From 66be59f10cd56fa4e0d0e0a12fef6cd5407f0865 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 28 Aug 2023 14:00:34 +0000 Subject: [PATCH] Auto-Update: 2023-08-28T14:00:30.677955+00:00 --- CVE-2017/CVE-2017-201xx/CVE-2017-20186.json | 96 +++++++++++++++++++++ CVE-2018/CVE-2018-250xx/CVE-2018-25089.json | 92 ++++++++++++++++++++ CVE-2022/CVE-2022-467xx/CVE-2022-46783.json | 24 ++++++ CVE-2023/CVE-2023-208xx/CVE-2023-20873.json | 8 +- CVE-2023/CVE-2023-260xx/CVE-2023-26095.json | 20 +++++ CVE-2023/CVE-2023-276xx/CVE-2023-27604.json | 4 +- CVE-2023/CVE-2023-325xx/CVE-2023-32575.json | 47 +++++++++- CVE-2023/CVE-2023-325xx/CVE-2023-32595.json | 47 +++++++++- CVE-2023/CVE-2023-325xx/CVE-2023-32596.json | 47 +++++++++- CVE-2023/CVE-2023-325xx/CVE-2023-32598.json | 47 +++++++++- CVE-2023/CVE-2023-326xx/CVE-2023-32603.json | 47 +++++++++- CVE-2023/CVE-2023-327xx/CVE-2023-32797.json | 47 +++++++++- CVE-2023/CVE-2023-347xx/CVE-2023-34758.json | 32 +++++++ CVE-2023/CVE-2023-364xx/CVE-2023-36481.json | 20 +++++ CVE-2023/CVE-2023-380xx/CVE-2023-38029.json | 4 +- CVE-2023/CVE-2023-380xx/CVE-2023-38030.json | 4 +- CVE-2023/CVE-2023-397xx/CVE-2023-39742.json | 69 +++++++++++++-- CVE-2023/CVE-2023-401xx/CVE-2023-40195.json | 4 +- CVE-2023/CVE-2023-407xx/CVE-2023-40748.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40749.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40750.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40751.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40752.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40753.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40754.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40755.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40756.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40757.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40758.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40759.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40760.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40761.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40762.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40763.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40764.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40765.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40766.json | 24 ++++++ CVE-2023/CVE-2023-407xx/CVE-2023-40767.json | 24 ++++++ CVE-2023/CVE-2023-412xx/CVE-2023-41248.json | 47 +++++++++- CVE-2023/CVE-2023-412xx/CVE-2023-41249.json | 59 ++++++++++++- CVE-2023/CVE-2023-412xx/CVE-2023-41250.json | 47 +++++++++- README.md | 53 ++++++++++-- 42 files changed, 1294 insertions(+), 51 deletions(-) create mode 100644 CVE-2017/CVE-2017-201xx/CVE-2017-20186.json create mode 100644 CVE-2018/CVE-2018-250xx/CVE-2018-25089.json create mode 100644 CVE-2022/CVE-2022-467xx/CVE-2022-46783.json create mode 100644 CVE-2023/CVE-2023-260xx/CVE-2023-26095.json create mode 100644 CVE-2023/CVE-2023-347xx/CVE-2023-34758.json create mode 100644 CVE-2023/CVE-2023-364xx/CVE-2023-36481.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40748.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40749.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40750.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40751.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40752.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40753.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40754.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40755.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40756.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40757.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40758.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40759.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40760.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40761.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40762.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40763.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40764.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40765.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40766.json create mode 100644 CVE-2023/CVE-2023-407xx/CVE-2023-40767.json diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20186.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20186.json new file mode 100644 index 00000000000..41df7b5cfa3 --- /dev/null +++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20186.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2017-20186", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-08-28T13:15:08.937", + "lastModified": "2023-08-28T13:15:08.937", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in nikooo777 ckSurf up to 1.19.2. It has been declared as problematic. This vulnerability affects the function SpecListMenuDead of the file csgo/addons/sourcemod/scripting/ckSurf/misc.sp of the component Spectator List Name Handler. The manipulation of the argument cleanName leads to denial of service. Upgrading to version 1.21.0 is able to address this issue. The name of the patch is fd6318d99083a06363091441a0614bd2f21068e6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-238156. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL", + "baseScore": 2.7 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 5.