Auto-Update: 2023-07-03T16:00:29.471281+00:00

This commit is contained in:
cad-safe-bot 2023-07-03 16:00:32 +00:00
parent 1751b8e8b0
commit 79325de8de
9 changed files with 344 additions and 36 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47614",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-06-23T15:15:08.983",
"lastModified": "2023-06-23T15:49:09.940",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-03T14:17:04.383",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/mstore-api/wordpress-mstore-api-plugin-3-9-7-sql-injection?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.9.7",
"matchCriteriaId": "AD992842-C7D5-47D9-9385-5D46BF253AFD"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mstore-api/wordpress-mstore-api-plugin-3-9-7-sql-injection?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,15 +2,38 @@
"id": "CVE-2023-2068",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.477",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-03T14:51:27.457",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The File Manager Advanced Shortcode WordPress plugin through 2.3.2 does not adequately prevent uploading files with disallowed MIME types when using the shortcode. This leads to RCE in cases where the allowed MIME type list does not include PHP files. In the worst case, this is available to unauthenticated users."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
@ -23,10 +46,32 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://wpscan.com/vulnerability/58f72953-56d2-4d86-a49b-311b5fc58056",
"source": "contact@wpscan.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:advancedfilemanager:file_manager_advanced_shortcode:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.3.2",
"matchCriteriaId": "393F9456-E2D4-4F59-899A-9BE7B16B41E3"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/58f72953-56d2-4d86-a49b-311b5fc58056",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,15 +2,38 @@
"id": "CVE-2023-2178",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.540",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-03T14:34:20.600",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Aajoda Testimonials WordPress plugin before 2.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
@ -23,10 +46,32 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://wpscan.com/vulnerability/e84b71f9-4208-4efb-90e8-1c778e7d2ebb",
"source": "contact@wpscan.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:aajoda:aajoda_testimonials:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.2.2",
"matchCriteriaId": "1C9407C4-1358-4FED-A17D-6EB321784F17"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/e84b71f9-4208-4efb-90e8-1c778e7d2ebb",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-26258",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-03T15:15:10.377",
"lastModified": "2023-07-03T15:15:10.377",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Arcserve UDP through 9.0.6034 allows authentication bypass. The method getVersionInfo at WebServiceImpl/services/FlashServiceImpl leaks the AuthUUID token. This token can be used at /WebServiceImpl/services/VirtualStandbyServiceImpl to obtain a valid session. This session can be used to execute any task as administrator."
}
],
"metrics": {},
"references": [
{
"url": "https://www.arcserve.com/products/arcserve-udp",
"source": "cve@mitre.org"
},
{
"url": "https://www.mdsec.co.uk/2023/06/cve-2023-26258-remote-code-execution-in-arcserve-udp-backup/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-26509",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-03T15:15:10.437",
"lastModified": "2023-07-03T15:15:10.437",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "AnyDesk 7.0.8 allows remote Denial of Service."
