Auto-Update: 2023-10-13T14:00:24.644716+00:00

This commit is contained in:
cad-safe-bot 2023-10-13 14:00:29 +00:00
parent 336d4cead3
commit 4dc017fb6b
75 changed files with 1249 additions and 132 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-46784",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-07-17T22:15:08.737",
"lastModified": "2023-01-19T20:28:13.237",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-13T12:15:09.823",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-617"
}
]
}
@ -109,6 +109,10 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/13/1",
"source": "cve@mitre.org"
},
{
"url": "http://www.squid-cache.org/Versions/v4/changesets/SQUID-2021_7.patch",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22392",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-12T23:15:10.680",
"lastModified": "2023-10-12T23:15:10.680",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:48.873",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23632",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T20:15:12.187",
"lastModified": "2023-10-12T20:15:12.187",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:48.873",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26366",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-10-13T07:15:38.933",
"lastModified": "2023-10-13T07:15:38.933",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26367",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-10-13T07:15:39.767",
"lastModified": "2023-10-13T07:15:39.767",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27316",
"sourceIdentifier": "security-alert@netapp.com",
"published": "2023-10-12T22:15:09.640",
"lastModified": "2023-10-12T23:15:10.777",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:48.873",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-29464",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2023-10-13T13:15:11.453",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "\nFactoryTalk Linx, in the Rockwell Automation PanelView Plus, allows an unauthenticated threat actor to read data from memory via crafted malicious packets. Sending a size larger than the buffer size results in leakage of data from memory resulting in an information disclosure. If the size is large enough, it causes communications over the common industrial protocol to become unresponsive to any type of packet, resulting in a denial-of-service to FactoryTalk Linx over the common industrial protocol.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141040",
"source": "PSIRT@rockwellautomation.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36839",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-12T23:15:10.883",
"lastModified": "2023-10-12T23:15:10.883",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:48.873",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36841",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-12T23:15:10.967",
"lastModified": "2023-10-12T23:15:10.967",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:48.873",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36843",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-12T23:15:11.053",
"lastModified": "2023-10-12T23:15:11.053",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:48.873",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38000",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-13T10:15:09.823",
"lastModified": "2023-10-13T10:15:09.823",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38218",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-10-13T07:15:40.047",
"lastModified": "2023-10-13T07:15:40.047",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38219",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-10-13T07:15:40.327",
"lastModified": "2023-10-13T07:15:40.327",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38220",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-10-13T07:15:40.557",
"lastModified": "2023-10-13T07:15:40.557",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38221",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-10-13T07:15:40.777",
"lastModified": "2023-10-13T07:15:40.777",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38249",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-10-13T07:15:41.037",
"lastModified": "2023-10-13T07:15:41.037",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38250",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-10-13T07:15:41.420",
"lastModified": "2023-10-13T07:15:41.420",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38251",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-10-13T07:15:41.577",
"lastModified": "2023-10-13T07:15:41.577",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-39960",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-13T13:15:11.560",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server starting with 25.0.0 and prior to 25.09 and 26.04; as well as Nextcloud Enterprise Server starting with 22.0.0 and prior to 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4; missing protection allows an attacker to brute force passwords on the WebDAV API. Nextcloud Server 25.0.9 and 26.0.4 and Nextcloud Enterprise Server 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4 contain patches for this issue. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2hrc-5fgp-c9c9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/pull/38046",
"source": "security-advisories@github.com"
},
{
"url": "https://hackerone.com/reports/1924212",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-39999",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-13T12:15:09.970",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor in WordPress\u00a0from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41261",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T23:15:11.137",
