Auto-Update: 2023-06-16T06:00:34.503353+00:00

This commit is contained in:
cad-safe-bot 2023-06-16 06:00:37 +00:00
parent cfef7dfa6e
commit 5195192334
28 changed files with 371 additions and 61 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46165", "id": "CVE-2022-46165",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2023-06-06T18:15:10.100", "published": "2023-06-06T18:15:10.100",
"lastModified": "2023-06-13T16:26:07.947", "lastModified": "2023-06-16T04:15:11.407",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -99,6 +99,14 @@
"Exploit", "Exploit",
"Vendor Advisory" "Vendor Advisory"
] ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IRYGBFJPVBW6PPTETNIBWQJE4HJSA5PJ/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XEBWSQVGHSTR4ZO7LVVEMPEGMV2DS5XR/",
"source": "security-advisories@github.com"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47015", "id": "CVE-2022-47015",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-01-20T19:15:17.443", "published": "2023-01-20T19:15:17.443",
"lastModified": "2023-06-10T04:15:10.223", "lastModified": "2023-06-16T04:15:11.550",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -82,6 +82,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O22PO3Q6TRSNJI2A2WTJH3VVCHEKBF6C/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O22PO3Q6TRSNJI2A2WTJH3VVCHEKBF6C/",
"source": "cve@mitre.org" "source": "cve@mitre.org"
}, },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUQ33SPQCZQD63TWAM3XKFNVNFRGPFYU/",
"source": "cve@mitre.org"
},
{ {
"url": "https://security.netapp.com/advisory/ntap-20230309-0009/", "url": "https://security.netapp.com/advisory/ntap-20230309-0009/",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0666", "id": "CVE-2023-0666",
"sourceIdentifier": "cve@takeonme.org", "sourceIdentifier": "cve@takeonme.org",
"published": "2023-06-07T03:15:09.000", "published": "2023-06-07T03:15:09.000",
"lastModified": "2023-06-14T18:12:46.100", "lastModified": "2023-06-16T04:15:11.707",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -95,6 +95,10 @@
"Exploit" "Exploit"
] ]
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5429",
"source": "cve@takeonme.org"
},
{ {
"url": "https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html", "url": "https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html",
"source": "cve@takeonme.org", "source": "cve@takeonme.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0668", "id": "CVE-2023-0668",
"sourceIdentifier": "cve@takeonme.org", "sourceIdentifier": "cve@takeonme.org",
"published": "2023-06-07T03:15:09.193", "published": "2023-06-07T03:15:09.193",
"lastModified": "2023-06-13T18:51:48.703", "lastModified": "2023-06-16T04:15:11.830",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -102,6 +102,10 @@
"Exploit" "Exploit"
] ]
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5429",
"source": "cve@takeonme.org"
},
{ {
"url": "https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html", "url": "https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html",
"source": "cve@takeonme.org", "source": "cve@takeonme.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1161", "id": "CVE-2023-1161",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-03-06T21:15:10.990", "published": "2023-03-06T21:15:10.990",
"lastModified": "2023-04-29T21:15:39.143", "lastModified": "2023-06-16T04:15:11.953",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -112,6 +112,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html",
"source": "cve@gitlab.com" "source": "cve@gitlab.com"
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5429",
"source": "cve@gitlab.com"
},
{ {
"url": "https://www.wireshark.org/security/wnpa-sec-2023-08.html", "url": "https://www.wireshark.org/security/wnpa-sec-2023-08.html",
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1992", "id": "CVE-2023-1992",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-04-12T21:15:15.147", "published": "2023-04-12T21:15:15.147",
"lastModified": "2023-04-29T21:15:39.233", "lastModified": "2023-06-16T04:15:12.127",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -126,6 +126,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/",
"source": "cve@gitlab.com" "source": "cve@gitlab.com"
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5429",
"source": "cve@gitlab.com"
},
{ {
"url": "https://www.wireshark.org/security/wnpa-sec-2023-09.html", "url": "https://www.wireshark.org/security/wnpa-sec-2023-09.html",
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1993", "id": "CVE-2023-1993",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-04-12T21:15:16.183", "published": "2023-04-12T21:15:16.183",
"lastModified": "2023-04-29T21:15:39.303", "lastModified": "2023-06-16T04:15:12.253",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -126,6 +126,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/",
"source": "cve@gitlab.com" "source": "cve@gitlab.com"
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5429",
"source": "cve@gitlab.com"
},
{ {
"url": "https://www.wireshark.org/security/wnpa-sec-2023-10.html", "url": "https://www.wireshark.org/security/wnpa-sec-2023-10.html",
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1994", "id": "CVE-2023-1994",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-04-12T22:15:13.987", "published": "2023-04-12T22:15:13.987",
"lastModified": "2023-04-29T21:15:39.360", "lastModified": "2023-06-16T04:15:12.347",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -125,6 +125,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/",
