Auto-Update: 2023-09-19T04:00:24.207019+00:00

This commit is contained in:
cad-safe-bot 2023-09-19 04:00:27 +00:00
parent 5fb14c2e75
commit 74e96b85f8
33 changed files with 558 additions and 81 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26837",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-19T00:15:33.093",
"lastModified": "2023-09-19T00:15:33.093",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2022-28357",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-19T02:15:54.497",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "NATS nats-server 2.2.0 through 2.7.4 allows directory traversal because of an unintended path to a management action from a management account."
}
],
"metrics": {},
"references": [
{
"url": "https://advisories.nats.io/CVE/CVE-2022-28357.txt",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/nats-io/nats-server/releases",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33831",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-18T20:15:09.377",
"lastModified": "2023-09-18T20:15:09.377",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:34.150",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37611",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-18T22:15:45.803",
"lastModified": "2023-09-18T22:15:45.803",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-38204",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-14T08:15:07.617",
"lastModified": "2023-09-14T13:01:03.610",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-19T02:02:14.353",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction."
},
{
"lang": "es",
"value": "Las versiones 2018u18 (y anteriores), 2021u8 (y anteriores) y 2023u2 (y anteriores) de Adobe ColdFusion se ven afectadas por una vulnerabilidad de Deserializaci\u00f3n de Datos No Confiables que podr\u00eda resultar en la Ejecuci\u00f3n de C\u00f3digo Arbitrario. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario."
}
],
"metrics": {
@ -46,10 +50,175 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*",
"matchCriteriaId": "3B54B2B0-B1E1-4B4E-A529-D0BD3B5DEEF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*",
"matchCriteriaId": "EDB126BF-E09D-4E58-A39F-1190407D1CAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update10:*:*:*:*:*:*",
"matchCriteriaId": "8DDD85DF-69A0-476F-8365-CD67C75CF0CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update11:*:*:*:*:*:*",
"matchCriteriaId": "23F63675-7817-4AF0-A7DB-5E35EDABF04E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update12:*:*:*:*:*:*",
"matchCriteriaId": "3E3BF53E-2C0D-4F79-8B62-4C2A50CB5F52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update13:*:*:*:*:*:*",
"matchCriteriaId": "C26BF72C-E991-4170-B68B-09B20B6C0679"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update14:*:*:*:*:*:*",
"matchCriteriaId": "25B4B4F2-318F-4046-ADE5-E9DD64F83FD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update15:*:*:*:*:*:*",
"matchCriteriaId": "831E8D69-62E9-4778-8CC5-D6D45CF5AB6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update16:*:*:*:*:*:*",
"matchCriteriaId": "2F549BB3-25AB-4C83-B608-3717EADAAB35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update18:*:*:*:*:*:*",
"matchCriteriaId": "4AAE2FA8-BEC9-49BA-8E3F-A0564A8ECDC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*",
"matchCriteriaId": "59649177-81EE-43C3-BFA5-E56E65B486DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*",
"matchCriteriaId": "453B96ED-738A-4642-B461-C5216CF45CA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*",
"matchCriteriaId": "58D32489-627B-4E49-9329-8A3B8F8E4903"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update5:*:*:*:*:*:*",
"matchCriteriaId": "6D5860E1-D293-48FE-9796-058B78B2D571"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update6:*:*:*:*:*:*",
"matchCriteriaId": "9F9336CC-E38F-4BCB-83CD-805EC7FEF806"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update7:*:*:*:*:*:*",
"matchCriteriaId": "97964507-047A-4CC8-8D2B-0EA0C7F9BD50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update8:*:*:*:*:*:*",
"matchCriteriaId": "82208628-F32A-4380-9B0F-DC8507E7701D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update9:*:*:*:*:*:*",
"matchCriteriaId": "1563CE5E-A4F7-40A4-A050-BB96E332D8DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*",
"matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*",
"matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*",
"matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*",
"matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*",
"matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*",
"matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*",
"matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*",
"matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*",
"matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*",
"matchCriteriaId": "B02A37FE-5D31-4892-A3E6-156A8FE62D28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*",
"matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*",
"matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb23-47.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38255",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-09-18T21:15:53.000",
