Auto-Update: 2023-10-12T12:00:24.453271+00:00

This commit is contained in:
cad-safe-bot 2023-10-12 12:00:28 +00:00
parent 0418fa5690
commit 445a692601
10 changed files with 200 additions and 49 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2013-10015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-03T20:15:09.340",
"lastModified": "2023-02-10T17:33:07.063",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-12T10:15:09.733",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in fanzila WebFinance 0.5 and classified as critical. This vulnerability affects unknown code of the file htdocs/admin/save_Contract_Signer_Role.php. The manipulation of the argument n/v leads to sql injection. The name of the patch is abad81af614a9ceef3f29ab22ca6bae517619e06. It is recommended to apply a patch to fix this issue. VDB-220054 is the identifier assigned to this vulnerability."
"value": "A vulnerability has been found in fanzila WebFinance 0.5 and classified as critical. This vulnerability affects unknown code of the file htdocs/admin/save_Contract_Signer_Role.php. The manipulation of the argument n/v leads to sql injection. The patch is identified as abad81af614a9ceef3f29ab22ca6bae517619e06. It is recommended to apply a patch to fix this issue. VDB-220054 is the identifier assigned to this vulnerability."
}
],
"metrics": {

View File

@ -2,12 +2,12 @@
"id": "CVE-2013-10016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-03T20:15:09.913",
"lastModified": "2023-02-10T17:32:54.357",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-12T10:15:11.720",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in fanzila WebFinance 0.5 and classified as critical. This issue affects some unknown processing of the file htdocs/admin/save_taxes.php. The manipulation of the argument id leads to sql injection. The name of the patch is 306f170ca2a8203ae3d8f51fb219ba9e05b945e1. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-220055."
"value": "A vulnerability was found in fanzila WebFinance 0.5 and classified as critical. This issue affects some unknown processing of the file htdocs/admin/save_taxes.php. The manipulation of the argument id leads to sql injection. The patch is named 306f170ca2a8203ae3d8f51fb219ba9e05b945e1. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-220055."
}
],
"metrics": {

View File

@ -2,12 +2,12 @@
"id": "CVE-2013-10018",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T00:15:08.830",
"lastModified": "2023-02-12T04:50:05.887",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-12T10:15:12.083",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in fanzila WebFinance 0.5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file htdocs/prospection/save_contact.php. The manipulation of the argument nom/prenom/email/tel/mobile/client/fonction/note leads to sql injection. The name of the patch is 165dfcaa0520ee0179b7c1282efb84f5a03df114. It is recommended to apply a patch to fix this issue. The identifier VDB-220057 was assigned to this vulnerability."
"value": "A vulnerability was found in fanzila WebFinance 0.5. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file htdocs/prospection/save_contact.php. The manipulation of the argument nom/prenom/email/tel/mobile/client/fonction/note leads to sql injection. The identifier of the patch is 165dfcaa0520ee0179b7c1282efb84f5a03df114. It is recommended to apply a patch to fix this issue. The identifier VDB-220057 was assigned to this vulnerability."
}
],
"metrics": {

View File

@ -2,12 +2,12 @@
"id": "CVE-2013-10019",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T07:15:22.357",
"lastModified": "2023-02-28T19:55:56.830",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-12T10:15:12.353",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in OCLC-Research OAICat 1.5.61. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The attack may be initiated remotely. Upgrading to version 1.5.62 is able to address this issue. The name of the patch is 6cc65501869fa663bcd24a70b63f41f5cfe6b3e1. It is recommended to upgrade the affected component. The identifier VDB-221489 was assigned to this vulnerability."
"value": "A vulnerability was found in OCLC-Research OAICat 1.5.61. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The attack may be initiated remotely. Upgrading to version 1.5.62 is able to address this issue. The identifier of the patch is 6cc65501869fa663bcd24a70b63f41f5cfe6b3e1. It is recommended to upgrade the affected component. The identifier VDB-221489 was assigned to this vulnerability."
}
],
"metrics": {

