From 791967a671fd9fe8844133d0e1fd23bd27efd19e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 22 Jun 2023 12:00:29 +0000 Subject: [PATCH] Auto-Update: 2023-06-22T12:00:26.312744+00:00 --- CVE-2023/CVE-2023-297xx/CVE-2023-29707.json | 24 +++++++++ CVE-2023/CVE-2023-297xx/CVE-2023-29708.json | 24 +++++++++ CVE-2023/CVE-2023-297xx/CVE-2023-29709.json | 24 +++++++++ CVE-2023/CVE-2023-299xx/CVE-2023-29931.json | 20 ++++++++ CVE-2023/CVE-2023-312xx/CVE-2023-31213.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-333xx/CVE-2023-33387.json | 28 +++++++++++ CVE-2023/CVE-2023-346xx/CVE-2023-34601.json | 20 ++++++++ CVE-2023/CVE-2023-350xx/CVE-2023-35090.json | 55 +++++++++++++++++++++ README.md | 32 +++++------- 9 files changed, 263 insertions(+), 19 deletions(-) create mode 100644 CVE-2023/CVE-2023-297xx/CVE-2023-29707.json create mode 100644 CVE-2023/CVE-2023-297xx/CVE-2023-29708.json create mode 100644 CVE-2023/CVE-2023-297xx/CVE-2023-29709.json create mode 100644 CVE-2023/CVE-2023-299xx/CVE-2023-29931.json create mode 100644 CVE-2023/CVE-2023-312xx/CVE-2023-31213.json create mode 100644 CVE-2023/CVE-2023-333xx/CVE-2023-33387.json create mode 100644 CVE-2023/CVE-2023-346xx/CVE-2023-34601.json create mode 100644 CVE-2023/CVE-2023-350xx/CVE-2023-35090.json diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29707.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29707.json new file mode 100644 index 00000000000..0d522757378 --- /dev/null +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29707.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-29707", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-22T11:15:09.337", + "lastModified": "2023-06-22T11:15:09.337", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting (XSS) vulnerability in GBCOM LAC WEB Control Center version lac-1.3.x, allows attackers to create an arbitrary device." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/shellpei/GBCOM-XSS/blob/main/CVE-2023-29707", + "source": "cve@mitre.org" + }, + { + "url": "https://holistic-height-e6d.notion.site/GBCOM-LAC-WEB-Control-Center-cross-site-scripting-vulnerability-and-device-permanent-account-creatio-a4f128d7fb8b40e5b6130c6f97e71eaf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29708.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29708.json new file mode 100644 index 00000000000..86467ec1291 --- /dev/null +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29708.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-29708", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-22T11:15:09.390", + "lastModified": "2023-06-22T11:15:09.390", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in /cgi-bin/adm.cgi in WavLink WavRouter version RPT70HA1.x, allows attackers to force a factory reset via crafted payload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/shellpei/WAVLINK-Reset/blob/main/CVE-2023-29708", + "source": "cve@mitre.org" + }, + { + "url": "https://holistic-height-e6d.notion.site/WAVLINK-Wi-Fi-APP-Arbitrary-factory-reset-vulnerability-b2d747693a7442aaa8b045e57bbd8297", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29709.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29709.json new file mode 100644 index 00000000000..cef4ab6599d --- /dev/null +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29709.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-29709", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-22T11:15:09.437", + "lastModified": "2023-06-22T11:15:09.437", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in /cgi-bin/login_rj.cgi in Wildix WSG24POE version 103SP7D190822, allows attackers to bypass authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/shellpei/Wildix-Logical/blob/main/CVE-2023-29709", + "source": "cve@mitre.org" + }, + { + "url": "https://holistic-height-e6d.notion.site/Wildix-WSG24POE-Logical-vulnerability-7780c24cc25b40dd9d2830f7b21f04a3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29931.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29931.json new file mode 100644 index 00000000000..2db91962e39 --- /dev/null +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29931.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-29931", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-22T11:15:09.487", + "lastModified": "2023-06-22T11:15:09.487", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "laravel-s 3.7.35 is vulnerable to Local File Inclusion via /src/Illuminate/Laravel.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/hhxsv5/laravel-s/issues/437", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31213.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31213.json new file mode 100644 index 00000000000..294e45089cf --- /dev/null +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31213.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-31213", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-06-22T11:15:09.537", + "lastModified": "2023-06-22T11:15:09.537", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WPBakery Page Builder plugin <=\u00a06.13.