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "references": [ + { + "url": "https://forums.alliedmods.net/showthread.php?t=297179", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/nikooo777/ckSurf/commit/fd6318d99083a06363091441a0614bd2f21068e6", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/nikooo777/ckSurf/releases/tag/1.21.0", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.238156", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.238156", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25089.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25089.json new file mode 100644 index 00000000000..e1c5505409a --- /dev/null +++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25089.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2018-25089", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-08-28T13:15:09.100", + "lastModified": "2023-08-28T13:15:09.100", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in glb Meetup Tag Extension 0.1 on MediaWiki. It has been rated as problematic. This issue affects some unknown processing of the component Link Attribute Handler. The manipulation leads to use of web link to untrusted target with window.opener access. Upgrading to version 0.2 is able to address this issue. The identifier of the patch is 850c726d6bbfe0bf270801fbb92a30babea4155c. It is recommended to upgrade the affected component. The identifier VDB-238157 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 2.7 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 5.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1022" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/glb/mediawiki-tag-extension-meetup/commit/850c726d6bbfe0bf270801fbb92a30babea4155c", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/glb/mediawiki-tag-extension-meetup/releases/tag/v0.2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.238157", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.238157", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-467xx/CVE-2022-46783.json b/CVE-2022/CVE-2022-467xx/CVE-2022-46783.json new file mode 100644 index 00000000000..3a203466339 --- /dev/null +++ b/CVE-2022/CVE-2022-467xx/CVE-2022-46783.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-46783", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T12:15:08.817", + "lastModified": "2023-08-28T13:07:56.260", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Stormshield SSL VPN Client before 3.2.0. If multiple address books are used, an attacker may be able to access the other encrypted address book." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://advisories.stormshield.eu/", + "source": "cve@mitre.org" + }, + { + "url": "https://advisories.stormshield.eu/2022-029/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20873.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20873.json index d7961dd11ac..f392cb8d0cc 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20873.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20873.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20873", "sourceIdentifier": "security@vmware.com", "published": "2023-04-20T21:15:08.717", - "lastModified": "2023-08-02T16:19:48.533", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-28T13:15:09.267", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -93,6 +93,10 @@ "Third Party Advisory" ] }, + { + "url": "https://spring.io/blog/2023/05/18/spring-boot-2-5-15-and-2-6-15-available-now", + "source": "security@vmware.com" + }, { "url": "https://spring.io/security/cve-2023-20873", "source": "security@vmware.com", diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26095.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26095.json new file mode 100644 index 00000000000..ad846cee0ac --- /dev/null +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26095.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-26095", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T12:15:08.940", + "lastModified": "2023-08-28T13:07:56.260", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "ASQ in Stormshield Network Security (SNS) 4.3.15 before 4.3.16 and 4.6.x before 4.6.3 allows a crash when analysing a crafted SIP packet." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://advisories.stormshield.eu/2023-007/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27604.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27604.json index 25b0f21e25c..d6e4d3456d2 100644 --- a/CVE-2023/CVE-2023-276xx/CVE-2023-27604.json +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27604.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27604", "sourceIdentifier": "security@apache.org", "published": "2023-08-28T08:15:14.697", - "lastModified": "2023-08-28T08:15:14.697", - "vulnStatus": "Received", + "lastModified": "2023-08-28T13:07:56.260", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32575.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32575.json index b0eaa80f5a9..f9617417cb8 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32575.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32575.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32575", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-25T11:15:08.177", - "lastModified": "2023-08-25T12:47:00.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-28T13:34:31.193", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:woocommerce:woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.25", + "matchCriteriaId": "082E471E-1EE6-488C-847C-24A842DE7631" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/product-page-shipping-calculator-for-woocommerce/wordpress-product-page-shipping-calculator-for-woocommerce-plugin-1-3-25-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32595.