"lastModified": "2023-10-12T23:15:11.137",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:48.873",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41262",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T23:15:11.190",
"lastModified": "2023-10-12T23:15:11.190",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:48.873",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41263",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T23:15:11.243",
"lastModified": "2023-10-12T23:15:11.243",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:48.873",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42752",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-13T02:15:09.797",
"lastModified": "2023-10-13T02:15:09.797",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-43079",
"sourceIdentifier": "security_alert@emc.com",
"published": "2023-10-13T12:15:10.077",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "\nDell OpenManage Server Administrator, versions 11.0.0.0 and prior, contains an Improper Access Control vulnerability. A local low-privileged malicious user could potentially exploit this vulnerability to execute arbitrary code in order to elevate privileges on the system.\u00a0Exploitation may lead to a complete system compromise.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000218469/dsa-2023-367-dell-openmanage-server-administrator-omsa-security-update-for-multiple-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43786",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-10T13:15:22.023",
"lastModified": "2023-10-12T12:15:10.483",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-10-13T13:26:45.497",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -38,14 +58,86 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.7",
"matchCriteriaId": "52C64065-5AE9-463F-9500-CEBE3BA0C275"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-43786",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242253",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43787",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-10T13:15:22.083",
"lastModified": "2023-10-12T12:15:10.560",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-10-13T13:18:05.560",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -38,14 +58,86 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.7",
"matchCriteriaId": "52C64065-5AE9-463F-9500-CEBE3BA0C275"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-43787",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242254",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44175",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-12T23:15:11.307",
"lastModified": "2023-10-12T23:15:11.307",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44176",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:11.587",
"lastModified": "2023-10-13T00:15:11.587",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:29.080",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44177",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:11.680",
"lastModified": "2023-10-13T00:15:11.680",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44178",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:11.760",
"lastModified": "2023-10-13T00:15:11.760",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44181",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:11.837",
"lastModified": "2023-10-13T00:15:11.837",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44182",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:11.900",
"lastModified": "2023-10-13T00:15:11.900",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44183",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:11.983",
"lastModified": "2023-10-13T00:15:11.983",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44184",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.067",
"lastModified": "2023-10-13T00:15:12.067",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44185",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.147",
"lastModified": "2023-10-13T00:15:12.147",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44191",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.220",
"lastModified": "2023-10-13T00:15:12.220",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44192",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.297",
"lastModified": "2023-10-13T00:15:12.297",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44193",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.377",
"lastModified": "2023-10-13T00:15:12.377",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44194",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.450",
"lastModified": "2023-10-13T00:15:12.450",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44195",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.530",
"lastModified": "2023-10-13T00:15:12.530",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44196",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.610",
"lastModified": "2023-10-13T00:15:12.610",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44197",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.687",
"lastModified": "2023-10-13T00:15:12.687",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44198",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.760",
"lastModified": "2023-10-13T00:15:12.760",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44199",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.837",