"lastModified": "2023-09-18T21:15:53.000",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:34.150",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38582",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-09-18T21:15:54.693",
"lastModified": "2023-09-18T21:15:54.693",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:34.150",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39039",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-18T21:15:54.923",
"lastModified": "2023-09-18T21:15:54.923",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39040",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-18T21:15:54.987",
"lastModified": "2023-09-18T21:15:54.987",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39043",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-18T21:15:55.047",
"lastModified": "2023-09-18T21:15:55.047",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39046",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-18T22:15:46.710",
"lastModified": "2023-09-18T22:15:46.710",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39049",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-18T22:15:46.850",
"lastModified": "2023-09-18T22:15:46.850",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39056",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-18T22:15:46.983",
"lastModified": "2023-09-18T22:15:46.983",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39058",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-18T21:15:55.103",
"lastModified": "2023-09-18T21:15:55.103",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39446",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-09-18T21:15:56.117",
"lastModified": "2023-09-18T21:15:56.117",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39452",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-09-18T21:16:04.367",
"lastModified": "2023-09-18T21:16:04.367",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40221",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-09-18T20:15:09.907",
"lastModified": "2023-09-18T20:15:09.907",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:34.150",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40788",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-19T00:15:34.993",
"lastModified": "2023-09-19T00:15:34.993",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,19 +2,91 @@
"id": "CVE-2023-41010",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-14T18:15:09.313",
"lastModified": "2023-09-14T18:32:35.497",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-19T02:17:50.343",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Insecure Permissions vulnerability in Sichuan Tianyi Kanghe Communication Co., Ltd China Telecom Tianyi Home Gateway v.TEWA-700G allows a local attacker to obtain sensitive information via the default password parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de Permisos Inseguros en Sichuan Tianyi Kanghe Communication Co., Ltd China Telecom Tianyi Home Gateway v.TEWA-700G permite a un atacante local obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro \"contrase\u00f1a predeterminada\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tianyisc:tewa-700g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD19DF4A-48A7-4704-BC14-A15C51B52F45"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tianyisc:tewa-700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E2A273-DFC5-4AB2-A8B0-CFC7A2B73CCC"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/te5tb99/For-submitting/wiki/China-Telecom-Tianyi-Home-Gateway-TEWA%E2%80%90700G",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41030",
"sourceIdentifier": "disclosures@exodusintel.com",
"published": "2023-09-18T19:15:43.060",
"lastModified": "2023-09-18T19:15:43.060",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:34.150",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41084",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-09-18T20:15:10.017",
"lastModified": "2023-09-18T20:15:10.017",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:34.150",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41443",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-18T22:15:47.113",
"lastModified": "2023-09-18T22:15:47.113",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-41599",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-19T02:15:58.607",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in the component /common/DownController.java of JFinalCMS v5.0.0 allows attackers to execute a directory traversal."
}
],
"metrics": {},
"references": [
{
"url": "http://www.so1lupus.ltd/2023/08/28/Directory-traversal-in-JFinalCMS/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41965",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-09-18T20:15:10.120",
"lastModified": "2023-09-18T20:15:10.120",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:34.150",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,23 +2,88 @@
"id": "CVE-2023-42178",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-14T16:15:08.293",
"lastModified": "2023-09-14T18:32:35.497",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-19T02:11:38.890",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Lenosp 1.0.0-1.2.0 is vulnerable to SQL Injection via the log query module."