}
],
"metrics": {},
"references": [
{
"url": "https://anydesk.com/cve/2023-26509/",
"source": "cve@mitre.org"
},
{
"url": "https://anydesk.com/en/downloads/windows",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/Fastor01/161211a8aef1278d942c551fd2065ca5",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-27908",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2023-06-23T20:15:08.997",
"lastModified": "2023-06-24T12:41:30.800",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-03T14:12:46.143",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted DLL file can be forced to write beyond allocated boundaries in the Autodesk installer when parsing the DLL files and could lead to a Privilege Escalation vulnerability."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0010",
"source": "psirt@autodesk.com"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:installer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.29.0.90",
"versionEndExcluding": "1.39.0.216",
"matchCriteriaId": "A30B3AC2-E0ED-457F-9526-A61F7AFE346D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0010",
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,23 +2,84 @@
"id": "CVE-2023-30260",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-23T12:15:09.520",
"lastModified": "2023-06-23T13:03:18.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-03T14:22:53.423",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://eldstal.se/advisories/230328-raspap.html",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://github.com/RaspAP/raspap-webgui/pull/1322",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:raspap:raspap:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.8.8",
"matchCriteriaId": "EDD9C6B2-1BC0-427A-8E82-771AE4AFDE34"
}
]
}
]
}
],
"references": [
{
"url": "https://eldstal.se/advisories/230328-raspap.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://github.com/RaspAP/raspap-webgui/pull/1322",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33580",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-26T16:15:09.637",
"lastModified": "2023-06-30T13:03:36.010",
"vulnStatus": "Analyzed",
"lastModified": "2023-07-03T15:15:10.493",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -73,12 +73,20 @@
"VDB Entry"
]
},
{
"url": "https://github.com/sudovivek/CVE/blob/main/CVE-2023-33580/CVE-2023-33580.txt",
"source": "cve@mitre.org"
},
{
"url": "https://phpgurukul.com/student-study-center-management-system-using-php-and-mysql/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.exploit-db.com/exploits/51528",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-07-03T14:00:25.812924+00:00
2023-07-03T16:00:29.471281+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-07-03T13:42:17.230000+00:00
2023-07-03T15:15:10.493000+00:00
```
### Last Data Feed Release
@ -29,28 +29,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
219056
219058
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `2`
* [CVE-2023-36053](CVE-2023/CVE-2023-360xx/CVE-2023-36053.json) (`2023-07-03T13:15:09.737`)
* [CVE-2023-26258](CVE-2023/CVE-2023-262xx/CVE-2023-26258.json) (`2023-07-03T15:15:10.377`)
* [CVE-2023-26509](CVE-2023/CVE-2023-265xx/CVE-2023-26509.json) (`2023-07-03T15:15:10.437`)
### CVEs modified in the last Commit
Recently modified CVEs: `8`
Recently modified CVEs: `6`
* [CVE-2023-3313](CVE-2023/CVE-2023-33xx/CVE-2023-3313.json) (`2023-07-03T13:02:14.210`)
* [CVE-2023-3438](CVE-2023/CVE-2023-34xx/CVE-2023-3438.json) (`2023-07-03T13:02:14.210`)
* [CVE-2023-3314](CVE-2023/CVE-2023-33xx/CVE-2023-3314.json) (`2023-07-03T13:02:14.210`)
* [CVE-2023-35797](CVE-2023/CVE-2023-357xx/CVE-2023-35797.json) (`2023-07-03T13:02:14.210`)
* [CVE-2023-36630](CVE-2023/CVE-2023-366xx/CVE-2023-36630.json) (`2023-07-03T13:03:32.567`)
* [CVE-2023-3396](CVE-2023/CVE-2023-33xx/CVE-2023-3396.json) (`2023-07-03T13:22:31.247`)
* [CVE-2023-2032](CVE-2023/CVE-2023-20xx/CVE-2023-2032.json) (`2023-07-03T13:33:17.640`)
* [CVE-2023-29437](CVE-2023/CVE-2023-294xx/CVE-2023-29437.json) (`2023-07-03T13:42:17.230`)
* [CVE-2022-47614](CVE-2022/CVE-2022-476xx/CVE-2022-47614.json) (`2023-07-03T14:17:04.383`)
* [CVE-2023-27908](CVE-2023/CVE-2023-279xx/CVE-2023-27908.json) (`2023-07-03T14:12:46.143`)
* [CVE-2023-30260](CVE-2023/CVE-2023-302xx/CVE-2023-30260.json) (`2023-07-03T14:22:53.423`)
* [CVE-2023-2178](CVE-2023/CVE-2023-21xx/CVE-2023-2178.json) (`2023-07-03T14:34:20.600`)
* [CVE-2023-2068](CVE-2023/CVE-2023-20xx/CVE-2023-2068.json) (`2023-07-03T14:51:27.457`)
* [CVE-2023-33580](CVE-2023/CVE-2023-335xx/CVE-2023-33580.json) (`2023-07-03T15:15:10.493`)
## Download and Usage