Auto-Update: 2023-10-09T06:00:26.275386+00:00

This commit is contained in:
cad-safe-bot 2023-10-09 06:00:29 +00:00
parent b6cffc363b
commit 434b88421a
12 changed files with 269 additions and 7 deletions

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-45349",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T04:15:50.070",
"lastModified": "2023-10-09T04:15:50.070",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.34.7, 4000 Assistant V10 R1.42.0, 4000 Assistant V10 R0, 4000 Manager V10 R1 before V10 R1.34.7, 4000 Manager V10 R1.42.0, and 4000 Manager V10 R0 expose sensitive information that may allow lateral movement to the backup system via AShbr. This is also known as OSFOURK-23722."
}
],
"metrics": {},
"references": [
{
"url": "https://networks.unify.com/security/advisories/OBSO-2306-01.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.news.de/technik/856969401/unify-openscape-4000-gefaehrdet-it-sicherheitswarnung-vom-bsi-und-bug-report-bekannte-schwachstellen-und-sicherheitsluecken/1/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-45350",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T04:15:53.527",
"lastModified": "2023-10-09T04:15:53.527",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Atos Unify OpenScape 4000 Manager V10 R1 before V10 R1.42.1 and 4000 Manager V10 R0 allow Privilege escalation that may lead to the ability of an authenticated attacker to run arbitrary code via AScm. This is also known as OSFOURK-24034."
}
],
"metrics": {},
"references": [
{
"url": "https://networks.unify.com/security/advisories/OBSO-2306-01.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.news.de/technik/856969401/unify-openscape-4000-gefaehrdet-it-sicherheitswarnung-vom-bsi-und-bug-report-bekannte-schwachstellen-und-sicherheitsluecken/1/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-45351",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T04:15:53.947",
"lastModified": "2023-10-09T04:15:53.947",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.1, 4000 Assistant V10 R0, 4000 Manager V10 R1 before V10 R1.42.1, and 4000 Manager V10 R0 allow Authenticated Command Injection via AShbr. This is also known as OSFOURK-24039."
}
],
"metrics": {},
"references": [
{
"url": "https://networks.unify.com/security/advisories/OBSO-2306-01.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.news.de/technik/856969401/unify-openscape-4000-gefaehrdet-it-sicherheitswarnung-vom-bsi-und-bug-report-bekannte-schwachstellen-und-sicherheitsluecken/1/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-45352",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T04:15:54.260",
"lastModified": "2023-10-09T04:15:54.260",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Atos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated attacker to execute arbitrary code on the operating system via a Common Management Portal web interface Path traversal vulnerability allowing write access outside the intended folders. This is also known as OCMP-6592."
}
],
"metrics": {},
"references": [
{
"url": "https://networks.unify.com/security/advisories/OBSO-2306-02.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.news.de/technik/857003738/unify-openscape-common-management-platform-gefaehrdet-it-sicherheitswarnung-vom-bsi-und-bug-report-update-zu-bekannten-schwachstellen-und-sicherheitsluecken-vom-03-07-2023/1/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-45353",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T04:15:54.607",
"lastModified": "2023-10-09T04:15:54.607",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Atos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated attacker to execute arbitrary code on the operating system by leveraging the Common Management Portal web interface for Authenticated remote upload and creation of arbitrary files affecting the underlying operating system. This is also known as OCMP-6591."
}
],
"metrics": {},
"references": [
{
"url": "https://networks.unify.com/security/advisories/OBSO-2306-02.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.news.de/technik/857003738/unify-openscape-common-management-platform-gefaehrdet-it-sicherheitswarnung-vom-bsi-und-bug-report-update-zu-bekannten-schwachstellen-und-sicherheitsluecken-vom-03-07-2023/1/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-45354",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T04:15:54.987",
"lastModified": "2023-10-09T04:15:54.987",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Atos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated remote attacker to execute arbitrary code on the operating system by using the Common Management Portal web interface. This is also known as OCMP-6589."
}
],
"metrics": {},
"references": [
{
"url": "https://networks.unify.com/security/advisories/OBSO-2306-02.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.news.de/technik/857003738/unify-openscape-common-management-platform-gefaehrdet-it-sicherheitswarnung-vom-bsi-und-bug-report-update-zu-bekannten-schwachstellen-und-sicherheitsluecken-vom-03-07-2023/1/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-45355",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T04:15:55.350",
"lastModified": "2023-10-09T04:15:55.350",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Atos Unify OpenScape 4000 Platform V10 R1 before Hotfix V10 R1.42.2 and 4000 and Manager Platform V10 R1 before Hotfix V10 R1.42.2 allow command injection by an authenticated attacker into the platform operating system, leading to administrative access via the webservice. This is also known as OSFOURK-24120."