"lastModified": "2023-10-13T00:15:12.837",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44201",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.910",
"lastModified": "2023-10-13T00:15:12.910",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44203",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.987",
"lastModified": "2023-10-13T00:15:12.987",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44204",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:13.070",
"lastModified": "2023-10-13T00:15:13.070",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:39.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-45107",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-13T13:15:11.663",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in GoodBarber plugin <=\u00a01.0.22 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/goodbarber/wordpress-goodbarber-plugin-1-0-22-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-45108",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-13T13:15:11.750",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Mailrelay plugin <=\u00a02.1.1 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mailrelay/wordpress-mailrelay-plugin-2-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-45130",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-13T13:15:11.827",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Frontier is Substrate's Ethereum compatibility layer. Prior to commit aea528198b3b226e0d20cce878551fd4c0e3d5d0, at the end of a contract execution, when opcode SUICIDE marks a contract to be deleted, the software uses `storage::remove_prefix` (now renamed to `storage::clear_prefix`) to remove all storages associated with it. This is a single IO primitive call passing the WebAssembly boundary. For large contracts, the call (without providing a `limit` parameter) can be slow. In addition, for parachains, all storages to be deleted will be part of the PoV, which easily exceed relay chain PoV size limit. On the other hand, Frontier's maintainers only charge a fixed cost for opcode SUICIDE. The maintainers consider the severity of this issue high, because an attacker can craft a contract with a lot of storage values on a parachain, and then call opcode SUICIDE on the contract. If the transaction makes into a parachain block, the parachain will then stall because the PoV size will exceed relay chain's limit. This is especially an issue for XCM transactions, because they can't be skipped. Commit aea528198b3b226e0d20cce878551fd4c0e3d5d0 contains a patch for this issue. For parachains, it's recommended to issue an emergency runtime upgrade as soon as possible. For standalone chains, the impact is less severe because the issue mainly affects PoV sizes. It's recommended to issue a normal runtime upgrade as soon as possible. There are no known workarounds."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://github.com/paritytech/frontier/commit/aea528198b3b226e0d20cce878551fd4c0e3d5d0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/paritytech/frontier/pull/1212",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/paritytech/frontier/security/advisories/GHSA-gc88-2gvv-gp3v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-45162",
"sourceIdentifier": "security@1e.com",
"published": "2023-10-13T13:15:11.910",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Affected 1E Platform versions have a Blind SQL Injection vulnerability that can lead to arbitrary code execution.\u00a0\n\nApplication of the relevant hotfix remediates this issue.\n\nfor v8.1.2 apply hotfix Q23166\nfor v8.4.1 apply hotfix Q23164\nfor v9.0.1 apply hotfix Q23173\n\nSaaS implementations on v23.7.1 will automatically have hotfix Q23173 applied. Customers with SaaS versions below this are urged to upgrade urgently - please contact 1E to arrange this"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@1e.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@1e.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
"source": "security@1e.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-45463",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-13T13:15:11.987",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the hostName parameter in the FUN_0040dabc function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20hostname%20parameter%20leads%20to%20DOS.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-45464",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-13T13:15:12.043",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the servDomain parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20servDomain%20parameter%20leads%20to%20DOS.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-45465",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-13T13:15:12.093",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the ddnsDomainName parameter in the Dynamic DNS settings."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ddnsDomainName%20parameter%20in%20Dynamic%20DNS%20setting.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-45466",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-13T13:15:12.147",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the pin_host parameter in the WPS Settings."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20pin_host%20parameter%20in%20wps%20setting.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-45467",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-13T13:15:12.203",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the ntpServIP parameter in the Time Settings."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ntpServIP%20parameter%20in%20Time%20Settings%20.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-45468",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-13T13:15:12.253",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the pingWdogIp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20pingWdogIp%20parameter%20leads%20to%20DOS.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45510",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T21:15:11.373",