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/js_composer/wordpress-wpbakery-page-builder-plugin-6-13-0-contributor-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33387.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33387.json new file mode 100644 index 00000000000..014f36295d1 --- /dev/null +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33387.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-33387", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-22T11:15:09.613", + "lastModified": "2023-06-22T11:15:09.613", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A reflected cross-site scripting (XSS) vulnerability in DATEV eG Personal-Management System Comfort/Comfort Plus v15.1.0 to v16.1.1 P4 allows attackers to steal targeted users' login data by sending a crafted link." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://apps.datev.de/help-center/documents/1021479", + "source": "cve@mitre.org" + }, + { + "url": "https://support.veda.net/datev.php", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tuv.com/landingpage/de/schwachstelle/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-346xx/CVE-2023-34601.json b/CVE-2023/CVE-2023-346xx/CVE-2023-34601.json new file mode 100644 index 00000000000..749531b9214 --- /dev/null +++ b/CVE-2023/CVE-2023-346xx/CVE-2023-34601.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-34601", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-22T11:15:09.663", + "lastModified": "2023-06-22T11:15:09.663", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Jeesite before commit 10742d3 was discovered to contain a SQL injection vulnerability via the component ${businessTable} at /act/ActDao.xml." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/thinkgem/jeesite/issues/515", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35090.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35090.json new file mode 100644 index 00000000000..c32ce98b2cc --- /dev/null +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35090.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35090", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-06-22T11:15:09.727", + "lastModified": "2023-06-22T11:15:09.727", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in StylemixThemes MasterStudy LMS WordPress Plugin \u2013 for Online Courses and Education plugin <=\u00a03.0.7 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/masterstudy-lms-learning-management-system/wordpress-masterstudy-lms-plugin-3-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 7d464047c89..615b4516ca0 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-22T10:00:25.481123+00:00 +2023-06-22T12:00:26.312744+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-22T09:15:11.450000+00:00 +2023-06-22T11:15:09.727000+00:00 ``` ### Last Data Feed Release @@ -29,33 +29,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -218217 +218225 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `8` -* [CVE-2023-27413](CVE-2023/CVE-2023-274xx/CVE-2023-27413.json) (`2023-06-22T08:15:09.173`) -* [CVE-2023-27612](CVE-2023/CVE-2023-276xx/CVE-2023-27612.json) (`2023-06-22T08:15:09.277`) -* [CVE-2023-27629](CVE-2023/CVE-2023-276xx/CVE-2023-27629.json) (`2023-06-22T08:15:09.353`) -* [CVE-2023-27631](CVE-2023/CVE-2023-276xx/CVE-2023-27631.json) (`2023-06-22T08:15:09.433`) -* [CVE-2023-27618](CVE-2023/CVE-2023-276xx/CVE-2023-27618.json) (`2023-06-22T09:15:10.873`) -* [CVE-2023-28166](CVE-2023/CVE-2023-281xx/CVE-2023-28166.json) (`2023-06-22T09:15:10.993`) -* [CVE-2023-28171](CVE-2023/CVE-2023-281xx/CVE-2023-28171.json) (`2023-06-22T09:15:11.070`) -* [CVE-2023-28423](CVE-2023/CVE-2023-284xx/CVE-2023-28423.json) (`2023-06-22T09:15:11.147`) -* [CVE-2023-28496](CVE-2023/CVE-2023-284xx/CVE-2023-28496.json) (`2023-06-22T09:15:11.217`) -* [CVE-2023-28534](CVE-2023/CVE-2023-285xx/CVE-2023-28534.json) (`2023-06-22T09:15:11.297`) -* [CVE-2023-28695](CVE-2023/CVE-2023-286xx/CVE-2023-28695.json) (`2023-06-22T09:15:11.373`) +* [CVE-2023-29707](CVE-2023/CVE-2023-297xx/CVE-2023-29707.json) (`2023-06-22T11:15:09.337`) +* [CVE-2023-29708](CVE-2023/CVE-2023-297xx/CVE-2023-29708.json) (`2023-06-22T11:15:09.390`) +* [CVE-2023-29709](CVE-2023/CVE-2023-297xx/CVE-2023-29709.json) (`2023-06-22T11:15:09.437`) +* [CVE-2023-29931](CVE-2023/CVE-2023-299xx/CVE-2023-29931.json) (`2023-06-22T11:15:09.487`) +* [CVE-2023-31213](CVE-2023/CVE-2023-312xx/CVE-2023-31213.json) (`2023-06-22T11:15:09.537`) +* [CVE-2023-33387](CVE-2023/CVE-2023-333xx/CVE-2023-33387.json) (`2023-06-22T11:15:09.613`) +* [CVE-2023-34601](CVE-2023/CVE-2023-346xx/CVE-2023-34601.json) (`2023-06-22T11:15:09.663`) +* [CVE-2023-35090](CVE-2023/CVE-2023-350xx/CVE-2023-35090.json) (`2023-06-22T11:15:09.727`) ### CVEs modified in the last Commit -Recently modified CVEs: `3` +Recently modified CVEs: `0` -* [CVE-2021-25315](CVE-2021/CVE-2021-253xx/CVE-2021-25315.json) (`2023-06-22T09:15:09.793`) -* [CVE-2022-21946](CVE-2022/CVE-2022-219xx/CVE-2022-21946.json) (`2023-06-22T09:15:10.693`) -* [CVE-2023-31975](CVE-2023/CVE-2023-319xx/CVE-2023-31975.json) (`2023-06-22T09:15:11.450`) ## Download and Usage