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32595.json index 26a05586446..429ef1ecb8f 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32595.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32595.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32595", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-25T11:15:08.333", - "lastModified": "2023-08-25T12:47:00.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-28T13:34:38.410", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:palasthotel:sunny_search:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.2", + "matchCriteriaId": "E9562214-DF6F-46F2-A066-AD62F4E950ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/fast-search-powered-by-solr/wordpress-sunny-search-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32596.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32596.json index e2cc461c598..5fc553a48d7 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32596.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32596.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32596", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-25T11:15:08.497", - "lastModified": "2023-08-25T12:47:00.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-28T13:34:46.660", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wolfgangertl:weebotlite:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.0", + "matchCriteriaId": "A5452D41-C576-4A0E-AC41-57ED7EDB073A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/weebotlite/wordpress-weebotlite-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32598.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32598.json index e34b9717ce6..1f935035314 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32598.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32598.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32598", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-25T12:15:07.880", - "lastModified": "2023-08-25T12:47:00.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-28T13:34:58.463", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shooflysolutions:featured_image_pro_post_grid:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "5.14", + "matchCriteriaId": "F28A527B-C9E1-4359-9F08-4B909D7D59E2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/featured-image-pro/wordpress-featured-image-pro-post-grid-plugin-5-14-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32603.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32603.json index be930cd8f58..a32bbc4211b 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32603.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32603.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32603", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-25T12:15:08.323", - "lastModified": "2023-08-25T12:47:00.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-28T13:35:12.593", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rednao:smart_donations:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.0.12", + "matchCriteriaId": "1458929D-F542-48E5-B5E4-B2016077739A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/smart-donations/wordpress-donations-made-easy-smart-donations-plugin-4-0-12-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32797.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32797.json index 968ab7e3370..1be8a6ed439 100644 --- a/CVE-2023/CVE-2023-327xx/CVE-2023-32797.json +++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32797.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32797", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-25T12:15:08.513", - "lastModified": "2023-08-25T12:47:00.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-28T13:35:21.060", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:i13websolution:video_carousel_slider_with_lightbox:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.22", + "matchCriteriaId": "E8582B4F-7ADE-471B-88E0-FC1D010B9940" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-responsive-video-gallery-with-lightbox/wordpress-video-carousel-slider-with-lightbox-plugin-1-0-22-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-347xx/CVE-2023-34758.json b/CVE-2023/CVE-2023-347xx/CVE-2023-34758.json new file mode 100644 index 00000000000..acc54cf4a08 --- /dev/null +++ b/CVE-2023/CVE-2023-347xx/CVE-2023-34758.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-34758", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T12:15:09.007", + "lastModified": "2023-08-28T13:07:56.260", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Sliver from v1.5.x to v1.5.39 has an improper cryptographic implementation, which allows attackers to execute a man-in-the-middle attack via intercepted and crafted responses." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BishopFox/sliver/releases/tag/v1.5.40", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/advisories/GHSA-8jxm-xp43-qh3q", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/tangent65536/Slivjacker", + "source": "cve@mitre.org" + }, + { + "url": "https://www.chtsecurity.com/news/04f41dcc-1851-463c-93bc-551323ad8091", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36481.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36481.json new file mode 100644 index 00000000000..ba5231cb15f --- /dev/null +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36481.