mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2023-09-04T02:00:25.585270+00:00
This commit is contained in:
parent
578be0f159
commit
478749c122
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37220",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2023-09-03T14:15:41.587",
|
||||
"lastModified": "2023-09-03T14:15:41.587",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37221",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2023-09-03T14:15:42.550",
|
||||
"lastModified": "2023-09-03T14:15:42.550",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37222",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2023-09-03T15:15:12.520",
|
||||
"lastModified": "2023-09-03T15:15:12.520",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3703",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2023-09-03T15:15:14.647",
|
||||
"lastModified": "2023-09-03T15:15:14.647",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38387",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-09-03T12:15:41.077",
|
||||
"lastModified": "2023-09-03T12:15:41.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38476",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-09-03T12:15:42.053",
|
||||
"lastModified": "2023-09-03T12:15:42.053",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38482",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-09-03T12:15:42.140",
|
||||
"lastModified": "2023-09-03T12:15:42.140",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38516",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-09-03T12:15:42.227",
|
||||
"lastModified": "2023-09-03T12:15:42.227",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38517",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-09-03T12:15:42.317",
|
||||
"lastModified": "2023-09-03T12:15:42.317",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38518",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-09-03T12:15:42.403",
|
||||
"lastModified": "2023-09-03T12:15:42.403",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38521",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-09-03T12:15:42.483",
|
||||
"lastModified": "2023-09-03T12:15:42.483",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39369",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2023-09-03T15:15:13.537",
|
||||
"lastModified": "2023-09-03T15:15:13.537",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39370",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2023-09-03T15:15:13.857",
|
||||
"lastModified": "2023-09-03T15:15:13.857",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39371",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2023-09-03T15:15:13.990",
|
||||
"lastModified": "2023-09-03T15:15:13.990",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39372",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2023-09-03T15:15:14.127",
|
||||
"lastModified": "2023-09-03T15:15:14.127",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39373",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2023-09-03T15:15:14.283",
|
||||
"lastModified": "2023-09-03T15:15:14.283",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39374",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2023-09-03T15:15:14.453",
|
||||
"lastModified": "2023-09-03T15:15:14.453",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39979",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-09-02T13:15:44.733",
|
||||
"lastModified": "2023-09-02T13:15:44.733",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39980",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-09-02T13:15:45.173",
|
||||
"lastModified": "2023-09-02T13:15:45.173",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39981",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-09-02T13:15:45.257",
|
||||
"lastModified": "2023-09-02T13:15:45.257",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39982",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-09-02T13:15:45.347",
|
||||
"lastModified": "2023-09-02T13:15:45.347",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39983",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-09-02T13:15:45.427",
|
||||
"lastModified": "2023-09-02T13:15:45.427",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41180",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-09-03T16:15:10.823",
|
||||
"lastModified": "2023-09-03T16:15:10.823",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4718",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-09-02T04:15:09.933",
|
||||
"lastModified": "2023-09-02T04:15:09.933",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4734",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-09-02T18:15:17.127",
|
||||
"lastModified": "2023-09-02T18:15:17.127",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4735",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-09-02T18:15:20.637",
|
||||
"lastModified": "2023-09-02T18:15:20.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4736",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-09-02T19:15:44.863",
|
||||
"lastModified": "2023-09-02T19:15:44.863",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4738",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-09-02T20:15:07.413",
|
||||
"lastModified": "2023-09-02T20:15:07.413",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4739",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-03T20:15:13.890",
|
||||
"lastModified": "2023-09-03T20:15:13.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4740",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-03T20:15:14.813",
|
||||
"lastModified": "2023-09-03T20:15:14.813",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4741",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-03T23:15:39.057",
|
||||
"lastModified": "2023-09-03T23:15:39.057",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4742",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-03T23:15:39.937",
|
||||
"lastModified": "2023-09-03T23:15:39.937",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4743",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-03T23:15:40.147",
|
||||
"lastModified": "2023-09-03T23:15:40.147",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
88
CVE-2023/CVE-2023-47xx/CVE-2023-4744.json
Normal file
88
CVE-2023/CVE-2023-47xx/CVE-2023-4744.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-4744",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-04T00:15:07.463",
|
||||
"lastModified": "2023-09-04T00:15:07.463",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC8 16.03.34.06_cn_TDC01. It has been declared as critical. Affected by this vulnerability is the function formSetDeviceName. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-238633 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 10.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/GleamingEyes/vul/blob/main/tenda_ac8/ac8_1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.238633",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.238633",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-47xx/CVE-2023-4745.json
Normal file
88
CVE-2023/CVE-2023-47xx/CVE-2023-4745.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-4745",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-04T00:15:07.820",
|
