mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2023-09-19T04:00:24.207019+00:00
This commit is contained in:
parent
5fb14c2e75
commit
74e96b85f8
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26837",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-19T00:15:33.093",
|
||||
"lastModified": "2023-09-19T00:15:33.093",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
24
CVE-2022/CVE-2022-283xx/CVE-2022-28357.json
Normal file
24
CVE-2022/CVE-2022-283xx/CVE-2022-28357.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2022-28357",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-19T02:15:54.497",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NATS nats-server 2.2.0 through 2.7.4 allows directory traversal because of an unintended path to a management action from a management account."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisories.nats.io/CVE/CVE-2022-28357.txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nats-io/nats-server/releases",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33831",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-18T20:15:09.377",
|
||||
"lastModified": "2023-09-18T20:15:09.377",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:34.150",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37611",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-18T22:15:45.803",
|
||||
"lastModified": "2023-09-18T22:15:45.803",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-38204",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2023-09-14T08:15:07.617",
|
||||
"lastModified": "2023-09-14T13:01:03.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-19T02:02:14.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones 2018u18 (y anteriores), 2021u8 (y anteriores) y 2023u2 (y anteriores) de Adobe ColdFusion se ven afectadas por una vulnerabilidad de Deserializaci\u00f3n de Datos No Confiables que podr\u00eda resultar en la Ejecuci\u00f3n de C\u00f3digo Arbitrario. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -46,10 +50,175 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B54B2B0-B1E1-4B4E-A529-D0BD3B5DEEF3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EDB126BF-E09D-4E58-A39F-1190407D1CAB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8DDD85DF-69A0-476F-8365-CD67C75CF0CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23F63675-7817-4AF0-A7DB-5E35EDABF04E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3E3BF53E-2C0D-4F79-8B62-4C2A50CB5F52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C26BF72C-E991-4170-B68B-09B20B6C0679"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update14:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25B4B4F2-318F-4046-ADE5-E9DD64F83FD9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "831E8D69-62E9-4778-8CC5-D6D45CF5AB6F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F549BB3-25AB-4C83-B608-3717EADAAB35"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4AAE2FA8-BEC9-49BA-8E3F-A0564A8ECDC6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "59649177-81EE-43C3-BFA5-E56E65B486DF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "453B96ED-738A-4642-B461-C5216CF45CA3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "58D32489-627B-4E49-9329-8A3B8F8E4903"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D5860E1-D293-48FE-9796-058B78B2D571"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F9336CC-E38F-4BCB-83CD-805EC7FEF806"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97964507-047A-4CC8-8D2B-0EA0C7F9BD50"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "82208628-F32A-4380-9B0F-DC8507E7701D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2018:update9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1563CE5E-A4F7-40A4-A050-BB96E332D8DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B02A37FE-5D31-4892-A3E6-156A8FE62D28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb23-47.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38255",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-09-18T21:15:53.000",
|
||||
"lastModified": "2023-09-18T21:15:53.000",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:34.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38582",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-09-18T21:15:54.693",
|
||||
"lastModified": "2023-09-18T21:15:54.693",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:34.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39039",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-18T21:15:54.923",
|
||||
"lastModified": "2023-09-18T21:15:54.923",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39040",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-18T21:15:54.987",
|
||||
"lastModified": "2023-09-18T21:15:54.987",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39043",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-18T21:15:55.047",
|
||||
"lastModified": "2023-09-18T21:15:55.047",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39046",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-18T22:15:46.710",
|
||||
"lastModified": "2023-09-18T22:15:46.710",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39049",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-18T22:15:46.850",
|
||||
"lastModified": "2023-09-18T22:15:46.850",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39056",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-18T22:15:46.983",
|
||||
"lastModified": "2023-09-18T22:15:46.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39058",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-18T21:15:55.103",
|
||||
"lastModified": "2023-09-18T21:15:55.103",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39446",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-09-18T21:15:56.117",
|
||||
"lastModified": "2023-09-18T21:15:56.117",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39452",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-09-18T21:16:04.367",
|
||||
