mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2023-10-30T00:55:26.083424+00:00
This commit is contained in:
parent
3f574bb4c4
commit
4ba9604afc
59
CVE-2023/CVE-2023-43xx/CVE-2023-4393.json
Normal file
59
CVE-2023/CVE-2023-43xx/CVE-2023-4393.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-4393",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-30T00:15:39.237",
|
||||
"lastModified": "2023-10-30T00:15:39.237",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HTML and SMTP injections on the registration page of LiquidFiles versions 3.7.13 and below, allow an attacker to perform more advanced phishing attacks against an organization."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vdp@themissinglink.com.au",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vdp@themissinglink.com.au",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.themissinglink.com.au/security-advisories/cve-2023-4393",
|
||||
"source": "vdp@themissinglink.com.au"
|
||||
}
|
||||
]
|
||||
}
|
15
CVE-2023/CVE-2023-440xx/CVE-2023-44002.json
Normal file
15
CVE-2023/CVE-2023-440xx/CVE-2023-44002.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-44002",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-30T00:15:39.077",
|
||||
"lastModified": "2023-10-30T00:15:39.077",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
20
CVE-2023/CVE-2023-468xx/CVE-2023-46863.json
Normal file
20
CVE-2023/CVE-2023-468xx/CVE-2023-46863.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-46863",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-30T00:15:39.157",
|
||||
"lastModified": "2023-10-30T00:15:39.157",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Peppermint Ticket Management before 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/users/file/download?filepath=./../ POST request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Peppermint-Lab/peppermint/issues/108",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-468xx/CVE-2023-46864.json
Normal file
20
CVE-2023/CVE-2023-468xx/CVE-2023-46864.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-46864",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-30T00:15:39.200",
|
||||
"lastModified": "2023-10-30T00:15:39.200",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Peppermint Ticket Management through 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/ticket/1/file/download?filepath=../ POST request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Peppermint-Lab/peppermint/issues/171",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
13
README.md
13
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-10-29T19:00:24.542166+00:00
|
||||
2023-10-30T00:55:26.083424+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-10-29T18:15:38.687000+00:00
|
||||
2023-10-30T00:15:39.237000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,14 +29,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
229118
|
||||
229122
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2007-10003](CVE-2007/CVE-2007-100xx/CVE-2007-10003.json) (`2023-10-29T18:15:38.687`)
|
||||
* [CVE-2023-44002](CVE-2023/CVE-2023-440xx/CVE-2023-44002.json) (`2023-10-30T00:15:39.077`)
|
||||
* [CVE-2023-46863](CVE-2023/CVE-2023-468xx/CVE-2023-46863.json) (`2023-10-30T00:15:39.157`)
|
||||
* [CVE-2023-46864](CVE-2023/CVE-2023-468xx/CVE-2023-46864.json) (`2023-10-30T00:15:39.200`)
|
||||
* [CVE-2023-4393](CVE-2023/CVE-2023-43xx/CVE-2023-4393.json) (`2023-10-30T00:15:39.237`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
Loading…
x
Reference in New Issue
Block a user