"lastModified": "2023-10-12T21:15:11.373",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:48.873",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45511",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T21:15:11.437",
"lastModified": "2023-10-12T21:15:11.437",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:48.873",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-4517",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-13T13:15:12.443",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository hestiacp/hestiacp prior to 1.8.6."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.2,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.7,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/hestiacp/hestiacp/commit/d30e3edbca5915235643e46ab222cb7aed9b319a",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/508d1d21-c45d-47ff-833f-50c671882e51",
"source": "security@huntr.dev"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4562",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2023-10-13T02:15:09.917",
"lastModified": "2023-10-13T02:15:09.917",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-4829",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-13T13:15:12.523",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository froxlor/froxlor prior to 2.0.22."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/froxlor/froxlor/commit/4711a414360782fe4fc94f7c25027077cbcdf73d",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/babd73ca-6c80-4145-8c7d-33a883fe606b",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-4995",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-10-13T13:15:12.607",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Embed Calendly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'calendly' shortcode in versions up to, and including, 3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/embed-calendly-scheduling/tags/3.6/includes/embed.php#L140",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d1bf83df-7a1f-4572-9c8d-1013750d51d7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-5240",
"sourceIdentifier": "security@devolutions.net",
"published": "2023-10-13T13:15:12.693",
"lastModified": "2023-10-13T13:46:47.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper access control in PAM propagation scripts in Devolutions Server 2023.2.8.0 and ealier allows an attack with permission to manage PAM propagation scripts to retrieve passwords stored in it via a GET request.\n\n\n"
}
],
"metrics": {},
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2023-0017",
"source": "security@devolutions.net"
}
]
}

View File

@ -2,15 +2,41 @@
"id": "CVE-2023-5488",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-10T14:15:11.123",
"lastModified": "2023-10-10T14:58:46.263",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-10-13T13:22:54.483",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928. It has been rated as critical. Affected by this issue is some unknown functionality of the file /sysmanage/updatelib.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241640. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform hasta 20230928. Se calific\u00f3 como cr\u00edtica. Una funci\u00f3n desconocida del archivo /sysmanage/updatelib.php es afectada por este problema. La manipulaci\u00f3n del argumento file_upload conduce a una carga sin restricciones. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-241640. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +97,59 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:byzoro:smart_s45f_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "20230928",
"matchCriteriaId": "92BFABCF-7517-438D-92F1-4F21699BBB7E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:byzoro:smart_s45f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BDA1A96-1CB9-48C6-805E-514CE4FEC9E3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/llixixi/cve/blob/main/s45_upload_%20updatelib.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.241640",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.241640",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5498",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-10T10:15:10.177",
"lastModified": "2023-10-10T12:16:32.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-10-13T12:54:51.443",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -50,14 +72,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chiefonboarding:chiefonboarding:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.47",
"matchCriteriaId": "69013906-33F2-4136-AF56-92BA76EF825D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/chiefonboarding/chiefonboarding/commit/7de93f5fcc21e8f16fa0a64d38461c1b48ff3ee7",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.dev/bounties/ec367b1d-5ec4-4ab2-881a-caf82e4877d9",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5557",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-13T02:15:11.077",
"lastModified": "2023-10-13T02:15:11.077",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5562",
"sourceIdentifier": "security@knime.com",
"published": "2023-10-12T20:15:12.583",
"lastModified": "2023-10-12T20:15:12.583",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:48.873",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5563",