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-36481", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T12:15:09.093", + "lastModified": "2023-08-28T13:07:56.260", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Samsung Exynos Mobile Processor and Wearable Processor 9810, 9610, 9820, 980, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, and W920. Improper handling of PPP length parameter inconsistency can cause an infinite loop." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38029.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38029.json index 7b3d933e184..7cfa449aaf3 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38029.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38029.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38029", "sourceIdentifier": "twcert@cert.org.tw", "published": "2023-08-28T06:15:07.857", - "lastModified": "2023-08-28T06:15:07.857", - "vulnStatus": "Received", + "lastModified": "2023-08-28T13:07:56.260", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38030.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38030.json index 53ddb11a98e..8774613aea0 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38030.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38030.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38030", "sourceIdentifier": "twcert@cert.org.tw", "published": "2023-08-28T07:15:09.513", - "lastModified": "2023-08-28T07:15:09.513", - "vulnStatus": "Received", + "lastModified": "2023-08-28T13:07:56.260", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-397xx/CVE-2023-39742.json b/CVE-2023/CVE-2023-397xx/CVE-2023-39742.json index 1afa95747ee..92969c84e1d 100644 --- a/CVE-2023/CVE-2023-397xx/CVE-2023-39742.json +++ b/CVE-2023/CVE-2023-397xx/CVE-2023-39742.json @@ -2,23 +2,82 @@ "id": "CVE-2023-39742", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-25T14:15:09.763", - "lastModified": "2023-08-25T14:45:01.550", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-28T13:59:41.827", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:giflib_project:giflib:5.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "56EF3DF1-6D2B-45E4-A2BF-C27C34DA08C7" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://sourceforge.net/p/giflib/bugs/166/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40195.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40195.json index 85d9c45d5d9..58a5f965c57 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40195.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40195.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40195", "sourceIdentifier": "security@apache.org", "published": "2023-08-28T08:15:14.797", - "lastModified": "2023-08-28T08:15:14.797", - "vulnStatus": "Received", + "lastModified": "2023-08-28T13:07:56.260", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40748.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40748.json new file mode 100644 index 00000000000..463a6821e4b --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40748.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40748", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:09.397", + "lastModified": "2023-08-28T13:15:09.397", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Food Delivery Script 3.0 has a SQL injection (SQLi) vulnerability in the \"q\" parameter of index.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/food-delivery-script/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40749.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40749.json new file mode 100644 index 00000000000..8ed6efdb69a --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40749.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40749", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:09.477", + "lastModified": "2023-08-28T13:15:09.477", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Food Delivery Script v3.0 is vulnerable to SQL Injection in the \"column\" parameter of index.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/food-delivery-script/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40750.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40750.json new file mode 100644 index 00000000000..c0909ab5e1c --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40750.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40750", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:09.557", + "lastModified": "2023-08-28T13:15:09.557", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "There is a Cross Site Scripting (XSS) vulnerability in the \"action\" parameter of index.php in PHPJabbers Yacht Listing Script v1.0." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/yacht-listing-script/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40751.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40751.json new file mode 100644 index 00000000000..ca2f6a271a3 --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40751.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40751", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:09.630", + "lastModified": "2023-08-28T13:15:09.630", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Fundraising Script v1.0 is vulnerable to Cross Site Scripting (XSS) via the \"action\" parameter of index.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/fundraising-script/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40752.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40752.json new file mode 100644 index 00000000000..0ca2894e29c --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40752.