"source": "cve@gitlab.com" "source": "cve@gitlab.com"
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5429",
"source": "cve@gitlab.com"
},
{ {
"url": "https://www.wireshark.org/security/wnpa-sec-2023-11.html", "url": "https://www.wireshark.org/security/wnpa-sec-2023-11.html",
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24038", "id": "CVE-2023-24038",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-01-21T01:15:15.183", "published": "2023-01-21T01:15:15.183",
"lastModified": "2023-02-06T00:15:09.127", "lastModified": "2023-06-16T04:15:12.473",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -97,6 +97,14 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MYD5PFRUUB4VVY52I5KA3RQ7SQOD7YM/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASDRHN2MLGL2HGBUNDZG4YLUWW6NSUKD/",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5339", "url": "https://www.debian.org/security/2023/dsa-5339",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24329", "id": "CVE-2023-24329",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-02-17T15:15:12.243", "published": "2023-02-17T15:15:12.243",
"lastModified": "2023-06-14T04:15:18.797", "lastModified": "2023-06-16T04:15:12.660",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -120,6 +120,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/",
"source": "cve@mitre.org" "source": "cve@mitre.org"
}, },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/",
"source": "cve@mitre.org"
},
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2854", "id": "CVE-2023-2854",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:17.643", "published": "2023-05-26T21:15:17.643",
"lastModified": "2023-06-01T13:29:37.067", "lastModified": "2023-06-16T04:15:12.840",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -110,6 +110,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5429",
"source": "cve@gitlab.com"
},
{ {
"url": "https://www.wireshark.org/security/wnpa-sec-2023-17.html", "url": "https://www.wireshark.org/security/wnpa-sec-2023-17.html",
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2855", "id": "CVE-2023-2855",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:17.757", "published": "2023-05-26T21:15:17.757",
"lastModified": "2023-06-01T13:29:47.293", "lastModified": "2023-06-16T04:15:12.943",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -110,6 +110,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5429",
"source": "cve@gitlab.com"
},
{ {
"url": "https://www.wireshark.org/security/wnpa-sec-2023-12.html", "url": "https://www.wireshark.org/security/wnpa-sec-2023-12.html",
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2856", "id": "CVE-2023-2856",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:17.913", "published": "2023-05-26T21:15:17.913",
"lastModified": "2023-06-03T19:15:09.063", "lastModified": "2023-06-16T04:15:13.027",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -114,6 +114,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html", "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html",
"source": "cve@gitlab.com" "source": "cve@gitlab.com"
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5429",
"source": "cve@gitlab.com"
},
{ {
"url": "https://www.wireshark.org/security/wnpa-sec-2023-16.html", "url": "https://www.wireshark.org/security/wnpa-sec-2023-16.html",
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2857", "id": "CVE-2023-2857",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:18.273", "published": "2023-05-26T21:15:18.273",
"lastModified": "2023-06-01T13:29:58.397", "lastModified": "2023-06-16T04:15:13.147",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -110,6 +110,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5429",
"source": "cve@gitlab.com"
},
{ {
"url": "https://www.wireshark.org/security/wnpa-sec-2023-13.html", "url": "https://www.wireshark.org/security/wnpa-sec-2023-13.html",
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2858", "id": "CVE-2023-2858",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:18.633", "published": "2023-05-26T21:15:18.633",
"lastModified": "2023-06-03T19:15:09.160", "lastModified": "2023-06-16T04:15:13.240",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -114,6 +114,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html", "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html",
"source": "cve@gitlab.com" "source": "cve@gitlab.com"
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5429",
"source": "cve@gitlab.com"
},
{ {
"url": "https://www.wireshark.org/security/wnpa-sec-2023-15.html", "url": "https://www.wireshark.org/security/wnpa-sec-2023-15.html",
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2879", "id": "CVE-2023-2879",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:19.000", "published": "2023-05-26T21:15:19.000",
"lastModified": "2023-06-03T19:15:09.237", "lastModified": "2023-06-16T04:15:13.340",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -114,6 +114,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html", "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html",
"source": "cve@gitlab.com" "source": "cve@gitlab.com"
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5429",
"source": "cve@gitlab.com"
},
{ {
"url": "https://www.wireshark.org/security/wnpa-sec-2023-14.html", "url": "https://www.wireshark.org/security/wnpa-sec-2023-14.html",
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2952", "id": "CVE-2023-2952",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-30T23:15:09.887", "published": "2023-05-30T23:15:09.887",
