Auto-Update: 2023-08-28T14:00:30.677955+00:00

This commit is contained in:
cad-safe-bot 2023-08-28 14:00:34 +00:00
parent 7ab84d5d64
commit 66be59f10c
42 changed files with 1294 additions and 51 deletions

View File

@ -0,0 +1,96 @@
{
"id": "CVE-2017-20186",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-28T13:15:08.937",
"lastModified": "2023-08-28T13:15:08.937",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in nikooo777 ckSurf up to 1.19.2. It has been declared as problematic. This vulnerability affects the function SpecListMenuDead of the file csgo/addons/sourcemod/scripting/ckSurf/misc.sp of the component Spectator List Name Handler. The manipulation of the argument cleanName leads to denial of service. Upgrading to version 1.21.0 is able to address this issue. The name of the patch is fd6318d99083a06363091441a0614bd2f21068e6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-238156. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:P",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.7
},
"baseSeverity": "LOW",
"exploitabilityScore": 5.1,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-404"
}
]
}
],
"references": [
{
"url": "https://forums.alliedmods.net/showthread.php?t=297179",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/nikooo777/ckSurf/commit/fd6318d99083a06363091441a0614bd2f21068e6",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/nikooo777/ckSurf/releases/tag/1.21.0",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.238156",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.238156",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2018-25089",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-28T13:15:09.100",
"lastModified": "2023-08-28T13:15:09.100",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in glb Meetup Tag Extension 0.1 on MediaWiki. It has been rated as problematic. This issue affects some unknown processing of the component Link Attribute Handler. The manipulation leads to use of web link to untrusted target with window.opener access. Upgrading to version 0.2 is able to address this issue. The identifier of the patch is 850c726d6bbfe0bf270801fbb92a30babea4155c. It is recommended to upgrade the affected component. The identifier VDB-238157 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 2.7
},
"baseSeverity": "LOW",
"exploitabilityScore": 5.1,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1022"
}
]
}
],
"references": [
{
"url": "https://github.com/glb/mediawiki-tag-extension-meetup/commit/850c726d6bbfe0bf270801fbb92a30babea4155c",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/glb/mediawiki-tag-extension-meetup/releases/tag/v0.2",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.238157",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.238157",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2022-46783",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T12:15:08.817",
"lastModified": "2023-08-28T13:07:56.260",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Stormshield SSL VPN Client before 3.2.0. If multiple address books are used, an attacker may be able to access the other encrypted address book."
}
],
"metrics": {},
"references": [
{
"url": "https://advisories.stormshield.eu/",
"source": "cve@mitre.org"
},
{
"url": "https://advisories.stormshield.eu/2022-029/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20873",
"sourceIdentifier": "security@vmware.com",
"published": "2023-04-20T21:15:08.717",
"lastModified": "2023-08-02T16:19:48.533",
"vulnStatus": "Analyzed",
"lastModified": "2023-08-28T13:15:09.267",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -93,6 +93,10 @@
"Third Party Advisory"
]
},
{
"url": "https://spring.io/blog/2023/05/18/spring-boot-2-5-15-and-2-6-15-available-now",
"source": "security@vmware.com"
},
{
"url": "https://spring.io/security/cve-2023-20873",
"source": "security@vmware.com",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-26095",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T12:15:08.940",
"lastModified": "2023-08-28T13:07:56.260",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "ASQ in Stormshield Network Security (SNS) 4.3.15 before 4.3.16 and 4.6.x before 4.6.3 allows a crash when analysing a crafted SIP packet."