||||
"lastModified": "2023-09-04T00:15:07.820",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230822. It has been rated as critical. Affected by this issue is some unknown functionality of the file /importexport.php. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-238634 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Jacky-Y/vuls/blob/main/vul6.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.238634",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.238634",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-47xx/CVE-2023-4746.json
Normal file
88
CVE-2023/CVE-2023-47xx/CVE-2023-4746.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-4746",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-04T01:15:07.437",
|
||||
"lastModified": "2023-09-04T01:15:07.437",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in TOTOLINK N200RE V5 9.3.5u.6437_B20230519. This affects the function Validity_check. The manipulation leads to format string. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-238635."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-134"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/dmknght/8f3b6aa65e9d08f45b5236c6e9ab8d80",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.238635",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.238635",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2023/CVE-2023-47xx/CVE-2023-4747.json
Normal file
92
CVE-2023/CVE-2023-47xx/CVE-2023-4747.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2023-4747",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-04T01:15:07.790",
|
||||
"lastModified": "2023-09-04T01:15:07.790",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in DedeCMS 5.7.110. This vulnerability affects unknown code of the file /uploads/tags.php. The manipulation of the argument tag_alias leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-238636."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/laoquanshi/cve",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/laoquanshi/cve/blob/main/dedecms%20%20sql%20%20injection",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.238636",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.238636",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-47xx/CVE-2023-4749.json
Normal file
88
CVE-2023/CVE-2023-47xx/CVE-2023-4749.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-4749",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-04T01:15:07.890",
|
||||
"lastModified": "2023-09-04T01:15:07.890",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Inventory Management System 1.0. Affected is an unknown function of the file index.php. The manipulation of the argument page leads to file inclusion. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-238638 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://skypoc.wordpress.com/2023/09/03/%e3%80%90code-audit%e3%80%91open-source-ample-inventory-management-system-v1-0-by-mayuri_k-has-a-file-inclusion-vulnerability/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.238638",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.238638",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4751",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-09-03T19:15:43.677",
|
||||
"lastModified": "2023-09-03T19:15:43.677",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-04T00:06:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
45
README.md
45
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-09-03T23:55:24.671511+00:00
|
||||
2023-09-04T02:00:25.585270+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-09-03T23:15:40.147000+00:00
|
||||
2023-09-04T01:15:07.890000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -23,28 +23,55 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2023-09-03T00:00:13.565976+00:00
|
||||
2023-09-04T00:00:13.575560+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
223979
|
||||
223984
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
* [CVE-2023-4741](CVE-2023/CVE-2023-47xx/CVE-2023-4741.json) (`2023-09-03T23:15:39.057`)
|
||||
* [CVE-2023-4742](CVE-2023/CVE-2023-47xx/CVE-2023-4742.json) (`2023-09-03T23:15:39.937`)
|
||||
* [CVE-2023-4743](CVE-2023/CVE-2023-47xx/CVE-2023-4743.json) (`2023-09-03T23:15:40.147`)
|
||||
* [CVE-2023-4744](CVE-2023/CVE-2023-47xx/CVE-2023-4744.json) (`2023-09-04T00:15:07.463`)
|
||||
* [CVE-2023-4745](CVE-2023/CVE-2023-47xx/CVE-2023-4745.json) (`2023-09-04T00:15:07.820`)
|
||||
* [CVE-2023-4746](CVE-2023/CVE-2023-47xx/CVE-2023-4746.json) (`2023-09-04T01:15:07.437`)
|
||||
* [CVE-2023-4747](CVE-2023/CVE-2023-47xx/CVE-2023-4747.json) (`2023-09-04T01:15:07.790`)
|
||||
* [CVE-2023-4749](CVE-2023/CVE-2023-47xx/CVE-2023-4749.json) (`2023-09-04T01:15:07.890`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `34`
|
||||
|
||||
* [CVE-2023-4738](CVE-2023/CVE-2023-47xx/CVE-2023-4738.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-38387](CVE-2023/CVE-2023-383xx/CVE-2023-38387.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-38476](CVE-2023/CVE-2023-384xx/CVE-2023-38476.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-38482](CVE-2023/CVE-2023-384xx/CVE-2023-38482.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-38516](CVE-2023/CVE-2023-385xx/CVE-2023-38516.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-38517](CVE-2023/CVE-2023-385xx/CVE-2023-38517.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-38518](CVE-2023/CVE-2023-385xx/CVE-2023-38518.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-38521](CVE-2023/CVE-2023-385xx/CVE-2023-38521.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-37220](CVE-2023/CVE-2023-372xx/CVE-2023-37220.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-37221](CVE-2023/CVE-2023-372xx/CVE-2023-37221.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-37222](CVE-2023/CVE-2023-372xx/CVE-2023-37222.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-39369](CVE-2023/CVE-2023-393xx/CVE-2023-39369.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-39370](CVE-2023/CVE-2023-393xx/CVE-2023-39370.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-39371](CVE-2023/CVE-2023-393xx/CVE-2023-39371.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-39372](CVE-2023/CVE-2023-393xx/CVE-2023-39372.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-39373](CVE-2023/CVE-2023-393xx/CVE-2023-39373.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-39374](CVE-2023/CVE-2023-393xx/CVE-2023-39374.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-3703](CVE-2023/CVE-2023-37xx/CVE-2023-3703.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-41180](CVE-2023/CVE-2023-411xx/CVE-2023-41180.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-4751](CVE-2023/CVE-2023-47xx/CVE-2023-4751.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-4739](CVE-2023/CVE-2023-47xx/CVE-2023-4739.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-4740](CVE-2023/CVE-2023-47xx/CVE-2023-4740.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-4741](CVE-2023/CVE-2023-47xx/CVE-2023-4741.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-4742](CVE-2023/CVE-2023-47xx/CVE-2023-4742.json) (`2023-09-04T00:06:16.703`)
|
||||
* [CVE-2023-4743](CVE-2023/CVE-2023-47xx/CVE-2023-4743.json) (`2023-09-04T00:06:16.703`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user