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2023-10-13T00:15:13.247",
"lastModified": "2023-10-13T00:15:13.247",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5564",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-13T01:15:56.093",
"lastModified": "2023-10-13T01:15:56.093",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5571",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-13T10:15:10.457",
"lastModified": "2023-10-13T10:15:10.457",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5572",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-13T10:15:10.573",
"lastModified": "2023-10-13T10:15:10.573",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5573",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-13T10:15:10.640",
"lastModified": "2023-10-13T10:15:10.640",
"vulnStatus": "Received",
"lastModified": "2023-10-13T12:47:20.137",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-10-13T12:00:25.434288+00:00
2023-10-13T14:00:24.644716+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-10-13T10:15:10.640000+00:00
2023-10-13T13:46:47.010000+00:00
```
### Last Data Feed Release
@ -29,24 +29,62 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
227737
227755
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `18`
* [CVE-2023-38000](CVE-2023/CVE-2023-380xx/CVE-2023-38000.json) (`2023-10-13T10:15:09.823`)
* [CVE-2023-5571](CVE-2023/CVE-2023-55xx/CVE-2023-5571.json) (`2023-10-13T10:15:10.457`)
* [CVE-2023-5572](CVE-2023/CVE-2023-55xx/CVE-2023-5572.json) (`2023-10-13T10:15:10.573`)
* [CVE-2023-5573](CVE-2023/CVE-2023-55xx/CVE-2023-5573.json) (`2023-10-13T10:15:10.640`)
* [CVE-2023-39999](CVE-2023/CVE-2023-399xx/CVE-2023-39999.json) (`2023-10-13T12:15:09.970`)
* [CVE-2023-43079](CVE-2023/CVE-2023-430xx/CVE-2023-43079.json) (`2023-10-13T12:15:10.077`)
* [CVE-2023-29464](CVE-2023/CVE-2023-294xx/CVE-2023-29464.json) (`2023-10-13T13:15:11.453`)
* [CVE-2023-39960](CVE-2023/CVE-2023-399xx/CVE-2023-39960.json) (`2023-10-13T13:15:11.560`)
* [CVE-2023-45107](CVE-2023/CVE-2023-451xx/CVE-2023-45107.json) (`2023-10-13T13:15:11.663`)
* [CVE-2023-45108](CVE-2023/CVE-2023-451xx/CVE-2023-45108.json) (`2023-10-13T13:15:11.750`)
* [CVE-2023-45130](CVE-2023/CVE-2023-451xx/CVE-2023-45130.json) (`2023-10-13T13:15:11.827`)
* [CVE-2023-45162](CVE-2023/CVE-2023-451xx/CVE-2023-45162.json) (`2023-10-13T13:15:11.910`)
* [CVE-2023-45463](CVE-2023/CVE-2023-454xx/CVE-2023-45463.json) (`2023-10-13T13:15:11.987`)
* [CVE-2023-45464](CVE-2023/CVE-2023-454xx/CVE-2023-45464.json) (`2023-10-13T13:15:12.043`)
* [CVE-2023-45465](CVE-2023/CVE-2023-454xx/CVE-2023-45465.json) (`2023-10-13T13:15:12.093`)
* [CVE-2023-45466](CVE-2023/CVE-2023-454xx/CVE-2023-45466.json) (`2023-10-13T13:15:12.147`)
* [CVE-2023-45467](CVE-2023/CVE-2023-454xx/CVE-2023-45467.json) (`2023-10-13T13:15:12.203`)
* [CVE-2023-45468](CVE-2023/CVE-2023-454xx/CVE-2023-45468.json) (`2023-10-13T13:15:12.253`)
* [CVE-2023-4517](CVE-2023/CVE-2023-45xx/CVE-2023-4517.json) (`2023-10-13T13:15:12.443`)
* [CVE-2023-4829](CVE-2023/CVE-2023-48xx/CVE-2023-4829.json) (`2023-10-13T13:15:12.523`)
* [CVE-2023-4995](CVE-2023/CVE-2023-49xx/CVE-2023-4995.json) (`2023-10-13T13:15:12.607`)
* [CVE-2023-5240](CVE-2023/CVE-2023-52xx/CVE-2023-5240.json) (`2023-10-13T13:15:12.693`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `56`
* [CVE-2023-3589](CVE-2023/CVE-2023-35xx/CVE-2023-3589.json) (`2023-10-13T10:15:10.090`)
* [CVE-2023-44194](CVE-2023/CVE-2023-441xx/CVE-2023-44194.json) (`2023-10-13T12:47:39.540`)
* [CVE-2023-44195](CVE-2023/CVE-2023-441xx/CVE-2023-44195.json) (`2023-10-13T12:47:39.540`)
* [CVE-2023-44196](CVE-2023/CVE-2023-441xx/CVE-2023-44196.json) (`2023-10-13T12:47:39.540`)
* [CVE-2023-44197](CVE-2023/CVE-2023-441xx/CVE-2023-44197.json) (`2023-10-13T12:47:39.540`)
* [CVE-2023-44198](CVE-2023/CVE-2023-441xx/CVE-2023-44198.json) (`2023-10-13T12:47:39.540`)
* [CVE-2023-44199](CVE-2023/CVE-2023-441xx/CVE-2023-44199.json) (`2023-10-13T12:47:39.540`)
* [CVE-2023-44201](CVE-2023/CVE-2023-442xx/CVE-2023-44201.json) (`2023-10-13T12:47:39.540`)
* [CVE-2023-44203](CVE-2023/CVE-2023-442xx/CVE-2023-44203.json) (`2023-10-13T12:47:39.540`)
* [CVE-2023-44204](CVE-2023/CVE-2023-442xx/CVE-2023-44204.json) (`2023-10-13T12:47:39.540`)
* [CVE-2023-23632](CVE-2023/CVE-2023-236xx/CVE-2023-23632.json) (`2023-10-13T12:47:48.873`)
* [CVE-2023-5562](CVE-2023/CVE-2023-55xx/CVE-2023-5562.json) (`2023-10-13T12:47:48.873`)
* [CVE-2023-45510](CVE-2023/CVE-2023-455xx/CVE-2023-45510.json) (`2023-10-13T12:47:48.873`)
* [CVE-2023-45511](CVE-2023/CVE-2023-455xx/CVE-2023-45511.json) (`2023-10-13T12:47:48.873`)
* [CVE-2023-27316](CVE-2023/CVE-2023-273xx/CVE-2023-27316.json) (`2023-10-13T12:47:48.873`)
* [CVE-2023-22392](CVE-2023/CVE-2023-223xx/CVE-2023-22392.json) (`2023-10-13T12:47:48.873`)
* [CVE-2023-36839](CVE-2023/CVE-2023-368xx/CVE-2023-36839.json) (`2023-10-13T12:47:48.873`)
* [CVE-2023-36841](CVE-2023/CVE-2023-368xx/CVE-2023-36841.json) (`2023-10-13T12:47:48.873`)
* [CVE-2023-36843](CVE-2023/CVE-2023-368xx/CVE-2023-36843.json) (`2023-10-13T12:47:48.873`)
* [CVE-2023-41261](CVE-2023/CVE-2023-412xx/CVE-2023-41261.json) (`2023-10-13T12:47:48.873`)
* [CVE-2023-41262](CVE-2023/CVE-2023-412xx/CVE-2023-41262.json) (`2023-10-13T12:47:48.873`)
* [CVE-2023-41263](CVE-2023/CVE-2023-412xx/CVE-2023-41263.json) (`2023-10-13T12:47:48.873`)
* [CVE-2023-5498](CVE-2023/CVE-2023-54xx/CVE-2023-5498.json) (`2023-10-13T12:54:51.443`)
* [CVE-2023-43787](CVE-2023/CVE-2023-437xx/CVE-2023-43787.json) (`2023-10-13T13:18:05.560`)
* [CVE-2023-5488](CVE-2023/CVE-2023-54xx/CVE-2023-5488.json) (`2023-10-13T13:22:54.483`)
* [CVE-2023-43786](CVE-2023/CVE-2023-437xx/CVE-2023-43786.json) (`2023-10-13T13:26:45.497`)
## Download and Usage