Auto-Update: 2023-09-05T04:00:25.475382+00:00

This commit is contained in:
cad-safe-bot 2023-09-05 04:00:29 +00:00
parent 8dc73af0af
commit 53942d9f82
16 changed files with 174 additions and 30 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-21722",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:17.080",
"lastModified": "2023-08-25T18:21:24.527",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-05T03:15:07.637",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -71,6 +71,14 @@
"Broken Link"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5E3JKOO7D6Y2SW2TQB5JDVG7I4Y3UFGW/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LO6NXK73PNR4KAAHLXAGPWJAPP772IOD/",
"source": "cve@mitre.org"
},
{
"url": "https://sourceforge.net/p/oggvideotools/bugs/11/",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-41803",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-23T01:15:08.623",
"lastModified": "2023-08-30T04:15:10.560",
"lastModified": "2023-09-05T03:15:08.497",
"vulnStatus": "Modified",
"descriptions": [
{
@ -104,6 +104,10 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3064",
"sourceIdentifier": "security@golang.org",
"published": "2022-12-27T22:15:14.507",
"lastModified": "2023-08-30T04:15:10.880",
"lastModified": "2023-09-05T03:15:08.797",
"vulnStatus": "Modified",
"descriptions": [
{
@ -85,6 +85,18 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00001.html",
"source": "security@golang.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4SBIUECMLNC572P23DDOKJNKPJVX26SP/",
"source": "security@golang.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/",
"source": "security@golang.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3XC47AUW5J5M2ULJX7WCCL3B2ETLMT/",
"source": "security@golang.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/",
"source": "security@golang.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-40716",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-23T12:15:10.500",
"lastModified": "2023-08-30T04:15:11.027",
"lastModified": "2023-09-05T03:15:09.110",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41717",
"sourceIdentifier": "security@golang.org",
"published": "2022-12-08T20:15:10.330",
"lastModified": "2023-08-02T17:19:12.813",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-05T03:15:09.377",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -131,6 +131,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4SBIUECMLNC572P23DDOKJNKPJVX26SP/",
"source": "security@golang.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQGNAXK3YBPMUP3J4TECIRDHFGW37522/",
"source": "security@golang.org",
@ -145,6 +149,10 @@
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3XC47AUW5J5M2ULJX7WCCL3B2ETLMT/",
"source": "security@golang.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QBKBAZBIOXZV5QCFHZNSVXULR32XJCYD/",
"source": "security@golang.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0845",
"sourceIdentifier": "security@hashicorp.com",
"published": "2023-03-09T16:15:09.657",
"lastModified": "2023-08-30T04:15:11.180",
"lastModified": "2023-09-05T03:15:09.740",
"vulnStatus": "Modified",
"descriptions": [
{
@ -103,6 +103,10 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/",
"source": "security@hashicorp.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/",
"source": "security@hashicorp.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25173",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-02-16T15:15:20.057",
"lastModified": "2023-08-30T04:15:11.563",
"lastModified": "2023-09-05T03:15:10.060",
"vulnStatus": "Modified",
"descriptions": [
{
@ -159,6 +159,10 @@
"Not Applicable"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/",
"source": "security-advisories@github.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26054",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-03-06T19:15:10.390",
"lastModified": "2023-08-30T04:15:11.730",
"lastModified": "2023-09-05T03:15:10.427",
"vulnStatus": "Modified",
"descriptions": [
{
@ -111,6 +111,10 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/",
"source": "security-advisories@github.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28840",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-04T22:15:07.853",
"lastModified": "2023-08-30T04:15:11.863",
"lastModified": "2023-09-05T03:15:10.760",
"vulnStatus": "Modified",
"descriptions": [
{
@ -164,6 +164,10 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/",
"source": "security-advisories@github.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28841",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-04T22:15:07.937",
"lastModified": "2023-08-30T04:15:12.013",
"lastModified": "2023-09-05T03:15:10.997",
"vulnStatus": "Modified",
"descriptions": [
{
@ -171,6 +171,10 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/",
