Auto-Update: 2023-06-22T12:00:26.312744+00:00

This commit is contained in:
cad-safe-bot 2023-06-22 12:00:29 +00:00
parent fb46526e56
commit 791967a671
9 changed files with 263 additions and 19 deletions

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-29707",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T11:15:09.337",
"lastModified": "2023-06-22T11:15:09.337",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) vulnerability in GBCOM LAC WEB Control Center version lac-1.3.x, allows attackers to create an arbitrary device."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/shellpei/GBCOM-XSS/blob/main/CVE-2023-29707",
"source": "cve@mitre.org"
},
{
"url": "https://holistic-height-e6d.notion.site/GBCOM-LAC-WEB-Control-Center-cross-site-scripting-vulnerability-and-device-permanent-account-creatio-a4f128d7fb8b40e5b6130c6f97e71eaf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-29708",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T11:15:09.390",
"lastModified": "2023-06-22T11:15:09.390",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in /cgi-bin/adm.cgi in WavLink WavRouter version RPT70HA1.x, allows attackers to force a factory reset via crafted payload."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/shellpei/WAVLINK-Reset/blob/main/CVE-2023-29708",
"source": "cve@mitre.org"
},
{
"url": "https://holistic-height-e6d.notion.site/WAVLINK-Wi-Fi-APP-Arbitrary-factory-reset-vulnerability-b2d747693a7442aaa8b045e57bbd8297",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-29709",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T11:15:09.437",
"lastModified": "2023-06-22T11:15:09.437",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in /cgi-bin/login_rj.cgi in Wildix WSG24POE version 103SP7D190822, allows attackers to bypass authentication."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/shellpei/Wildix-Logical/blob/main/CVE-2023-29709",
"source": "cve@mitre.org"
},
{
"url": "https://holistic-height-e6d.notion.site/Wildix-WSG24POE-Logical-vulnerability-7780c24cc25b40dd9d2830f7b21f04a3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29931",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T11:15:09.487",
"lastModified": "2023-06-22T11:15:09.487",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "laravel-s 3.7.35 is vulnerable to Local File Inclusion via /src/Illuminate/Laravel.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/hhxsv5/laravel-s/issues/437",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-31213",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-06-22T11:15:09.537",
"lastModified": "2023-06-22T11:15:09.537",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WPBakery Page Builder plugin <=\u00a06.13.0 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/js_composer/wordpress-wpbakery-page-builder-plugin-6-13-0-contributor-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-33387",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T11:15:09.613",
"lastModified": "2023-06-22T11:15:09.613",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A reflected cross-site scripting (XSS) vulnerability in DATEV eG Personal-Management System Comfort/Comfort Plus v15.1.0 to v16.1.1 P4 allows attackers to steal targeted users' login data by sending a crafted link."
}
],
"metrics": {},
"references": [
{
"url": "https://apps.datev.de/help-center/documents/1021479",
"source": "cve@mitre.org"
},
{
"url": "https://support.veda.net/datev.php",
"source": "cve@mitre.org"
},
{
"url": "https://www.tuv.com/landingpage/de/schwachstelle/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-34601",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T11:15:09.663",
"lastModified": "2023-06-22T11:15:09.663",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Jeesite before commit 10742d3 was discovered to contain a SQL injection vulnerability via the component ${businessTable} at /act/ActDao.xml."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/thinkgem/jeesite/issues/515",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-35090",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-06-22T11:15:09.727",
"lastModified": "2023-06-22T11:15:09.727",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in StylemixThemes MasterStudy LMS WordPress Plugin \u2013 for Online Courses and Education plugin <=\u00a03.0.7 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/masterstudy-lms-learning-management-system/wordpress-masterstudy-lms-plugin-3-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-06-22T10:00:25.481123+00:00
2023-06-22T12:00:26.312744+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-06-22T09:15:11.450000+00:00
2023-06-22T11:15:09.727000+00:00
```
### Last Data Feed Release
@ -29,33 +29,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
218217
218225
```
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `8`
* [CVE-2023-27413](CVE-2023/CVE-2023-274xx/CVE-2023-27413.json) (`2023-06-22T08:15:09.173`)
* [CVE-2023-27612](CVE-2023/CVE-2023-276xx/CVE-2023-27612.json) (`2023-06-22T08:15:09.277`)
* [CVE-2023-27629](CVE-2023/CVE-2023-276xx/CVE-2023-27629.json) (`2023-06-22T08:15:09.353`)
* [CVE-2023-27631](CVE-2023/CVE-2023-276xx/CVE-2023-27631.json) (`2023-06-22T08:15:09.433`)
* [CVE-2023-27618](CVE-2023/CVE-2023-276xx/CVE-2023-27618.json) (`2023-06-22T09:15:10.873`)
* [CVE-2023-28166](CVE-2023/CVE-2023-281xx/CVE-2023-28166.json) (`2023-06-22T09:15:10.993`)
* [CVE-2023-28171](CVE-2023/CVE-2023-281xx/CVE-2023-28171.json) (`2023-06-22T09:15:11.070`)
* [CVE-2023-28423](CVE-2023/CVE-2023-284xx/CVE-2023-28423.json) (`2023-06-22T09:15:11.147`)
* [CVE-2023-28496](CVE-2023/CVE-2023-284xx/CVE-2023-28496.json) (`2023-06-22T09:15:11.217`)
* [CVE-2023-28534](CVE-2023/CVE-2023-285xx/CVE-2023-28534.json) (`2023-06-22T09:15:11.297`)
* [CVE-2023-28695](CVE-2023/CVE-2023-286xx/CVE-2023-28695.json) (`2023-06-22T09:15:11.373`)
* [CVE-2023-29707](CVE-2023/CVE-2023-297xx/CVE-2023-29707.json) (`2023-06-22T11:15:09.337`)
* [CVE-2023-29708](CVE-2023/CVE-2023-297xx/CVE-2023-29708.json) (`2023-06-22T11:15:09.390`)
* [CVE-2023-29709](CVE-2023/CVE-2023-297xx/CVE-2023-29709.json) (`2023-06-22T11:15:09.437`)
* [CVE-2023-29931](CVE-2023/CVE-2023-299xx/CVE-2023-29931.json) (`2023-06-22T11:15:09.487`)
* [CVE-2023-31213](CVE-2023/CVE-2023-312xx/CVE-2023-31213.json) (`2023-06-22T11:15:09.537`)
* [CVE-2023-33387](CVE-2023/CVE-2023-333xx/CVE-2023-33387.json) (`2023-06-22T11:15:09.613`)
* [CVE-2023-34601](CVE-2023/CVE-2023-346xx/CVE-2023-34601.json) (`2023-06-22T11:15:09.663`)
* [CVE-2023-35090](CVE-2023/CVE-2023-350xx/CVE-2023-35090.json) (`2023-06-22T11:15:09.727`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `0`
* [CVE-2021-25315](CVE-2021/CVE-2021-253xx/CVE-2021-25315.json) (`2023-06-22T09:15:09.793`)
* [CVE-2022-21946](CVE-2022/CVE-2022-219xx/CVE-2022-21946.json) (`2023-06-22T09:15:10.693`)
* [CVE-2023-31975](CVE-2023/CVE-2023-319xx/CVE-2023-31975.json) (`2023-06-22T09:15:11.450`)
## Download and Usage