}
],
"metrics": {},
"references": [
{
"url": "https://advisories.stormshield.eu/2023-007/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27604",
"sourceIdentifier": "security@apache.org",
"published": "2023-08-28T08:15:14.697",
"lastModified": "2023-08-28T08:15:14.697",
"vulnStatus": "Received",
"lastModified": "2023-08-28T13:07:56.260",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32575",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-25T11:15:08.177",
"lastModified": "2023-08-25T12:47:00.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-28T13:34:31.193",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:woocommerce:woocommerce:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.25",
"matchCriteriaId": "082E471E-1EE6-488C-847C-24A842DE7631"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/product-page-shipping-calculator-for-woocommerce/wordpress-product-page-shipping-calculator-for-woocommerce-plugin-1-3-25-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32595",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-25T11:15:08.333",
"lastModified": "2023-08-25T12:47:00.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-28T13:34:38.410",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palasthotel:sunny_search:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.2",
"matchCriteriaId": "E9562214-DF6F-46F2-A066-AD62F4E950ED"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/fast-search-powered-by-solr/wordpress-sunny-search-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32596",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-25T11:15:08.497",
"lastModified": "2023-08-25T12:47:00.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-28T13:34:46.660",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wolfgangertl:weebotlite:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.0",
"matchCriteriaId": "A5452D41-C576-4A0E-AC41-57ED7EDB073A"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/weebotlite/wordpress-weebotlite-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32598",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-25T12:15:07.880",
"lastModified": "2023-08-25T12:47:00.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-28T13:34:58.463",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:shooflysolutions:featured_image_pro_post_grid:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "5.14",
"matchCriteriaId": "F28A527B-C9E1-4359-9F08-4B909D7D59E2"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/featured-image-pro/wordpress-featured-image-pro-post-grid-plugin-5-14-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32603",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-25T12:15:08.323",
"lastModified": "2023-08-25T12:47:00.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-28T13:35:12.593",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rednao:smart_donations:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.0.12",
"matchCriteriaId": "1458929D-F542-48E5-B5E4-B2016077739A"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/smart-donations/wordpress-donations-made-easy-smart-donations-plugin-4-0-12-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32797",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-25T12:15:08.513",
"lastModified": "2023-08-25T12:47:00.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-28T13:35:21.060",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:i13websolution:video_carousel_slider_with_lightbox:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.22",
"matchCriteriaId": "E8582B4F-7ADE-471B-88E0-FC1D010B9940"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-responsive-video-gallery-with-lightbox/wordpress-video-carousel-slider-with-lightbox-plugin-1-0-22-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-34758",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T12:15:09.007",
"lastModified": "2023-08-28T13:07:56.260",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Sliver from v1.5.x to v1.5.39 has an improper cryptographic implementation, which allows attackers to execute a man-in-the-middle attack via intercepted and crafted responses."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/BishopFox/sliver/releases/tag/v1.5.40",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/advisories/GHSA-8jxm-xp43-qh3q",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/tangent65536/Slivjacker",
"source": "cve@mitre.org"
},
{
"url": "https://www.chtsecurity.com/news/04f41dcc-1851-463c-93bc-551323ad8091",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-36481",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T12:15:09.093",
"lastModified": "2023-08-28T13:07:56.260",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Samsung Exynos Mobile Processor and Wearable Processor 9810, 9610, 9820, 980, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, and W920. Improper handling of PPP length parameter inconsistency can cause an infinite loop."