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40752", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:09.707", + "lastModified": "2023-08-28T13:15:09.707", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "There is a Cross Site Scripting (XSS) vulnerability in the \"action\" parameter of index.php in PHPJabbers Make an Offer Widget v1.0." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/make-an-offer-widget", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40753.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40753.json new file mode 100644 index 00000000000..5862afcc0f3 --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40753.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40753", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:09.797", + "lastModified": "2023-08-28T13:15:09.797", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "There is a Cross Site Scripting (XSS) vulnerability in the message parameter of index.php in PHPJabbers Ticket Support Script v3.2." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/ticket-support-script", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40754.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40754.json new file mode 100644 index 00000000000..80d1b67d5e7 --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40754.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40754", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:09.883", + "lastModified": "2023-08-28T13:15:09.883", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In PHPJabbers Car Rental Script 3.0, lack of verification when changing an email address and/or password (on the Profile Page) allows remote attackers to take over accounts." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/car-rental-script/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40755.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40755.json new file mode 100644 index 00000000000..d9a0c4af0cd --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40755.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40755", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:09.953", + "lastModified": "2023-08-28T13:15:09.953", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "There is a Cross Site Scripting (XSS) vulnerability in the \"theme\" parameter of preview.php in PHPJabbers Callback Widget v1.0." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/callback-widget/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40756.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40756.json new file mode 100644 index 00000000000..79436dc07e0 --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40756.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40756", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:10.033", + "lastModified": "2023-08-28T13:15:10.033", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "User enumeration is found in PHPJabbers Callback Widget v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/callback-widget/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40757.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40757.json new file mode 100644 index 00000000000..8a07b1234a4 --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40757.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40757", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:10.087", + "lastModified": "2023-08-28T13:15:10.087", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "User enumeration is found in PHPJabbers Food Delivery Script v3.1. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/food-delivery-script/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40758.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40758.json new file mode 100644 index 00000000000..59b05918623 --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40758.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40758", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:10.147", + "lastModified": "2023-08-28T13:15:10.147", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "User enumeration is found in PHPJabbers Document Creator v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/document-creator/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40759.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40759.json new file mode 100644 index 00000000000..879b8ce5d5b --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40759.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40759", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:10.207", + "lastModified": "2023-08-28T13:15:10.207", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "User enumeration is found in PHP Jabbers Restaurant Booking Script v3.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/restaurant-booking-system/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40760.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40760.json new file mode 100644 index 00000000000..d676039d2ec --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40760.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40760", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:10.267", + "lastModified": "2023-08-28T13:15:10.267", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "User enumeration is found in PHP Jabbers Hotel Booking System v4.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/hotel-booking-system/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40761.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40761.json new file mode 100644 index 00000000000..ff3dc8b464a --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40761.