"lastModified": "2023-06-06T20:18:04.490", "lastModified": "2023-06-16T04:15:13.610",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -129,6 +129,10 @@
"Mailing List" "Mailing List"
] ]
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5429",
"source": "cve@gitlab.com"
},
{ {
"url": "https://www.wireshark.org/security/wnpa-sec-2023-20.html", "url": "https://www.wireshark.org/security/wnpa-sec-2023-20.html",
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-32752",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2023-06-16T04:15:13.717",
"lastModified": "2023-06-16T05:15:50.547",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "L7 Networks InstantScan IS-8000 & InstantQoS IQ-8000\u2019s file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-7189-5995e-2.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-32753",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2023-06-16T04:15:13.863",
"lastModified": "2023-06-16T05:15:50.637",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "OMICARD EDM\u2019s file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-7190-d73c1-2.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-32754",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2023-06-16T04:15:13.947",
"lastModified": "2023-06-16T04:15:13.947",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Thinking Software Efence login function has insufficient validation for user input. An unauthenticated remote attacker can exploit this vulnerability to inject arbitrary SQL commands to access, modify or delete database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/tw/cp-132-7161-3e7c9-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3214", "id": "CVE-2023-3214",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-13T18:15:22.170", "published": "2023-06-13T18:15:22.170",
"lastModified": "2023-06-13T18:27:41.330", "lastModified": "2023-06-16T04:15:14.263",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
@ -19,6 +19,10 @@
{ {
"url": "https://crbug.com/1450568", "url": "https://crbug.com/1450568",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5428",
"source": "chrome-cve-admin@google.com"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3215", "id": "CVE-2023-3215",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-13T18:15:22.223", "published": "2023-06-13T18:15:22.223",
"lastModified": "2023-06-13T18:27:41.330", "lastModified": "2023-06-16T04:15:14.337",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
@ -19,6 +19,10 @@
{ {
"url": "https://crbug.com/1446274", "url": "https://crbug.com/1446274",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5428",
"source": "chrome-cve-admin@google.com"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3216", "id": "CVE-2023-3216",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-13T18:15:22.273", "published": "2023-06-13T18:15:22.273",
"lastModified": "2023-06-13T18:27:41.330", "lastModified": "2023-06-16T04:15:14.393",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
@ -19,6 +19,10 @@
{ {
"url": "https://crbug.com/1450114", "url": "https://crbug.com/1450114",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5428",
"source": "chrome-cve-admin@google.com"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3217", "id": "CVE-2023-3217",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-13T18:15:22.320", "published": "2023-06-13T18:15:22.320",
"lastModified": "2023-06-13T18:27:41.330", "lastModified": "2023-06-16T04:15:14.453",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
@ -19,6 +19,10 @@
{ {
"url": "https://crbug.com/1450601", "url": "https://crbug.com/1450601",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5428",
"source": "chrome-cve-admin@google.com"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33461", "id": "CVE-2023-33461",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-06-01T03:15:20.547", "published": "2023-06-01T03:15:20.547",
"lastModified": "2023-06-08T16:50:51.870", "lastModified": "2023-06-16T04:15:14.040",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -76,6 +76,10 @@
"Issue Tracking", "Issue Tracking",
"Vendor Advisory" "Vendor Advisory"
] ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAIP5AURSTWIQOOP7G4CXYJ5IIGPY3Q/",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-34845",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-16T04:15:14.143",
"lastModified": "2023-06-16T04:15:14.143",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Bludit v3.14.1 was discovered to contain an arbitrary file upload vulnerability in the component /admin/new-content. This vulnerability allows attackers to execute arbitrary web scripts or HTML via uploading a crafted SVG file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/bludit/bludit/issues/1508",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-35708",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-16T04:15:14.203",
"lastModified": "2023-06-16T04:15:14.203",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Progress MOVEit Transfer has a privilege escalation vulnerability that can be addressed with DLL drop-in version 2023.0.3 (15.0.3) and other specific fixed versions (stated below). The availability date of fixed versions of the DLL drop-in is earlier than the availability date of fixed versions of the full installer. The specific weakness and impact details will be mentioned in a later update to this CVE Record. These are fixed versions of the DLL drop-in: 2020.1.10 (12.1.10), 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), and 2023.0.3 (15.0.3)."