"source": "security-advisories@github.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28842",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-04T22:15:08.007",
"lastModified": "2023-08-30T04:15:12.137",
"lastModified": "2023-09-05T03:15:11.240",
"vulnStatus": "Modified",
"descriptions": [
{
@ -143,6 +143,10 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/",
"source": "security-advisories@github.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-36328",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-01T16:15:08.177",
"lastModified": "2023-09-01T21:15:30.513",
"lastModified": "2023-09-05T03:15:11.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -15,6 +15,10 @@
{
"url": "https://github.com/libtom/libtommath/pull/546",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3H2PFUTBKQUDSOJXQQS7LUSZQWT3JTW2/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3899",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-23T11:15:07.573",
"lastModified": "2023-09-01T06:15:44.377",
"lastModified": "2023-09-05T03:15:11.630",
"vulnStatus": "Modified",
"descriptions": [
{
@ -466,6 +466,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJHKSBBZRDFOBNDU35FUKMYQIQYT6UJQ/",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDIHGNLS3TZVX7X2F735OKI4KXPY4AH6/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40587",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-25T21:15:09.290",
"lastModified": "2023-08-31T18:51:48.433",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-05T03:15:11.787",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -56,7 +56,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
@ -66,7 +66,7 @@
]
},
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
@ -125,6 +125,10 @@
"tags": [
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQIPHQTM3XE5NIEXCTQFV2J2RK2YUSMT/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-4636",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-09-05T03:15:12.293",
"lastModified": "2023-09-05T03:15:12.293",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WordPress File Sharing Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 2.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/xsn1210/vul2/blob/main/xss%5BWordPressFile%5D%20.md",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/2961909/user-private-files",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1df04293-87e9-4ab4-975d-54d36a993ab0?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-05T02:00:25.810102+00:00
2023-09-05T04:00:25.475382+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-05T01:15:07.920000+00:00
2023-09-05T03:15:12.293000+00:00
```
### Last Data Feed Release
@ -29,25 +29,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
224137
224138
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `1`
* [CVE-2022-43903](CVE-2022/CVE-2022-439xx/CVE-2022-43903.json) (`2023-09-05T00:15:07.347`)
* [CVE-2023-32338](CVE-2023/CVE-2023-323xx/CVE-2023-32338.json) (`2023-09-05T00:15:07.750`)
* [CVE-2023-35892](CVE-2023/CVE-2023-358xx/CVE-2023-35892.json) (`2023-09-05T00:15:07.833`)
* [CVE-2023-22870](CVE-2023/CVE-2023-228xx/CVE-2023-22870.json) (`2023-09-05T01:15:07.360`)
* [CVE-2023-29261](CVE-2023/CVE-2023-292xx/CVE-2023-29261.json) (`2023-09-05T01:15:07.783`)
* [CVE-2023-35906](CVE-2023/CVE-2023-359xx/CVE-2023-35906.json) (`2023-09-05T01:15:07.920`)
* [CVE-2023-4636](CVE-2023/CVE-2023-46xx/CVE-2023-4636.json) (`2023-09-05T03:15:12.293`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `14`
* [CVE-2020-21722](CVE-2020/CVE-2020-217xx/CVE-2020-21722.json) (`2023-09-05T03:15:07.637`)
* [CVE-2021-41803](CVE-2021/CVE-2021-418xx/CVE-2021-41803.json) (`2023-09-05T03:15:08.497`)
* [CVE-2022-3064](CVE-2022/CVE-2022-30xx/CVE-2022-3064.json) (`2023-09-05T03:15:08.797`)
* [CVE-2022-40716](CVE-2022/CVE-2022-407xx/CVE-2022-40716.json) (`2023-09-05T03:15:09.110`)
* [CVE-2022-41717](CVE-2022/CVE-2022-417xx/CVE-2022-41717.json) (`2023-09-05T03:15:09.377`)
* [CVE-2023-0845](CVE-2023/CVE-2023-08xx/CVE-2023-0845.json) (`2023-09-05T03:15:09.740`)
* [CVE-2023-25173](CVE-2023/CVE-2023-251xx/CVE-2023-25173.json) (`2023-09-05T03:15:10.060`)
* [CVE-2023-26054](CVE-2023/CVE-2023-260xx/CVE-2023-26054.json) (`2023-09-05T03:15:10.427`)
* [CVE-2023-28840](CVE-2023/CVE-2023-288xx/CVE-2023-28840.json) (`2023-09-05T03:15:10.760`)
* [CVE-2023-28841](CVE-2023/CVE-2023-288xx/CVE-2023-28841.json) (`2023-09-05T03:15:10.997`)
* [CVE-2023-28842](CVE-2023/CVE-2023-288xx/CVE-2023-28842.json) (`2023-09-05T03:15:11.240`)
* [CVE-2023-36328](CVE-2023/CVE-2023-363xx/CVE-2023-36328.json) (`2023-09-05T03:15:11.540`)
* [CVE-2023-3899](CVE-2023/CVE-2023-38xx/CVE-2023-3899.json) (`2023-09-05T03:15:11.630`)
* [CVE-2023-40587](CVE-2023/CVE-2023-405xx/CVE-2023-40587.json) (`2023-09-05T03:15:11.787`)
## Download and Usage