}
],
"metrics": {},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38029",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2023-08-28T06:15:07.857",
"lastModified": "2023-08-28T06:15:07.857",
"vulnStatus": "Received",
"lastModified": "2023-08-28T13:07:56.260",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38030",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2023-08-28T07:15:09.513",
"lastModified": "2023-08-28T07:15:09.513",
"vulnStatus": "Received",
"lastModified": "2023-08-28T13:07:56.260",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-39742",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-25T14:15:09.763",
"lastModified": "2023-08-25T14:45:01.550",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-28T13:59:41.827",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:giflib_project:giflib:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "56EF3DF1-6D2B-45E4-A2BF-C27C34DA08C7"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://sourceforge.net/p/giflib/bugs/166/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40195",
"sourceIdentifier": "security@apache.org",
"published": "2023-08-28T08:15:14.797",
"lastModified": "2023-08-28T08:15:14.797",
"vulnStatus": "Received",
"lastModified": "2023-08-28T13:07:56.260",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40748",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:09.397",
"lastModified": "2023-08-28T13:15:09.397",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Food Delivery Script 3.0 has a SQL injection (SQLi) vulnerability in the \"q\" parameter of index.php."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/food-delivery-script/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40749",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:09.477",
"lastModified": "2023-08-28T13:15:09.477",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Food Delivery Script v3.0 is vulnerable to SQL Injection in the \"column\" parameter of index.php."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/food-delivery-script/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40750",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:09.557",
"lastModified": "2023-08-28T13:15:09.557",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a Cross Site Scripting (XSS) vulnerability in the \"action\" parameter of index.php in PHPJabbers Yacht Listing Script v1.0."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/yacht-listing-script/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40751",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:09.630",
"lastModified": "2023-08-28T13:15:09.630",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Fundraising Script v1.0 is vulnerable to Cross Site Scripting (XSS) via the \"action\" parameter of index.php."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/fundraising-script/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40752",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:09.707",
"lastModified": "2023-08-28T13:15:09.707",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a Cross Site Scripting (XSS) vulnerability in the \"action\" parameter of index.php in PHPJabbers Make an Offer Widget v1.0."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/make-an-offer-widget",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40753",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:09.797",
"lastModified": "2023-08-28T13:15:09.797",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a Cross Site Scripting (XSS) vulnerability in the message parameter of index.php in PHPJabbers Ticket Support Script v3.2."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/ticket-support-script",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40754",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:09.883",
"lastModified": "2023-08-28T13:15:09.883",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In PHPJabbers Car Rental Script 3.0, lack of verification when changing an email address and/or password (on the Profile Page) allows remote attackers to take over accounts."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/car-rental-script/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40755",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:09.953",
"lastModified": "2023-08-28T13:15:09.953",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a Cross Site Scripting (XSS) vulnerability in the \"theme\" parameter of preview.php in PHPJabbers Callback Widget v1.0."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/callback-widget/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40756",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:10.033",
"lastModified": "2023-08-28T13:15:10.033",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User enumeration is found in PHPJabbers Callback Widget v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/callback-widget/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40757",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:10.087",