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40761", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:10.327", + "lastModified": "2023-08-28T13:15:10.327", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "User enumeration is found in PHPJabbers Yacht Listing Script v2.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/yacht-listing-script/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40762.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40762.json new file mode 100644 index 00000000000..2dc1b2d0ba4 --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40762.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40762", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:10.387", + "lastModified": "2023-08-28T13:15:10.387", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "User enumeration is found in PHPJabbers Fundraising Script v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/fundraising-script/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40763.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40763.json new file mode 100644 index 00000000000..61ccff54b2c --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40763.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40763", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:10.467", + "lastModified": "2023-08-28T13:15:10.467", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "User enumeration is found in PHPJabbers Taxi Booking Script v2.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/taxi-booking-script/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40764.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40764.json new file mode 100644 index 00000000000..2b6f478bbf3 --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40764.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40764", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:10.533", + "lastModified": "2023-08-28T13:15:10.533", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "User enumeration is found in PHP Jabbers Car Rental Script v3.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/car-rental-script/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40765.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40765.json new file mode 100644 index 00000000000..e1ff4298c90 --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40765.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40765", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:10.593", + "lastModified": "2023-08-28T13:15:10.593", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "User enumeration is found in PHPJabbers Event Booking Calendar v4.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/event-booking-calendar/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40766.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40766.json new file mode 100644 index 00000000000..82b52ad4b76 --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40766.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40766", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:10.657", + "lastModified": "2023-08-28T13:15:10.657", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "User enumeration is found in in PHPJabbers Ticket Support Script v3.2. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/ticket-support-script/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40767.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40767.json new file mode 100644 index 00000000000..311cdf2e4c2 --- /dev/null +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40767.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40767", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-28T13:15:10.713", + "lastModified": "2023-08-28T13:15:10.713", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "User enumeration is found in in PHPJabbers Make an Offer Widget v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/make-an-offer-widget/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41248.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41248.json index 84327324992..8bc206fa17c 100644 --- a/CVE-2023/CVE-2023-412xx/CVE-2023-41248.json +++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41248.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41248", "sourceIdentifier": "security@jetbrains.com", "published": "2023-08-25T13:15:07.547", - "lastModified": "2023-08-25T13:15:24.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-28T13:35:32.633", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security@jetbrains.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.05.3", + "matchCriteriaId": "FB149BF8-BF95-4A5E-A298-4C0D27DF01F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "security@jetbrains.com" + "source": "security@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41249.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41249.json index 5c0489ad39c..49232c35caf 100644 --- a/CVE-2023/CVE-2023-412xx/CVE-2023-41249.json +++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41249.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41249", "sourceIdentifier": "security@jetbrains.com", "published": "2023-08-25T13:15:07.700", - "lastModified": "2023-08-25T13:15:24.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-28T13:35:45.623", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security@jetbrains.com", "type": "Secondary", @@ -36,7 +56,7 @@ }, "weaknesses": [ { - "source": "security@jetbrains.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -44,12 +64,43 @@ "value": "CWE-79" } ] + }, + { + "source": "security@jetbrains.