},
{
"lang": "es",
"value": "Lenosp 1.0.0-1.2.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del m\u00f3dulo de consulta de registros."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lenosp:lenosp:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndIncluding": "1.2.0",
"matchCriteriaId": "C68DC748-FB8E-4737-B2BE-1C7685497EE0"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gitee.com/zzdevelop/lenosp",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://gitee.com/zzdevelop/lenosp/issues/I7X5QL",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42441",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-18T21:16:09.750",
"lastModified": "2023-09-18T21:16:09.750",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42443",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-18T21:16:13.403",
"lastModified": "2023-09-18T21:16:13.403",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42446",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-18T22:15:47.247",
"lastModified": "2023-09-18T22:15:47.247",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42454",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-18T22:15:47.547",
"lastModified": "2023-09-18T22:15:47.547",
"vulnStatus": "Received",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-4766",
"sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-09-14T19:16:51.113",
"lastModified": "2023-09-15T00:31:20.767",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-19T02:26:50.013",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Movus allows SQL Injection.This issue affects Movus: before 20230913.\n\n"
},
{
"lang": "es",
"value": "Vulnerabilidad de Neutralizaci\u00f3n Inadecuada de Elementos Especiales utilizados en un Comando SQL ('Inyecci\u00f3n SQL') en Movus permite la inyecci\u00f3n SQL. Este problema afecta a Movus: antes de 20230913."
}
],
"metrics": {
@ -46,10 +50,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:movus:movus:*:*:*:*:*:*:*:*",
"versionEndExcluding": "20230913",
"matchCriteriaId": "06FB5C31-C7DB-45A5-AF60-0B28E725A3CA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0524",
"source": "cve@usom.gov.tr"
"source": "cve@usom.gov.tr",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-4832",
"sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-09-14T18:15:09.477",
"lastModified": "2023-09-14T18:32:35.497",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-19T02:20:05.197",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aceka Company Management allows SQL Injection.This issue affects Company Management: before 3072 .\n\n"
},
{
"lang": "es",
"value": "Vulnerabilidad de Neutralizaci\u00f3n Inadecuada de Elementos Especiales utilizados en un Comando SQL (\"Inyecci\u00f3n SQL\") en Aceka Company Management permite la inyecci\u00f3n SQL. Este problema afecta a Company Management: antes de la versi\u00f3n 3072."
}
],
"metrics": {
@ -46,10 +50,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acekaholding:company_management:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3072",
"matchCriteriaId": "2E2DF8C2-21B2-49CD-97F7-C73D045BA1F5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0523",
"source": "cve@usom.gov.tr"
"source": "cve@usom.gov.tr",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-5060",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-19T03:15:08.597",
"lastModified": "2023-09-19T03:37:18.983",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - DOM in GitHub repository librenms/librenms prior to 23.9.1."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/librenms/librenms/commit/8fd8d9b06a11060de5dc69588a1a83594a7e6f72",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/01b0917d-f92f-4903-9eca-bcfc46e847e3",
"source": "security@huntr.dev"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-19T02:00:24.059673+00:00
2023-09-19T04:00:24.207019+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-19T01:59:07.047000+00:00
