diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2161.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2161.json new file mode 100644 index 00000000000..b5e320bf0c3 --- /dev/null +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2161.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-2161", + "sourceIdentifier": "cybersecurity@se.com", + "published": "2023-05-16T05:15:09.357", + "lastModified": "2023-05-16T05:15:09.357", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nA CWE-611: Improper Restriction of XML External Entity Reference vulnerability exists that\ncould cause unauthorized read access to the file system when a malicious configuration file is\nloaded on to the software by a local user.\u00a0" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@se.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@se.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-129-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-129-01.pdf", + "source": "cybersecurity@se.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f56a6f6ef53..18ca367bb0c 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-16T04:00:23.786129+00:00 +2023-05-16T06:00:24.123174+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-16T03:15:09.227000+00:00 +2023-05-16T05:15:09.357000+00:00 ``` ### Last Data Feed Release @@ -29,25 +29,20 @@ Download and Changelog: [Click](releases/latest) ### Total Number of included CVEs ```plain -215338 +215339 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `1` -* [CVE-2023-2708](CVE-2023/CVE-2023-27xx/CVE-2023-2708.json) (`2023-05-16T03:15:09.063`) -* [CVE-2023-2710](CVE-2023/CVE-2023-27xx/CVE-2023-2710.json) (`2023-05-16T03:15:09.147`) +* [CVE-2023-2161](CVE-2023/CVE-2023-21xx/CVE-2023-2161.json) (`2023-05-16T05:15:09.357`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `0` -* [CVE-2020-14422](CVE-2020/CVE-2020-144xx/CVE-2020-14422.json) (`2023-05-16T02:15:08.783`) -* [CVE-2023-0664](CVE-2023/CVE-2023-06xx/CVE-2023-0664.json) (`2023-05-16T03:15:08.870`) -* [CVE-2023-1906](CVE-2023/CVE-2023-19xx/CVE-2023-1906.json) (`2023-05-16T03:15:08.967`) -* [CVE-2023-31047](CVE-2023/CVE-2023-310xx/CVE-2023-31047.json) (`2023-05-16T03:15:09.227`) ## Download and Usage