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.05.3", + "matchCriteriaId": "FB149BF8-BF95-4A5E-A298-4C0D27DF01F0" + } + ] + } + ] } ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "security@jetbrains.com" + "source": "security@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41250.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41250.json index d0ab727dd4c..729e151fce6 100644 --- a/CVE-2023/CVE-2023-412xx/CVE-2023-41250.json +++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41250.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41250", "sourceIdentifier": "security@jetbrains.com", "published": "2023-08-25T13:15:07.780", - "lastModified": "2023-08-25T13:15:24.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-28T13:35:55.523", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security@jetbrains.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.05.3", + "matchCriteriaId": "FB149BF8-BF95-4A5E-A298-4C0D27DF01F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "security@jetbrains.com" + "source": "security@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index c4c48837dac..185d3b0cd8e 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-28T10:00:32.685210+00:00 +2023-08-28T14:00:30.677955+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-28T09:15:08.850000+00:00 +2023-08-28T13:59:41.827000+00:00 ``` ### Last Data Feed Release @@ -29,22 +29,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -223531 +223557 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `26` -* [CVE-2023-27604](CVE-2023/CVE-2023-276xx/CVE-2023-27604.json) (`2023-08-28T08:15:14.697`) -* [CVE-2023-40195](CVE-2023/CVE-2023-401xx/CVE-2023-40195.json) (`2023-08-28T08:15:14.797`) +* [CVE-2018-25089](CVE-2018/CVE-2018-250xx/CVE-2018-25089.json) (`2023-08-28T13:15:09.100`) +* [CVE-2022-46783](CVE-2022/CVE-2022-467xx/CVE-2022-46783.json) (`2023-08-28T12:15:08.817`) +* [CVE-2023-26095](CVE-2023/CVE-2023-260xx/CVE-2023-26095.json) (`2023-08-28T12:15:08.940`) +* [CVE-2023-34758](CVE-2023/CVE-2023-347xx/CVE-2023-34758.json) (`2023-08-28T12:15:09.007`) +* [CVE-2023-36481](CVE-2023/CVE-2023-364xx/CVE-2023-36481.json) (`2023-08-28T12:15:09.093`) +* [CVE-2023-40748](CVE-2023/CVE-2023-407xx/CVE-2023-40748.json) (`2023-08-28T13:15:09.397`) +* [CVE-2023-40749](CVE-2023/CVE-2023-407xx/CVE-2023-40749.json) (`2023-08-28T13:15:09.477`) +* [CVE-2023-40750](CVE-2023/CVE-2023-407xx/CVE-2023-40750.json) (`2023-08-28T13:15:09.557`) +* [CVE-2023-40751](CVE-2023/CVE-2023-407xx/CVE-2023-40751.json) (`2023-08-28T13:15:09.630`) +* [CVE-2023-40752](CVE-2023/CVE-2023-407xx/CVE-2023-40752.json) (`2023-08-28T13:15:09.707`) +* [CVE-2023-40753](CVE-2023/CVE-2023-407xx/CVE-2023-40753.json) (`2023-08-28T13:15:09.797`) +* [CVE-2023-40754](CVE-2023/CVE-2023-407xx/CVE-2023-40754.json) (`2023-08-28T13:15:09.883`) +* [CVE-2023-40755](CVE-2023/CVE-2023-407xx/CVE-2023-40755.json) (`2023-08-28T13:15:09.953`) +* [CVE-2023-40756](CVE-2023/CVE-2023-407xx/CVE-2023-40756.json) (`2023-08-28T13:15:10.033`) +* [CVE-2023-40757](CVE-2023/CVE-2023-407xx/CVE-2023-40757.json) (`2023-08-28T13:15:10.087`) +* [CVE-2023-40758](CVE-2023/CVE-2023-407xx/CVE-2023-40758.json) (`2023-08-28T13:15:10.147`) +* [CVE-2023-40759](CVE-2023/CVE-2023-407xx/CVE-2023-40759.json) (`2023-08-28T13:15:10.207`) +* [CVE-2023-40760](CVE-2023/CVE-2023-407xx/CVE-2023-40760.json) (`2023-08-28T13:15:10.267`) +* [CVE-2023-40761](CVE-2023/CVE-2023-407xx/CVE-2023-40761.json) (`2023-08-28T13:15:10.327`) +* [CVE-2023-40762](CVE-2023/CVE-2023-407xx/CVE-2023-40762.json) (`2023-08-28T13:15:10.387`) +* [CVE-2023-40763](CVE-2023/CVE-2023-407xx/CVE-2023-40763.json) (`2023-08-28T13:15:10.467`) +* [CVE-2023-40764](CVE-2023/CVE-2023-407xx/CVE-2023-40764.json) (`2023-08-28T13:15:10.533`) +* [CVE-2023-40765](CVE-2023/CVE-2023-407xx/CVE-2023-40765.json) (`2023-08-28T13:15:10.593`) +* [CVE-2023-40766](CVE-2023/CVE-2023-407xx/CVE-2023-40766.json) (`2023-08-28T13:15:10.657`) +* [CVE-2023-40767](CVE-2023/CVE-2023-407xx/CVE-2023-40767.json) (`2023-08-28T13:15:10.713`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `15` -* [CVE-2020-19909](CVE-2020/CVE-2020-199xx/CVE-2020-19909.json) (`2023-08-28T09:15:08.850`) +* [CVE-2023-38029](CVE-2023/CVE-2023-380xx/CVE-2023-38029.json) (`2023-08-28T13:07:56.260`) +* [CVE-2023-38030](CVE-2023/CVE-2023-380xx/CVE-2023-38030.json) (`2023-08-28T13:07:56.260`) +* [CVE-2023-27604](CVE-2023/CVE-2023-276xx/CVE-2023-27604.json) (`2023-08-28T13:07:56.260`) +* [CVE-2023-40195](CVE-2023/CVE-2023-401xx/CVE-2023-40195.json) (`2023-08-28T13:07:56.260`) +* [CVE-2023-20873](CVE-2023/CVE-2023-208xx/CVE-2023-20873.json) (`2023-08-28T13:15:09.267`) +* [CVE-2023-32575](CVE-2023/CVE-2023-325xx/CVE-2023-32575.json) (`2023-08-28T13:34:31.193`) +* [CVE-2023-32595](CVE-2023/CVE-2023-325xx/CVE-2023-32595.json) (`2023-08-28T13:34:38.410`) +* [CVE-2023-32596](CVE-2023/CVE-2023-325xx/CVE-2023-32596.json) (`2023-08-28T13:34:46.660`) +* [CVE-2023-32598](CVE-2023/CVE-2023-325xx/CVE-2023-32598.json) (`2023-08-28T13:34:58.463`) +* [CVE-2023-32603](CVE-2023/CVE-2023-326xx/CVE-2023-32603.json) (`2023-08-28T13:35:12.593`) +* [CVE-2023-32797](CVE-2023/CVE-2023-327xx/CVE-2023-32797.json) (`2023-08-28T13:35:21.060`) +* [CVE-2023-41248](CVE-2023/CVE-2023-412xx/CVE-2023-41248.json) (`2023-08-28T13:35:32.633`) +* [CVE-2023-41249](CVE-2023/CVE-2023-412xx/CVE-2023-41249.json) (`2023-08-28T13:35:45.623`) +* [CVE-2023-41250](CVE-2023/CVE-2023-412xx/CVE-2023-41250.json) (`2023-08-28T13:35:55.523`) +* [CVE-2023-39742](CVE-2023/CVE-2023-397xx/CVE-2023-39742.json) (`2023-08-28T13:59:41.827`) ## Download and Usage