}
],
"metrics": {},
"references": [
{
"url": "https://networks.unify.com/security/advisories/OBSO-2308-02.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.news.de/technik/857079218/unify-openscape-4000-gefaehrdet-it-sicherheitswarnung-vom-bsi-und-bug-report-betroffene-systeme-und-produkte-neue-versionen-und-updates/1/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-45356",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T04:15:55.667",
"lastModified": "2023-10-09T04:15:55.667",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Atos Unify OpenScape 4000 Platform V10 R1 before Hotfix V10 R1.42.2 4000 and Manager Platform V10 R1 before Hotfix V10 R1.42.2 allow command injection by an authenticated attacker into the platform operating system, leading to administrative access, via dtb pages of the platform portal. This is also known as OSFOURK-23719."
}
],
"metrics": {},
"references": [
{
"url": "https://networks.unify.com/security/advisories/OBSO-2308-02.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.news.de/technik/857079218/unify-openscape-4000-gefaehrdet-it-sicherheitswarnung-vom-bsi-und-bug-report-betroffene-systeme-und-produkte-neue-versionen-und-updates/1/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-45363",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T05:15:09.220",
"lastModified": "2023-10-09T05:15:09.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ApiPageSet.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. It allows attackers to cause a denial of service (unbounded loop and RequestTimeoutException) when querying pages redirected to other variants with redirects and converttitles set."
}
],
"metrics": {},
"references": [
{
"url": "https://phabricator.wikimedia.org/T333050",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-45364",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T05:15:09.300",
"lastModified": "2023-10-09T05:15:09.300",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in includes/page/Article.php in MediaWiki 1.36.x through 1.39.x before 1.39.5 and 1.40.x before 1.40.1. Deleted revision existence is leaked due to incorrect permissions being checked. This reveals that a given revision ID belonged to the given page title, and its timestamp, both of which are not supposed to be public information."
}
],
"metrics": {},
"references": [
{
"url": "https://phabricator.wikimedia.org/T264765",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-45367",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T05:15:09.357",
"lastModified": "2023-10-09T05:15:09.357",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the CheckUser extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. A user can use a rest.php/checkuser/v0/useragent-clienthints/revision/ URL to store an arbitrary number of rows in cu_useragent_clienthints, leading to a denial of service."
}
],
"metrics": {},
"references": [
{
"url": "https://phabricator.wikimedia.org/T344923",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-10-08T20:00:24.653351+00:00
2023-10-09T06:00:26.275386+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-10-08T19:15:54.367000+00:00
2023-10-09T05:15:09.357000+00:00
```
### Last Data Feed Release
@ -23,26 +23,36 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2023-10-08T00:00:13.568515+00:00
2023-10-09T00:00:13.552919+00:00
```
### Total Number of included CVEs
```plain
227181
227192
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `11`
* [CVE-2023-45349](CVE-2023/CVE-2023-453xx/CVE-2023-45349.json) (`2023-10-09T04:15:50.070`)
* [CVE-2023-45350](CVE-2023/CVE-2023-453xx/CVE-2023-45350.json) (`2023-10-09T04:15:53.527`)
* [CVE-2023-45351](CVE-2023/CVE-2023-453xx/CVE-2023-45351.json) (`2023-10-09T04:15:53.947`)
* [CVE-2023-45352](CVE-2023/CVE-2023-453xx/CVE-2023-45352.json) (`2023-10-09T04:15:54.260`)
* [CVE-2023-45353](CVE-2023/CVE-2023-453xx/CVE-2023-45353.json) (`2023-10-09T04:15:54.607`)
* [CVE-2023-45354](CVE-2023/CVE-2023-453xx/CVE-2023-45354.json) (`2023-10-09T04:15:54.987`)
* [CVE-2023-45355](CVE-2023/CVE-2023-453xx/CVE-2023-45355.json) (`2023-10-09T04:15:55.350`)
* [CVE-2023-45356](CVE-2023/CVE-2023-453xx/CVE-2023-45356.json) (`2023-10-09T04:15:55.667`)
* [CVE-2023-45363](CVE-2023/CVE-2023-453xx/CVE-2023-45363.json) (`2023-10-09T05:15:09.220`)
* [CVE-2023-45364](CVE-2023/CVE-2023-453xx/CVE-2023-45364.json) (`2023-10-09T05:15:09.300`)
* [CVE-2023-45367](CVE-2023/CVE-2023-453xx/CVE-2023-45367.json) (`2023-10-09T05:15:09.357`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `0`
* [CVE-2023-44469](CVE-2023/CVE-2023-444xx/CVE-2023-44469.json) (`2023-10-08T19:15:54.367`)
## Download and Usage