"lastModified": "2023-08-28T13:15:10.087",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User enumeration is found in PHPJabbers Food Delivery Script v3.1. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/food-delivery-script/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40758",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:10.147",
"lastModified": "2023-08-28T13:15:10.147",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User enumeration is found in PHPJabbers Document Creator v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/document-creator/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40759",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:10.207",
"lastModified": "2023-08-28T13:15:10.207",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User enumeration is found in PHP Jabbers Restaurant Booking Script v3.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/restaurant-booking-system/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40760",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:10.267",
"lastModified": "2023-08-28T13:15:10.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User enumeration is found in PHP Jabbers Hotel Booking System v4.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/hotel-booking-system/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40761",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:10.327",
"lastModified": "2023-08-28T13:15:10.327",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User enumeration is found in PHPJabbers Yacht Listing Script v2.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/yacht-listing-script/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40762",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:10.387",
"lastModified": "2023-08-28T13:15:10.387",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User enumeration is found in PHPJabbers Fundraising Script v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/fundraising-script/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40763",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:10.467",
"lastModified": "2023-08-28T13:15:10.467",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User enumeration is found in PHPJabbers Taxi Booking Script v2.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/taxi-booking-script/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40764",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:10.533",
"lastModified": "2023-08-28T13:15:10.533",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User enumeration is found in PHP Jabbers Car Rental Script v3.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/car-rental-script/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40765",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:10.593",
"lastModified": "2023-08-28T13:15:10.593",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User enumeration is found in PHPJabbers Event Booking Calendar v4.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/event-booking-calendar/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40766",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:10.657",
"lastModified": "2023-08-28T13:15:10.657",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User enumeration is found in in PHPJabbers Ticket Support Script v3.2. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/ticket-support-script/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40767",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T13:15:10.713",
"lastModified": "2023-08-28T13:15:10.713",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User enumeration is found in in PHPJabbers Make an Offer Widget v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/make-an-offer-widget/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41248",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-08-25T13:15:07.547",
"lastModified": "2023-08-25T13:15:24.927",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-28T13:35:32.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@jetbrains.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.05.3",
"matchCriteriaId": "FB149BF8-BF95-4A5E-A298-4C0D27DF01F0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
"source": "security@jetbrains.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41249",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-08-25T13:15:07.700",
"lastModified": "2023-08-25T13:15:24.927",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-28T13:35:45.623",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security@jetbrains.com",
"type": "Secondary",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "security@jetbrains.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,12 +64,43 @@
"value": "CWE-79"
}
]
},
{
"source": "security@jetbrains.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.05.3",
"matchCriteriaId": "FB149BF8-BF95-4A5E-A298-4C0D27DF01F0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