View File

@ -2,12 +2,12 @@
"id": "CVE-2013-10020",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-10T01:15:11.693",
"lastModified": "2023-03-15T16:30:22.617",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-12T10:15:12.810",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in MMDeveloper A Forms Plugin up to 1.4.2. This affects an unknown part of the file a-forms.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.4.3 is able to address this issue. The name of the patch is 3e693197bd69b7173cc16d8d2e0a7d501a2a0b06. It is recommended to upgrade the affected component. The identifier VDB-222609 was assigned to this vulnerability."
"value": "A vulnerability, which was classified as problematic, was found in MMDeveloper A Forms Plugin up to 1.4.2 on WordPress. This affects an unknown part of the file a-forms.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.4.3 is able to address this issue. The identifier of the patch is 3e693197bd69b7173cc16d8d2e0a7d501a2a0b06. It is recommended to upgrade the affected component. The identifier VDB-222609 was assigned to this vulnerability."
}
],
"metrics": {

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-43314",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T23:15:12.057",
"lastModified": "2023-10-02T17:31:30.710",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-12T11:15:23.587",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in ZYXEL ZYXEL v.PMG2005-T20B allows a remote attacker to cause a denial of service via a crafted script to the uid parameter in the cgi-bin/login.asp component."
"value": "** UNSUPPPORTED WHEN ASSIGNED ** The buffer overflow vulnerability in the Zyxel PMG2005-T20B firmware version V1.00(ABNK.2)b11_C0\u00a0could allow an authenticated attacker with administrator privileges to cause a denial of service condition via a crafted uid.\n\n"
},
{
"lang": "es",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
@ -48,6 +68,16 @@
"value": "CWE-120"
}
]
},
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-5554",
"sourceIdentifier": "dl_cve@linecorp.com",
"published": "2023-10-12T10:15:13.397",
"lastModified": "2023-10-12T10:15:13.397",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Lack of TLS certificate verification in log transmission of a financial module within LINE prior to 13.16.0."
}
],
"metrics": {},
"references": [
{
"url": "https://hackerone.com/reports/2106827",
"source": "dl_cve@linecorp.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-5555",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-12T11:15:23.740",
"lastModified": "2023-10-12T11:15:23.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - Generic in GitHub repository frappe/lms prior to 5614a6203fb7d438be8e2b1e3030e4528d170ec4."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/frappe/lms/commit/5614a6203fb7d438be8e2b1e3030e4528d170ec4",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/f6d688ee-b049-4f85-ac3e-f4d3e29e7b9f",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-5556",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-12T11:15:23.873",
"lastModified": "2023-10-12T11:15:23.873",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - Reflected in GitHub repository structurizr/onpremises prior to 3194."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/structurizr/onpremises/commit/6cff4f792b010dfb1ff6a0b4ae1c6e398f8f8a18",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/a3ee0f98-6898-41ae-b1bd-242a03a73d1b",
"source": "security@huntr.dev"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-10-12T10:00:24.690742+00:00