2023-09-19T03:37:34.150000+00:00
```
### Last Data Feed Release
@ -29,29 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
225790
225793
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `3`
* [CVE-2021-26837](CVE-2021/CVE-2021-268xx/CVE-2021-26837.json) (`2023-09-19T00:15:33.093`)
* [CVE-2023-40788](CVE-2023/CVE-2023-407xx/CVE-2023-40788.json) (`2023-09-19T00:15:34.993`)
* [CVE-2022-28357](CVE-2022/CVE-2022-283xx/CVE-2022-28357.json) (`2023-09-19T02:15:54.497`)
* [CVE-2023-41599](CVE-2023/CVE-2023-415xx/CVE-2023-41599.json) (`2023-09-19T02:15:58.607`)
* [CVE-2023-5060](CVE-2023/CVE-2023-50xx/CVE-2023-5060.json) (`2023-09-19T03:15:08.597`)
### CVEs modified in the last Commit
Recently modified CVEs: `8`
Recently modified CVEs: `29`
* [CVE-2023-4878](CVE-2023/CVE-2023-48xx/CVE-2023-4878.json) (`2023-09-19T01:16:52.127`)
* [CVE-2023-41161](CVE-2023/CVE-2023-411xx/CVE-2023-41161.json) (`2023-09-19T01:20:50.880`)
* [CVE-2023-20193](CVE-2023/CVE-2023-201xx/CVE-2023-20193.json) (`2023-09-19T01:25:49.487`)
* [CVE-2023-20263](CVE-2023/CVE-2023-202xx/CVE-2023-20263.json) (`2023-09-19T01:35:44.623`)
* [CVE-2023-41892](CVE-2023/CVE-2023-418xx/CVE-2023-41892.json) (`2023-09-19T01:38:16.567`)
* [CVE-2023-41154](CVE-2023/CVE-2023-411xx/CVE-2023-41154.json) (`2023-09-19T01:42:38.610`)
* [CVE-2023-4814](CVE-2023/CVE-2023-48xx/CVE-2023-4814.json) (`2023-09-19T01:54:28.317`)
* [CVE-2023-4948](CVE-2023/CVE-2023-49xx/CVE-2023-4948.json) (`2023-09-19T01:59:07.047`)
* [CVE-2023-4832](CVE-2023/CVE-2023-48xx/CVE-2023-4832.json) (`2023-09-19T02:20:05.197`)
* [CVE-2023-4766](CVE-2023/CVE-2023-47xx/CVE-2023-4766.json) (`2023-09-19T02:26:50.013`)
* [CVE-2023-39039](CVE-2023/CVE-2023-390xx/CVE-2023-39039.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-39040](CVE-2023/CVE-2023-390xx/CVE-2023-39040.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-39043](CVE-2023/CVE-2023-390xx/CVE-2023-39043.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-39058](CVE-2023/CVE-2023-390xx/CVE-2023-39058.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-39446](CVE-2023/CVE-2023-394xx/CVE-2023-39446.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-39452](CVE-2023/CVE-2023-394xx/CVE-2023-39452.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-42441](CVE-2023/CVE-2023-424xx/CVE-2023-42441.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-42443](CVE-2023/CVE-2023-424xx/CVE-2023-42443.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-37611](CVE-2023/CVE-2023-376xx/CVE-2023-37611.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-39046](CVE-2023/CVE-2023-390xx/CVE-2023-39046.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-39049](CVE-2023/CVE-2023-390xx/CVE-2023-39049.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-39056](CVE-2023/CVE-2023-390xx/CVE-2023-39056.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-41443](CVE-2023/CVE-2023-414xx/CVE-2023-41443.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-42446](CVE-2023/CVE-2023-424xx/CVE-2023-42446.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-42454](CVE-2023/CVE-2023-424xx/CVE-2023-42454.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-40788](CVE-2023/CVE-2023-407xx/CVE-2023-40788.json) (`2023-09-19T03:37:18.983`)
* [CVE-2023-41030](CVE-2023/CVE-2023-410xx/CVE-2023-41030.json) (`2023-09-19T03:37:34.150`)
* [CVE-2023-33831](CVE-2023/CVE-2023-338xx/CVE-2023-33831.json) (`2023-09-19T03:37:34.150`)
* [CVE-2023-40221](CVE-2023/CVE-2023-402xx/CVE-2023-40221.json) (`2023-09-19T03:37:34.150`)
* [CVE-2023-41084](CVE-2023/CVE-2023-410xx/CVE-2023-41084.json) (`2023-09-19T03:37:34.150`)
* [CVE-2023-41965](CVE-2023/CVE-2023-419xx/CVE-2023-41965.json) (`2023-09-19T03:37:34.150`)
* [CVE-2023-38255](CVE-2023/CVE-2023-382xx/CVE-2023-38255.json) (`2023-09-19T03:37:34.150`)
* [CVE-2023-38582](CVE-2023/CVE-2023-385xx/CVE-2023-38582.json) (`2023-09-19T03:37:34.150`)
## Download and Usage