (`2023-05-27T03:42:34.913`) +* [CVE-2023-33791](CVE-2023/CVE-2023-337xx/CVE-2023-33791.json) (`2023-05-27T03:42:37.457`) +* [CVE-2023-33790](CVE-2023/CVE-2023-337xx/CVE-2023-33790.json) (`2023-05-27T03:42:39.840`) +* [CVE-2023-33789](CVE-2023/CVE-2023-337xx/CVE-2023-33789.json) (`2023-05-27T03:42:41.827`) +* [CVE-2023-33788](CVE-2023/CVE-2023-337xx/CVE-2023-33788.json) (`2023-05-27T03:42:43.693`) ## Download and Usage