"lastModified": "2023-09-18T21:16:04.367",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40221",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-09-18T20:15:09.907",
|
||||
"lastModified": "2023-09-18T20:15:09.907",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:34.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40788",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-19T00:15:34.993",
|
||||
"lastModified": "2023-09-19T00:15:34.993",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,19 +2,91 @@
|
||||
"id": "CVE-2023-41010",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-14T18:15:09.313",
|
||||
"lastModified": "2023-09-14T18:32:35.497",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-19T02:17:50.343",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Permissions vulnerability in Sichuan Tianyi Kanghe Communication Co., Ltd China Telecom Tianyi Home Gateway v.TEWA-700G allows a local attacker to obtain sensitive information via the default password parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Permisos Inseguros en Sichuan Tianyi Kanghe Communication Co., Ltd China Telecom Tianyi Home Gateway v.TEWA-700G permite a un atacante local obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro \"contrase\u00f1a predeterminada\"."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tianyisc:tewa-700g_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD19DF4A-48A7-4704-BC14-A15C51B52F45"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tianyisc:tewa-700g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B7E2A273-DFC5-4AB2-A8B0-CFC7A2B73CCC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/te5tb99/For-submitting/wiki/China-Telecom-Tianyi-Home-Gateway-TEWA%E2%80%90700G",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41030",
|
||||
"sourceIdentifier": "disclosures@exodusintel.com",
|
||||
"published": "2023-09-18T19:15:43.060",
|
||||
"lastModified": "2023-09-18T19:15:43.060",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:34.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41084",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-09-18T20:15:10.017",
|
||||
"lastModified": "2023-09-18T20:15:10.017",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:34.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41443",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-18T22:15:47.113",
|
||||
"lastModified": "2023-09-18T22:15:47.113",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2023/CVE-2023-415xx/CVE-2023-41599.json
Normal file
20
CVE-2023/CVE-2023-415xx/CVE-2023-41599.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-41599",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-19T02:15:58.607",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the component /common/DownController.java of JFinalCMS v5.0.0 allows attackers to execute a directory traversal."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.so1lupus.ltd/2023/08/28/Directory-traversal-in-JFinalCMS/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41965",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-09-18T20:15:10.120",
|
||||
"lastModified": "2023-09-18T20:15:10.120",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:34.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,23 +2,88 @@
|
||||
"id": "CVE-2023-42178",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-14T16:15:08.293",
|
||||
"lastModified": "2023-09-14T18:32:35.497",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-19T02:11:38.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Lenosp 1.0.0-1.2.0 is vulnerable to SQL Injection via the log query module."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Lenosp 1.0.0-1.2.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del m\u00f3dulo de consulta de registros."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lenosp:lenosp:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.0.0",
|
||||
"versionEndIncluding": "1.2.0",
|
||||
"matchCriteriaId": "C68DC748-FB8E-4737-B2BE-1C7685497EE0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/zzdevelop/lenosp",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/zzdevelop/lenosp/issues/I7X5QL",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42441",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-09-18T21:16:09.750",
|
||||
"lastModified": "2023-09-18T21:16:09.750",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42443",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-09-18T21:16:13.403",
|
||||
"lastModified": "2023-09-18T21:16:13.403",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42446",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-09-18T22:15:47.247",
|
||||
"lastModified": "2023-09-18T22:15:47.247",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42454",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-09-18T22:15:47.547",
|
||||
"lastModified": "2023-09-18T22:15:47.547",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-4766",
|
||||
"sourceIdentifier": "cve@usom.gov.tr",
|
||||
"published": "2023-09-14T19:16:51.113",
|
||||
"lastModified": "2023-09-15T00:31:20.767",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-19T02:26:50.013",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Movus allows SQL Injection.This issue affects Movus: before 20230913.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Neutralizaci\u00f3n Inadecuada de Elementos Especiales utilizados en un Comando SQL ('Inyecci\u00f3n SQL') en Movus permite la inyecci\u00f3n SQL. Este problema afecta a Movus: antes de 20230913."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -46,10 +50,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:movus:movus:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "20230913",
|
||||
"matchCriteriaId": "06FB5C31-C7DB-45A5-AF60-0B28E725A3CA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-23-0524",
|
||||
"source": "cve@usom.gov.tr"
|
||||
"source": "cve@usom.gov.tr",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-4832",
|
||||
"sourceIdentifier": "cve@usom.gov.tr",
