Auto-Update: 2023-09-05T10:00:23.957522+00:00

This commit is contained in:
cad-safe-bot 2023-09-05 10:00:27 +00:00
parent 76bd8b4b0c
commit 4aedee51a3
7 changed files with 163 additions and 55 deletions

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-38574",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:08.037",
"lastModified": "2023-09-05T09:15:08.037",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Open redirect vulnerability in VI Web Client prior to 7.9.6 allows a remote unauthenticated attacker to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL."
}
],
"metrics": {},
"references": [
{
"url": "https://downloadvi.com/downloads/IPServer/v7.9/796232/v796232RN.pdf",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN60140221/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-39448",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:08.803",
"lastModified": "2023-09-05T09:15:08.803",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Path traversal vulnerability in SHIRASAGI prior to v1.18.0 allows a remote authenticated attacker to alter or create arbitrary files on the server, resulting in arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN82758000/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.ss-proj.org/support/954.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-39938",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:09.053",
"lastModified": "2023-09-05T09:15:09.053",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Reflected cross-site scripting vulnerability in VI Web Client prior to 7.9.6 allows a remote unauthenticated attacker to inject an arbitrary script."
}
],
"metrics": {},
"references": [
{
"url": "https://downloadvi.com/downloads/IPServer/v7.9/796232/v796232RN.pdf",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN60140221/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40535",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:09.213",
"lastModified": "2023-09-05T09:15:09.213",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting vulnerability in View setting page of VI Web Client prior to 7.9.6 allows a remote authenticated attacker to inject an arbitrary script."
}
],
"metrics": {},
"references": [
{
"url": "https://downloadvi.com/downloads/IPServer/v7.9/796232/v796232RN.pdf",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN60140221/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40705",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:09.340",
"lastModified": "2023-09-05T09:15:09.340",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting vulnerability in Map setting page of VI Web Client prior to 7.9.6 allows a remote authenticated attacker to inject an arbitrary script."
}
],
"metrics": {},
"references": [
{
"url": "https://downloadvi.com/downloads/IPServer/v7.9/796232/v796232RN.pdf",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN60140221/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-4540",
"sourceIdentifier": "cvd@cert.pl",
"published": "2023-09-05T08:15:40.017",
"lastModified": "2023-09-05T08:15:40.017",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Handling of Exceptional Conditions vulnerability in Daurnimator HTTP Library for Lua allows Excessive Allocation.This issue affects HTTP Library for Lua: before commit ddab283.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"references": [
{
"url": "https://github.com/daurnimator/lua-http/commit/ddab2835c583d45dec62680ca8d3cbde55e0bae6",
"source": "cvd@cert.pl"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-05T08:00:25.999709+00:00
2023-09-05T10:00:23.957522+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-05T07:15:14.927000+00:00
2023-09-05T09:15:09.340000+00:00
```
### Last Data Feed Release
@ -29,69 +29,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
224181
224187
```
### CVEs added in the last Commit
Recently added CVEs: `39`
Recently added CVEs: `6`
* [CVE-2023-21667](CVE-2023/CVE-2023-216xx/CVE-2023-21667.json) (`2023-09-05T07:15:13.020`)
* [CVE-2023-28538](CVE-2023/CVE-2023-285xx/CVE-2023-28538.json) (`2023-09-05T07:15:13.113`)
* [CVE-2023-28543](CVE-2023/CVE-2023-285xx/CVE-2023-28543.json) (`2023-09-05T07:15:13.197`)
* [CVE-2023-28544](CVE-2023/CVE-2023-285xx/CVE-2023-28544.json) (`2023-09-05T07:15:13.280`)
* [CVE-2023-28548](CVE-2023/CVE-2023-285xx/CVE-2023-28548.json) (`2023-09-05T07:15:13.360`)
* [CVE-2023-28549](CVE-2023/CVE-2023-285xx/CVE-2023-28549.json) (`2023-09-05T07:15:13.437`)
* [CVE-2023-28557](CVE-2023/CVE-2023-285xx/CVE-2023-28557.json) (`2023-09-05T07:15:13.517`)
* [CVE-2023-28558](CVE-2023/CVE-2023-285xx/CVE-2023-28558.json) (`2023-09-05T07:15:13.603`)