}
],
"metrics": {},
"references": [
{
"url": "https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-15June2023",
"source": "cve@mitre.org"
},
{
"url": "https://www.cisa.gov/news-events/alerts/2023/06/15/progress-software-releases-security-advisory-moveit-transfer-vulnerability",
"source": "cve@mitre.org"
},
{
"url": "https://www.progress.com/security/moveit-transfer-and-moveit-cloud-vulnerability",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-06-16T04:00:27.602280+00:00 2023-06-16T06:00:34.503353+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-06-16T03:58:38.280000+00:00 2023-06-16T05:15:50.637000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -29,45 +29,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
217896 217901
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `1` Recently added CVEs: `5`
* [CVE-2023-3291](CVE-2023/CVE-2023-32xx/CVE-2023-3291.json) (`2023-06-16T02:15:08.473`) * [CVE-2023-32754](CVE-2023/CVE-2023-327xx/CVE-2023-32754.json) (`2023-06-16T04:15:13.947`)
* [CVE-2023-34845](CVE-2023/CVE-2023-348xx/CVE-2023-34845.json) (`2023-06-16T04:15:14.143`)
* [CVE-2023-35708](CVE-2023/CVE-2023-357xx/CVE-2023-35708.json) (`2023-06-16T04:15:14.203`)
* [CVE-2023-32752](CVE-2023/CVE-2023-327xx/CVE-2023-32752.json) (`2023-06-16T04:15:13.717`)
* [CVE-2023-32753](CVE-2023/CVE-2023-327xx/CVE-2023-32753.json) (`2023-06-16T04:15:13.863`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `59` Recently modified CVEs: `22`
* [CVE-2023-1978](CVE-2023/CVE-2023-19xx/CVE-2023-1978.json) (`2023-06-16T03:42:56.330`) * [CVE-2022-46165](CVE-2022/CVE-2022-461xx/CVE-2022-46165.json) (`2023-06-16T04:15:11.407`)
* [CVE-2023-26465](CVE-2023/CVE-2023-264xx/CVE-2023-26465.json) (`2023-06-16T03:45:07.707`) * [CVE-2022-47015](CVE-2022/CVE-2022-470xx/CVE-2022-47015.json) (`2023-06-16T04:15:11.550`)
* [CVE-2023-3187](CVE-2023/CVE-2023-31xx/CVE-2023-3187.json) (`2023-06-16T03:46:24.830`) * [CVE-2023-0666](CVE-2023/CVE-2023-06xx/CVE-2023-0666.json) (`2023-06-16T04:15:11.707`)
* [CVE-2023-3188](CVE-2023/CVE-2023-31xx/CVE-2023-3188.json) (`2023-06-16T03:47:37.890`) * [CVE-2023-0668](CVE-2023/CVE-2023-06xx/CVE-2023-0668.json) (`2023-06-16T04:15:11.830`)
* [CVE-2023-26132](CVE-2023/CVE-2023-261xx/CVE-2023-26132.json) (`2023-06-16T03:48:26.687`) * [CVE-2023-1161](CVE-2023/CVE-2023-11xx/CVE-2023-1161.json) (`2023-06-16T04:15:11.953`)
* [CVE-2023-3192](CVE-2023/CVE-2023-31xx/CVE-2023-3192.json) (`2023-06-16T03:48:45.040`) * [CVE-2023-1992](CVE-2023/CVE-2023-19xx/CVE-2023-1992.json) (`2023-06-16T04:15:12.127`)
* [CVE-2023-22582](CVE-2023/CVE-2023-225xx/CVE-2023-22582.json) (`2023-06-16T03:48:59.780`) * [CVE-2023-1993](CVE-2023/CVE-2023-19xx/CVE-2023-1993.json) (`2023-06-16T04:15:12.253`)
* [CVE-2023-22583](CVE-2023/CVE-2023-225xx/CVE-2023-22583.json) (`2023-06-16T03:49:05.240`) * [CVE-2023-1994](CVE-2023/CVE-2023-19xx/CVE-2023-1994.json) (`2023-06-16T04:15:12.347`)