|
||||
"published": "2023-09-14T18:15:09.477",
|
||||
"lastModified": "2023-09-14T18:32:35.497",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-19T02:20:05.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aceka Company Management allows SQL Injection.This issue affects Company Management: before 3072 .\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Neutralizaci\u00f3n Inadecuada de Elementos Especiales utilizados en un Comando SQL (\"Inyecci\u00f3n SQL\") en Aceka Company Management permite la inyecci\u00f3n SQL. Este problema afecta a Company Management: antes de la versi\u00f3n 3072."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -46,10 +50,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acekaholding:company_management:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3072",
|
||||
"matchCriteriaId": "2E2DF8C2-21B2-49CD-97F7-C73D045BA1F5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-23-0523",
|
||||
"source": "cve@usom.gov.tr"
|
||||
"source": "cve@usom.gov.tr",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-50xx/CVE-2023-5060.json
Normal file
59
CVE-2023/CVE-2023-50xx/CVE-2023-5060.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-5060",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-09-19T03:15:08.597",
|
||||
"lastModified": "2023-09-19T03:37:18.983",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site Scripting (XSS) - DOM in GitHub repository librenms/librenms prior to 23.9.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/8fd8d9b06a11060de5dc69588a1a83594a7e6f72",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/01b0917d-f92f-4903-9eca-bcfc46e847e3",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
48
README.md
48
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-09-19T02:00:24.059673+00:00
|
||||
2023-09-19T04:00:24.207019+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-09-19T01:59:07.047000+00:00
|
||||
2023-09-19T03:37:34.150000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,29 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
225790
|
||||
225793
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* [CVE-2021-26837](CVE-2021/CVE-2021-268xx/CVE-2021-26837.json) (`2023-09-19T00:15:33.093`)
|
||||
* [CVE-2023-40788](CVE-2023/CVE-2023-407xx/CVE-2023-40788.json) (`2023-09-19T00:15:34.993`)
|
||||
* [CVE-2022-28357](CVE-2022/CVE-2022-283xx/CVE-2022-28357.json) (`2023-09-19T02:15:54.497`)
|
||||
* [CVE-2023-41599](CVE-2023/CVE-2023-415xx/CVE-2023-41599.json) (`2023-09-19T02:15:58.607`)
|
||||
* [CVE-2023-5060](CVE-2023/CVE-2023-50xx/CVE-2023-5060.json) (`2023-09-19T03:15:08.597`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `8`
|
||||
Recently modified CVEs: `29`
|
||||
|
||||
* [CVE-2023-4878](CVE-2023/CVE-2023-48xx/CVE-2023-4878.json) (`2023-09-19T01:16:52.127`)
|
||||
* [CVE-2023-41161](CVE-2023/CVE-2023-411xx/CVE-2023-41161.json) (`2023-09-19T01:20:50.880`)
|
||||
* [CVE-2023-20193](CVE-2023/CVE-2023-201xx/CVE-2023-20193.json) (`2023-09-19T01:25:49.487`)
|
||||
* [CVE-2023-20263](CVE-2023/CVE-2023-202xx/CVE-2023-20263.json) (`2023-09-19T01:35:44.623`)
|
||||
* [CVE-2023-41892](CVE-2023/CVE-2023-418xx/CVE-2023-41892.json) (`2023-09-19T01:38:16.567`)
|
||||
* [CVE-2023-41154](CVE-2023/CVE-2023-411xx/CVE-2023-41154.json) (`2023-09-19T01:42:38.610`)
|
||||
* [CVE-2023-4814](CVE-2023/CVE-2023-48xx/CVE-2023-4814.json) (`2023-09-19T01:54:28.317`)
|
||||
* [CVE-2023-4948](CVE-2023/CVE-2023-49xx/CVE-2023-4948.json) (`2023-09-19T01:59:07.047`)
|
||||
* [CVE-2023-4832](CVE-2023/CVE-2023-48xx/CVE-2023-4832.json) (`2023-09-19T02:20:05.197`)
|
||||
* [CVE-2023-4766](CVE-2023/CVE-2023-47xx/CVE-2023-4766.json) (`2023-09-19T02:26:50.013`)
|
||||
* [CVE-2023-39039](CVE-2023/CVE-2023-390xx/CVE-2023-39039.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-39040](CVE-2023/CVE-2023-390xx/CVE-2023-39040.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-39043](CVE-2023/CVE-2023-390xx/CVE-2023-39043.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-39058](CVE-2023/CVE-2023-390xx/CVE-2023-39058.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-39446](CVE-2023/CVE-2023-394xx/CVE-2023-39446.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-39452](CVE-2023/CVE-2023-394xx/CVE-2023-39452.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-42441](CVE-2023/CVE-2023-424xx/CVE-2023-42441.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-42443](CVE-2023/CVE-2023-424xx/CVE-2023-42443.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-37611](CVE-2023/CVE-2023-376xx/CVE-2023-37611.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-39046](CVE-2023/CVE-2023-390xx/CVE-2023-39046.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-39049](CVE-2023/CVE-2023-390xx/CVE-2023-39049.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-39056](CVE-2023/CVE-2023-390xx/CVE-2023-39056.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-41443](CVE-2023/CVE-2023-414xx/CVE-2023-41443.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-42446](CVE-2023/CVE-2023-424xx/CVE-2023-42446.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-42454](CVE-2023/CVE-2023-424xx/CVE-2023-42454.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-40788](CVE-2023/CVE-2023-407xx/CVE-2023-40788.json) (`2023-09-19T03:37:18.983`)
|
||||
* [CVE-2023-41030](CVE-2023/CVE-2023-410xx/CVE-2023-41030.json) (`2023-09-19T03:37:34.150`)
|
||||
* [CVE-2023-33831](CVE-2023/CVE-2023-338xx/CVE-2023-33831.json) (`2023-09-19T03:37:34.150`)
|
||||
* [CVE-2023-40221](CVE-2023/CVE-2023-402xx/CVE-2023-40221.json) (`2023-09-19T03:37:34.150`)
|
||||
* [CVE-2023-41084](CVE-2023/CVE-2023-410xx/CVE-2023-41084.json) (`2023-09-19T03:37:34.150`)
|
||||
* [CVE-2023-41965](CVE-2023/CVE-2023-419xx/CVE-2023-41965.json) (`2023-09-19T03:37:34.150`)
|
||||
* [CVE-2023-38255](CVE-2023/CVE-2023-382xx/CVE-2023-38255.json) (`2023-09-19T03:37:34.150`)
|
||||
* [CVE-2023-38582](CVE-2023/CVE-2023-385xx/CVE-2023-38582.json) (`2023-09-19T03:37:34.150`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user