* [CVE-2023-28559](CVE-2023/CVE-2023-285xx/CVE-2023-28559.json) (`2023-09-05T07:15:13.687`)
* [CVE-2023-28560](CVE-2023/CVE-2023-285xx/CVE-2023-28560.json) (`2023-09-05T07:15:13.763`)
* [CVE-2023-28562](CVE-2023/CVE-2023-285xx/CVE-2023-28562.json) (`2023-09-05T07:15:13.843`)
* [CVE-2023-28564](CVE-2023/CVE-2023-285xx/CVE-2023-28564.json) (`2023-09-05T07:15:13.923`)
* [CVE-2023-28565](CVE-2023/CVE-2023-285xx/CVE-2023-28565.json) (`2023-09-05T07:15:14.000`)
* [CVE-2023-28567](CVE-2023/CVE-2023-285xx/CVE-2023-28567.json) (`2023-09-05T07:15:14.083`)
* [CVE-2023-28573](CVE-2023/CVE-2023-285xx/CVE-2023-28573.json) (`2023-09-05T07:15:14.167`)
* [CVE-2023-28581](CVE-2023/CVE-2023-285xx/CVE-2023-28581.json) (`2023-09-05T07:15:14.247`)
* [CVE-2023-28584](CVE-2023/CVE-2023-285xx/CVE-2023-28584.json) (`2023-09-05T07:15:14.323`)
* [CVE-2023-33015](CVE-2023/CVE-2023-330xx/CVE-2023-33015.json) (`2023-09-05T07:15:14.407`)
* [CVE-2023-33016](CVE-2023/CVE-2023-330xx/CVE-2023-33016.json) (`2023-09-05T07:15:14.487`)
* [CVE-2023-33019](CVE-2023/CVE-2023-330xx/CVE-2023-33019.json) (`2023-09-05T07:15:14.560`)
* [CVE-2023-33020](CVE-2023/CVE-2023-330xx/CVE-2023-33020.json) (`2023-09-05T07:15:14.640`)
* [CVE-2023-33021](CVE-2023/CVE-2023-330xx/CVE-2023-33021.json) (`2023-09-05T07:15:14.717`)
* [CVE-2023-41908](CVE-2023/CVE-2023-419xx/CVE-2023-41908.json) (`2023-09-05T07:15:14.810`)
* [CVE-2023-41909](CVE-2023/CVE-2023-419xx/CVE-2023-41909.json) (`2023-09-05T07:15:14.877`)
* [CVE-2023-41910](CVE-2023/CVE-2023-419xx/CVE-2023-41910.json) (`2023-09-05T07:15:14.927`)
* [CVE-2023-4540](CVE-2023/CVE-2023-45xx/CVE-2023-4540.json) (`2023-09-05T08:15:40.017`)
* [CVE-2023-38574](CVE-2023/CVE-2023-385xx/CVE-2023-38574.json) (`2023-09-05T09:15:08.037`)
* [CVE-2023-39448](CVE-2023/CVE-2023-394xx/CVE-2023-39448.json) (`2023-09-05T09:15:08.803`)
* [CVE-2023-39938](CVE-2023/CVE-2023-399xx/CVE-2023-39938.json) (`2023-09-05T09:15:09.053`)
* [CVE-2023-40535](CVE-2023/CVE-2023-405xx/CVE-2023-40535.json) (`2023-09-05T09:15:09.213`)
* [CVE-2023-40705](CVE-2023/CVE-2023-407xx/CVE-2023-40705.json) (`2023-09-05T09:15:09.340`)
### CVEs modified in the last Commit
Recently modified CVEs: `66`
Recently modified CVEs: `0`
* [CVE-2023-4284](CVE-2023/CVE-2023-42xx/CVE-2023-4284.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-4298](CVE-2023/CVE-2023-42xx/CVE-2023-4298.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-4587](CVE-2023/CVE-2023-45xx/CVE-2023-4587.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-3221](CVE-2023/CVE-2023-32xx/CVE-2023-3221.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-3222](CVE-2023/CVE-2023-32xx/CVE-2023-3222.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-4733](CVE-2023/CVE-2023-47xx/CVE-2023-4733.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-4750](CVE-2023/CVE-2023-47xx/CVE-2023-4750.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-4752](CVE-2023/CVE-2023-47xx/CVE-2023-4752.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-4755](CVE-2023/CVE-2023-47xx/CVE-2023-4755.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-28072](CVE-2023/CVE-2023-280xx/CVE-2023-28072.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-4758](CVE-2023/CVE-2023-47xx/CVE-2023-4758.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-40015](CVE-2023/CVE-2023-400xx/CVE-2023-40015.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-41052](CVE-2023/CVE-2023-410xx/CVE-2023-41052.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-41054](CVE-2023/CVE-2023-410xx/CVE-2023-41054.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-41055](CVE-2023/CVE-2023-410xx/CVE-2023-41055.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-41057](CVE-2023/CVE-2023-410xx/CVE-2023-41057.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-41058](CVE-2023/CVE-2023-410xx/CVE-2023-41058.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-32338](CVE-2023/CVE-2023-323xx/CVE-2023-32338.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-35892](CVE-2023/CVE-2023-358xx/CVE-2023-35892.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-22870](CVE-2023/CVE-2023-228xx/CVE-2023-22870.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-29261](CVE-2023/CVE-2023-292xx/CVE-2023-29261.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-35906](CVE-2023/CVE-2023-359xx/CVE-2023-35906.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-4636](CVE-2023/CVE-2023-46xx/CVE-2023-4636.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-36308](CVE-2023/CVE-2023-363xx/CVE-2023-36308.json) (`2023-09-05T06:50:39.603`)
* [CVE-2023-36307](CVE-2023/CVE-2023-363xx/CVE-2023-36307.json) (`2023-09-05T06:50:39.603`)
## Download and Usage