* [CVE-2023-22584](CVE-2023/CVE-2023-225xx/CVE-2023-22584.json) (`2023-06-16T03:49:12.840`) * [CVE-2023-24038](CVE-2023/CVE-2023-240xx/CVE-2023-24038.json) (`2023-06-16T04:15:12.473`)
* [CVE-2023-22585](CVE-2023/CVE-2023-225xx/CVE-2023-22585.json) (`2023-06-16T03:49:18.723`) * [CVE-2023-24329](CVE-2023/CVE-2023-243xx/CVE-2023-24329.json) (`2023-06-16T04:15:12.660`)
* [CVE-2023-22586](CVE-2023/CVE-2023-225xx/CVE-2023-22586.json) (`2023-06-16T03:50:40.117`) * [CVE-2023-2854](CVE-2023/CVE-2023-28xx/CVE-2023-2854.json) (`2023-06-16T04:15:12.840`)
* [CVE-2023-25911](CVE-2023/CVE-2023-259xx/CVE-2023-25911.json) (`2023-06-16T03:50:50.247`) * [CVE-2023-2855](CVE-2023/CVE-2023-28xx/CVE-2023-2855.json) (`2023-06-16T04:15:12.943`)
* [CVE-2023-25912](CVE-2023/CVE-2023-259xx/CVE-2023-25912.json) (`2023-06-16T03:50:57.457`) * [CVE-2023-2856](CVE-2023/CVE-2023-28xx/CVE-2023-2856.json) (`2023-06-16T04:15:13.027`)
* [CVE-2023-23818](CVE-2023/CVE-2023-238xx/CVE-2023-23818.json) (`2023-06-16T03:54:06.517`) * [CVE-2023-2857](CVE-2023/CVE-2023-28xx/CVE-2023-2857.json) (`2023-06-16T04:15:13.147`)
* [CVE-2023-33492](CVE-2023/CVE-2023-334xx/CVE-2023-33492.json) (`2023-06-16T03:54:22.820`) * [CVE-2023-2858](CVE-2023/CVE-2023-28xx/CVE-2023-2858.json) (`2023-06-16T04:15:13.240`)
* [CVE-2023-30753](CVE-2023/CVE-2023-307xx/CVE-2023-30753.json) (`2023-06-16T03:54:31.040`) * [CVE-2023-2879](CVE-2023/CVE-2023-28xx/CVE-2023-2879.json) (`2023-06-16T04:15:13.340`)
* [CVE-2023-34488](CVE-2023/CVE-2023-344xx/CVE-2023-34488.json) (`2023-06-16T03:56:04.100`) * [CVE-2023-2952](CVE-2023/CVE-2023-29xx/CVE-2023-2952.json) (`2023-06-16T04:15:13.610`)
* [CVE-2023-31236](CVE-2023/CVE-2023-312xx/CVE-2023-31236.json) (`2023-06-16T03:56:37.700`) * [CVE-2023-33461](CVE-2023/CVE-2023-334xx/CVE-2023-33461.json) (`2023-06-16T04:15:14.040`)
* [CVE-2023-32118](CVE-2023/CVE-2023-321xx/CVE-2023-32118.json) (`2023-06-16T03:56:42.987`) * [CVE-2023-3214](CVE-2023/CVE-2023-32xx/CVE-2023-3214.json) (`2023-06-16T04:15:14.263`)
* [CVE-2023-34581](CVE-2023/CVE-2023-345xx/CVE-2023-34581.json) (`2023-06-16T03:57:24.383`) * [CVE-2023-3215](CVE-2023/CVE-2023-32xx/CVE-2023-3215.json) (`2023-06-16T04:15:14.337`)
* [CVE-2023-28933](CVE-2023/CVE-2023-289xx/CVE-2023-28933.json) (`2023-06-16T03:57:30.010`) * [CVE-2023-3216](CVE-2023/CVE-2023-32xx/CVE-2023-3216.json) (`2023-06-16T04:15:14.393`)
* [CVE-2023-29385](CVE-2023/CVE-2023-293xx/CVE-2023-29385.json) (`2023-06-16T03:57:35.310`) * [CVE-2023-3217](CVE-2023/CVE-2023-32xx/CVE-2023-3217.json) (`2023-06-16T04:15:14.453`)
* [CVE-2023-34026](CVE-2023/CVE-2023-340xx/CVE-2023-34026.json) (`2023-06-16T03:57:42.393`)
* [CVE-2023-33957](CVE-2023/CVE-2023-339xx/CVE-2023-33957.json) (`2023-06-16T03:58:33.067`)
* [CVE-2023-33958](CVE-2023/CVE-2023-339xx/CVE-2023-33958.json) (`2023-06-16T03:58:38.280`)
## Download and Usage ## Download and Usage