2023-10-12T12:00:24.453271+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-10-12T09:15:15.447000+00:00
2023-10-12T11:15:23.873000+00:00
```
### Last Data Feed Release
@ -29,45 +29,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
227643
227646
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `3`
* [CVE-2023-45047](CVE-2023/CVE-2023-450xx/CVE-2023-45047.json) (`2023-10-12T09:15:15.447`)
* [CVE-2023-5554](CVE-2023/CVE-2023-55xx/CVE-2023-5554.json) (`2023-10-12T10:15:13.397`)
* [CVE-2023-5555](CVE-2023/CVE-2023-55xx/CVE-2023-5555.json) (`2023-10-12T11:15:23.740`)
* [CVE-2023-5556](CVE-2023/CVE-2023-55xx/CVE-2023-5556.json) (`2023-10-12T11:15:23.873`)
### CVEs modified in the last Commit
Recently modified CVEs: `35`
Recently modified CVEs: `6`
* [CVE-2010-10007](CVE-2010/CVE-2010-100xx/CVE-2010-10007.json) (`2023-10-12T09:15:12.210`)
* [CVE-2010-10008](CVE-2010/CVE-2010-100xx/CVE-2010-10008.json) (`2023-10-12T09:15:12.327`)
* [CVE-2010-10009](CVE-2010/CVE-2010-100xx/CVE-2010-10009.json) (`2023-10-12T09:15:12.437`)
* [CVE-2010-10010](CVE-2010/CVE-2010-100xx/CVE-2010-10010.json) (`2023-10-12T09:15:12.560`)
* [CVE-2011-10001](CVE-2011/CVE-2011-100xx/CVE-2011-10001.json) (`2023-10-12T09:15:12.687`)
* [CVE-2011-10002](CVE-2011/CVE-2011-100xx/CVE-2011-10002.json) (`2023-10-12T09:15:12.800`)
* [CVE-2011-10003](CVE-2011/CVE-2011-100xx/CVE-2011-10003.json) (`2023-10-12T09:15:12.917`)
* [CVE-2012-10002](CVE-2012/CVE-2012-100xx/CVE-2012-10002.json) (`2023-10-12T09:15:13.027`)
* [CVE-2012-10003](CVE-2012/CVE-2012-100xx/CVE-2012-10003.json) (`2023-10-12T09:15:13.137`)
* [CVE-2012-10004](CVE-2012/CVE-2012-100xx/CVE-2012-10004.json) (`2023-10-12T09:15:13.267`)
* [CVE-2012-10005](CVE-2012/CVE-2012-100xx/CVE-2012-10005.json) (`2023-10-12T09:15:13.393`)
* [CVE-2012-10006](CVE-2012/CVE-2012-100xx/CVE-2012-10006.json) (`2023-10-12T09:15:13.520`)
* [CVE-2012-10007](CVE-2012/CVE-2012-100xx/CVE-2012-10007.json) (`2023-10-12T09:15:13.710`)
* [CVE-2012-10008](CVE-2012/CVE-2012-100xx/CVE-2012-10008.json) (`2023-10-12T09:15:13.820`)
* [CVE-2012-10009](CVE-2012/CVE-2012-100xx/CVE-2012-10009.json) (`2023-10-12T09:15:13.923`)
* [CVE-2012-10010](CVE-2012/CVE-2012-100xx/CVE-2012-10010.json) (`2023-10-12T09:15:14.067`)
* [CVE-2012-10011](CVE-2012/CVE-2012-100xx/CVE-2012-10011.json) (`2023-10-12T09:15:14.180`)
* [CVE-2012-10012](CVE-2012/CVE-2012-100xx/CVE-2012-10012.json) (`2023-10-12T09:15:14.277`)
* [CVE-2012-10013](CVE-2012/CVE-2012-100xx/CVE-2012-10013.json) (`2023-10-12T09:15:14.380`)
* [CVE-2012-10015](CVE-2012/CVE-2012-100xx/CVE-2012-10015.json) (`2023-10-12T09:15:14.527`)
* [CVE-2013-10006](CVE-2013/CVE-2013-100xx/CVE-2013-10006.json) (`2023-10-12T09:15:14.657`)
* [CVE-2013-10007](CVE-2013/CVE-2013-100xx/CVE-2013-10007.json) (`2023-10-12T09:15:14.767`)
* [CVE-2013-10009](CVE-2013/CVE-2013-100xx/CVE-2013-10009.json) (`2023-10-12T09:15:14.893`)
* [CVE-2013-10010](CVE-2013/CVE-2013-100xx/CVE-2013-10010.json) (`2023-10-12T09:15:15.000`)
* [CVE-2013-10014](CVE-2013/CVE-2013-100xx/CVE-2013-10014.json) (`2023-10-12T09:15:15.240`)
* [CVE-2013-10015](CVE-2013/CVE-2013-100xx/CVE-2013-10015.json) (`2023-10-12T10:15:09.733`)
* [CVE-2013-10016](CVE-2013/CVE-2013-100xx/CVE-2013-10016.json) (`2023-10-12T10:15:11.720`)
* [CVE-2013-10018](CVE-2013/CVE-2013-100xx/CVE-2013-10018.json) (`2023-10-12T10:15:12.083`)
* [CVE-2013-10019](CVE-2013/CVE-2013-100xx/CVE-2013-10019.json) (`2023-10-12T10:15:12.353`)
* [CVE-2013-10020](CVE-2013/CVE-2013-100xx/CVE-2013-10020.json) (`2023-10-12T10:15:12.810`)
* [CVE-2023-43314](CVE-2023/CVE-2023-433xx/CVE-2023-43314.json) (`2023-10-12T11:15:23.587`)
## Download and Usage