"source": "security@jetbrains.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41250",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-08-25T13:15:07.780",
"lastModified": "2023-08-25T13:15:24.927",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-28T13:35:55.523",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security@jetbrains.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.05.3",
"matchCriteriaId": "FB149BF8-BF95-4A5E-A298-4C0D27DF01F0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
"source": "security@jetbrains.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-28T10:00:32.685210+00:00
2023-08-28T14:00:30.677955+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-28T09:15:08.850000+00:00
2023-08-28T13:59:41.827000+00:00
```
### Last Data Feed Release
@ -29,22 +29,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
223531
223557
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `26`
* [CVE-2023-27604](CVE-2023/CVE-2023-276xx/CVE-2023-27604.json) (`2023-08-28T08:15:14.697`)
* [CVE-2023-40195](CVE-2023/CVE-2023-401xx/CVE-2023-40195.json) (`2023-08-28T08:15:14.797`)
* [CVE-2018-25089](CVE-2018/CVE-2018-250xx/CVE-2018-25089.json) (`2023-08-28T13:15:09.100`)
* [CVE-2022-46783](CVE-2022/CVE-2022-467xx/CVE-2022-46783.json) (`2023-08-28T12:15:08.817`)
* [CVE-2023-26095](CVE-2023/CVE-2023-260xx/CVE-2023-26095.json) (`2023-08-28T12:15:08.940`)
* [CVE-2023-34758](CVE-2023/CVE-2023-347xx/CVE-2023-34758.json) (`2023-08-28T12:15:09.007`)
* [CVE-2023-36481](CVE-2023/CVE-2023-364xx/CVE-2023-36481.json) (`2023-08-28T12:15:09.093`)
* [CVE-2023-40748](CVE-2023/CVE-2023-407xx/CVE-2023-40748.json) (`2023-08-28T13:15:09.397`)
* [CVE-2023-40749](CVE-2023/CVE-2023-407xx/CVE-2023-40749.json) (`2023-08-28T13:15:09.477`)
* [CVE-2023-40750](CVE-2023/CVE-2023-407xx/CVE-2023-40750.json) (`2023-08-28T13:15:09.557`)
* [CVE-2023-40751](CVE-2023/CVE-2023-407xx/CVE-2023-40751.json) (`2023-08-28T13:15:09.630`)
* [CVE-2023-40752](CVE-2023/CVE-2023-407xx/CVE-2023-40752.json) (`2023-08-28T13:15:09.707`)
* [CVE-2023-40753](CVE-2023/CVE-2023-407xx/CVE-2023-40753.json) (`2023-08-28T13:15:09.797`)
* [CVE-2023-40754](CVE-2023/CVE-2023-407xx/CVE-2023-40754.json) (`2023-08-28T13:15:09.883`)
* [CVE-2023-40755](CVE-2023/CVE-2023-407xx/CVE-2023-40755.json) (`2023-08-28T13:15:09.953`)
* [CVE-2023-40756](CVE-2023/CVE-2023-407xx/CVE-2023-40756.json) (`2023-08-28T13:15:10.033`)
* [CVE-2023-40757](CVE-2023/CVE-2023-407xx/CVE-2023-40757.json) (`2023-08-28T13:15:10.087`)
* [CVE-2023-40758](CVE-2023/CVE-2023-407xx/CVE-2023-40758.json) (`2023-08-28T13:15:10.147`)
* [CVE-2023-40759](CVE-2023/CVE-2023-407xx/CVE-2023-40759.json) (`2023-08-28T13:15:10.207`)
* [CVE-2023-40760](CVE-2023/CVE-2023-407xx/CVE-2023-40760.json) (`2023-08-28T13:15:10.267`)
* [CVE-2023-40761](CVE-2023/CVE-2023-407xx/CVE-2023-40761.json) (`2023-08-28T13:15:10.327`)
* [CVE-2023-40762](CVE-2023/CVE-2023-407xx/CVE-2023-40762.json) (`2023-08-28T13:15:10.387`)
* [CVE-2023-40763](CVE-2023/CVE-2023-407xx/CVE-2023-40763.json) (`2023-08-28T13:15:10.467`)
* [CVE-2023-40764](CVE-2023/CVE-2023-407xx/CVE-2023-40764.json) (`2023-08-28T13:15:10.533`)
* [CVE-2023-40765](CVE-2023/CVE-2023-407xx/CVE-2023-40765.json) (`2023-08-28T13:15:10.593`)
* [CVE-2023-40766](CVE-2023/CVE-2023-407xx/CVE-2023-40766.json) (`2023-08-28T13:15:10.657`)
* [CVE-2023-40767](CVE-2023/CVE-2023-407xx/CVE-2023-40767.json) (`2023-08-28T13:15:10.713`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `15`
* [CVE-2020-19909](CVE-2020/CVE-2020-199xx/CVE-2020-19909.json) (`2023-08-28T09:15:08.850`)
* [CVE-2023-38029](CVE-2023/CVE-2023-380xx/CVE-2023-38029.json) (`2023-08-28T13:07:56.260`)
* [CVE-2023-38030](CVE-2023/CVE-2023-380xx/CVE-2023-38030.json) (`2023-08-28T13:07:56.260`)
* [CVE-2023-27604](CVE-2023/CVE-2023-276xx/CVE-2023-27604.json) (`2023-08-28T13:07:56.260`)
* [CVE-2023-40195](CVE-2023/CVE-2023-401xx/CVE-2023-40195.json) (`2023-08-28T13:07:56.260`)
* [CVE-2023-20873](CVE-2023/CVE-2023-208xx/CVE-2023-20873.json) (`2023-08-28T13:15:09.267`)
* [CVE-2023-32575](CVE-2023/CVE-2023-325xx/CVE-2023-32575.json) (`2023-08-28T13:34:31.193`)
* [CVE-2023-32595](CVE-2023/CVE-2023-325xx/CVE-2023-32595.json) (`2023-08-28T13:34:38.410`)
* [CVE-2023-32596](CVE-2023/CVE-2023-325xx/CVE-2023-32596.json) (`2023-08-28T13:34:46.660`)
* [CVE-2023-32598](CVE-2023/CVE-2023-325xx/CVE-2023-32598.json) (`2023-08-28T13:34:58.463`)
* [CVE-2023-32603](CVE-2023/CVE-2023-326xx/CVE-2023-32603.json) (`2023-08-28T13:35:12.593`)
* [CVE-2023-32797](CVE-2023/CVE-2023-327xx/CVE-2023-32797.json) (`2023-08-28T13:35:21.060`)
* [CVE-2023-41248](CVE-2023/CVE-2023-412xx/CVE-2023-41248.json) (`2023-08-28T13:35:32.633`)
* [CVE-2023-41249](CVE-2023/CVE-2023-412xx/CVE-2023-41249.json) (`2023-08-28T13:35:45.623`)
* [CVE-2023-41250](CVE-2023/CVE-2023-412xx/CVE-2023-41250.json) (`2023-08-28T13:35:55.523`)
* [CVE-2023-39742](CVE-2023/CVE-2023-397xx/CVE-2023-39742.json) (`2023-08-28T13:59:41.827`)
## Download and Usage