From 7d7728e2cb9ce84d8cd1503f9cba05e6283dda69 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 20 Jun 2023 08:51:53 +0000 Subject: [PATCH] Auto-Update: 2023-06-20T08:51:49.899643+00:00 --- CVE-2014/CVE-2014-1251xx/CVE-2014-125106.json | 8 ++- CVE-2019/CVE-2019-251xx/CVE-2019-25136.json | 4 +- CVE-2022/CVE-2022-468xx/CVE-2022-46850.json | 4 +- CVE-2022/CVE-2022-475xx/CVE-2022-47586.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48486.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48487.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48488.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48489.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48490.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48491.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48492.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48493.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48494.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48495.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48496.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48497.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48498.json | 4 +- CVE-2022/CVE-2022-484xx/CVE-2022-48499.json | 4 +- CVE-2022/CVE-2022-485xx/CVE-2022-48500.json | 4 +- CVE-2022/CVE-2022-485xx/CVE-2022-48501.json | 4 +- CVE-2022/CVE-2022-485xx/CVE-2022-48506.json | 4 +- CVE-2023/CVE-2023-03xx/CVE-2023-0368.json | 4 +- CVE-2023/CVE-2023-04xx/CVE-2023-0489.json | 4 +- CVE-2023/CVE-2023-22xx/CVE-2023-2221.json | 4 +- CVE-2023/CVE-2023-23xx/CVE-2023-2359.json | 4 +- CVE-2023/CVE-2023-23xx/CVE-2023-2399.json | 4 +- CVE-2023/CVE-2023-24xx/CVE-2023-2401.json | 4 +- CVE-2023/CVE-2023-24xx/CVE-2023-2492.json | 4 +- CVE-2023/CVE-2023-257xx/CVE-2023-25733.json | 4 +- CVE-2023/CVE-2023-257xx/CVE-2023-25736.json | 4 +- CVE-2023/CVE-2023-257xx/CVE-2023-25747.json | 4 +- CVE-2023/CVE-2023-25xx/CVE-2023-2527.json | 4 +- CVE-2023/CVE-2023-264xx/CVE-2023-26427.json | 59 +++++++++++++++++ CVE-2023/CVE-2023-264xx/CVE-2023-26428.json | 59 +++++++++++++++++ CVE-2023/CVE-2023-264xx/CVE-2023-26429.json | 59 +++++++++++++++++ CVE-2023/CVE-2023-264xx/CVE-2023-26431.json | 59 +++++++++++++++++ CVE-2023/CVE-2023-264xx/CVE-2023-26432.json | 59 +++++++++++++++++ CVE-2023/CVE-2023-264xx/CVE-2023-26433.json | 59 +++++++++++++++++ CVE-2023/CVE-2023-264xx/CVE-2023-26434.json | 59 +++++++++++++++++ CVE-2023/CVE-2023-264xx/CVE-2023-26435.json | 59 +++++++++++++++++ CVE-2023/CVE-2023-264xx/CVE-2023-26436.json | 59 +++++++++++++++++ CVE-2023/CVE-2023-26xx/CVE-2023-2600.json | 4 +- CVE-2023/CVE-2023-26xx/CVE-2023-2654.json | 4 +- CVE-2023/CVE-2023-26xx/CVE-2023-2684.json | 4 +- CVE-2023/CVE-2023-273xx/CVE-2023-27396.json | 4 +- CVE-2023/CVE-2023-279xx/CVE-2023-27992.json | 4 +- CVE-2023/CVE-2023-27xx/CVE-2023-2719.json | 4 +- CVE-2023/CVE-2023-27xx/CVE-2023-2742.json | 4 +- CVE-2023/CVE-2023-27xx/CVE-2023-2751.json | 4 +- CVE-2023/CVE-2023-27xx/CVE-2023-2779.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2805.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2811.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2812.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2899.json | 4 +- CVE-2023/CVE-2023-291xx/CVE-2023-29158.json | 4 +- CVE-2023/CVE-2023-295xx/CVE-2023-29531.json | 4 +- CVE-2023/CVE-2023-295xx/CVE-2023-29532.json | 4 +- CVE-2023/CVE-2023-295xx/CVE-2023-29534.json | 4 +- CVE-2023/CVE-2023-295xx/CVE-2023-29542.json | 4 +- CVE-2023/CVE-2023-295xx/CVE-2023-29545.json | 4 +- CVE-2023/CVE-2023-295xx/CVE-2023-29546.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2907.json | 4 +- CVE-2023/CVE-2023-307xx/CVE-2023-30759.json | 4 +- CVE-2023/CVE-2023-30xx/CVE-2023-3022.json | 4 +- CVE-2023/CVE-2023-312xx/CVE-2023-31239.json | 4 +- CVE-2023/CVE-2023-314xx/CVE-2023-31410.json | 4 +- CVE-2023/CVE-2023-314xx/CVE-2023-31411.json | 4 +- CVE-2023/CVE-2023-322xx/CVE-2023-32201.json | 4 +- CVE-2023/CVE-2023-322xx/CVE-2023-32208.json | 4 +- CVE-2023/CVE-2023-322xx/CVE-2023-32209.json | 4 +- CVE-2023/CVE-2023-322xx/CVE-2023-32210.json | 4 +- CVE-2023/CVE-2023-322xx/CVE-2023-32214.json | 4 +- CVE-2023/CVE-2023-322xx/CVE-2023-32216.json | 4 +- CVE-2023/CVE-2023-322xx/CVE-2023-32270.json | 4 +- CVE-2023/CVE-2023-322xx/CVE-2023-32273.json | 4 +- CVE-2023/CVE-2023-322xx/CVE-2023-32276.json | 4 +- CVE-2023/CVE-2023-322xx/CVE-2023-32288.json | 4 +- CVE-2023/CVE-2023-325xx/CVE-2023-32538.json | 4 +- CVE-2023/CVE-2023-325xx/CVE-2023-32542.json | 4 +- CVE-2023/CVE-2023-326xx/CVE-2023-32659.json | 4 +- CVE-2023/CVE-2023-32xx/CVE-2023-3214.json | 6 +- CVE-2023/CVE-2023-32xx/CVE-2023-3215.json | 6 +- CVE-2023/CVE-2023-32xx/CVE-2023-3216.json | 6 +- CVE-2023/CVE-2023-32xx/CVE-2023-3217.json | 6 +- CVE-2023/CVE-2023-332xx/CVE-2023-33213.json | 4 +- CVE-2023/CVE-2023-33xx/CVE-2023-3305.json | 4 +- CVE-2023/CVE-2023-33xx/CVE-2023-3306.json | 4 +- CVE-2023/CVE-2023-33xx/CVE-2023-3307.json | 8 ++- CVE-2023/CVE-2023-33xx/CVE-2023-3308.json | 4 +- CVE-2023/CVE-2023-33xx/CVE-2023-3309.json | 4 +- CVE-2023/CVE-2023-33xx/CVE-2023-3310.json | 4 +- CVE-2023/CVE-2023-33xx/CVE-2023-3311.json | 4 +- CVE-2023/CVE-2023-33xx/CVE-2023-3312.json | 4 +- CVE-2023/CVE-2023-33xx/CVE-2023-3315.json | 4 +- CVE-2023/CVE-2023-33xx/CVE-2023-3316.json | 4 +- CVE-2023/CVE-2023-33xx/CVE-2023-3318.json | 4 +- CVE-2023/CVE-2023-33xx/CVE-2023-3320.json | 59 +++++++++++++++++ CVE-2023/CVE-2023-33xx/CVE-2023-3325.json | 63 +++++++++++++++++++ CVE-2023/CVE-2023-341xx/CVE-2023-34155.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34156.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34158.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34159.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34160.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34161.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34162.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34163.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34166.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34167.json | 4 +- CVE-2023/CVE-2023-343xx/CVE-2023-34373.json | 4 +- CVE-2023/CVE-2023-344xx/CVE-2023-34414.json | 4 +- CVE-2023/CVE-2023-344xx/CVE-2023-34415.json | 4 +- CVE-2023/CVE-2023-344xx/CVE-2023-34416.json | 4 +- CVE-2023/CVE-2023-344xx/CVE-2023-34417.json | 4 +- CVE-2023/CVE-2023-344xx/CVE-2023-34461.json | 4 +- CVE-2023/CVE-2023-346xx/CVE-2023-34602.json | 4 +- CVE-2023/CVE-2023-346xx/CVE-2023-34603.json | 4 +- CVE-2023/CVE-2023-346xx/CVE-2023-34641.json | 4 +- CVE-2023/CVE-2023-346xx/CVE-2023-34642.json | 4 +- CVE-2023/CVE-2023-346xx/CVE-2023-34657.json | 8 ++- CVE-2023/CVE-2023-350xx/CVE-2023-35005.json | 4 +- CVE-2023/CVE-2023-357xx/CVE-2023-35772.json | 4 +- CVE-2023/CVE-2023-357xx/CVE-2023-35775.json | 4 +- CVE-2023/CVE-2023-357xx/CVE-2023-35776.json | 4 +- CVE-2023/CVE-2023-357xx/CVE-2023-35779.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35808.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35809.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35810.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35811.json | 8 ++- CVE-2023/CVE-2023-358xx/CVE-2023-35813.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35823.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35824.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35826.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35827.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35828.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35829.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35839.json | 8 ++- CVE-2023/CVE-2023-358xx/CVE-2023-35840.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35843.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35844.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35846.json | 8 ++- CVE-2023/CVE-2023-358xx/CVE-2023-35847.json | 8 ++- CVE-2023/CVE-2023-358xx/CVE-2023-35848.json | 8 ++- CVE-2023/CVE-2023-358xx/CVE-2023-35849.json | 8 ++- CVE-2023/CVE-2023-358xx/CVE-2023-35852.json | 8 ++- CVE-2023/CVE-2023-358xx/CVE-2023-35853.json | 8 ++- CVE-2023/CVE-2023-358xx/CVE-2023-35855.json | 8 ++- CVE-2023/CVE-2023-358xx/CVE-2023-35856.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35857.json | 8 ++- CVE-2023/CVE-2023-358xx/CVE-2023-35862.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35866.json | 4 +- CVE-2023/CVE-2023-358xx/CVE-2023-35878.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-358xx/CVE-2023-35882.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-358xx/CVE-2023-35884.json | 55 ++++++++++++++++ README.md | 54 +++++++++++++--- 154 files changed, 1205 insertions(+), 283 deletions(-) create mode 100644 CVE-2023/CVE-2023-264xx/CVE-2023-26427.json create mode 100644 CVE-2023/CVE-2023-264xx/CVE-2023-26428.json create mode 100644 CVE-2023/CVE-2023-264xx/CVE-2023-26429.json create mode 100644 CVE-2023/CVE-2023-264xx/CVE-2023-26431.json create mode 100644 CVE-2023/CVE-2023-264xx/CVE-2023-26432.json create mode 100644 CVE-2023/CVE-2023-264xx/CVE-2023-26433.json create mode 100644 CVE-2023/CVE-2023-264xx/CVE-2023-26434.json create mode 100644 CVE-2023/CVE-2023-264xx/CVE-2023-26435.json create mode 100644 CVE-2023/CVE-2023-264xx/CVE-2023-26436.json create mode 100644 CVE-2023/CVE-2023-33xx/CVE-2023-3320.json create mode 100644 CVE-2023/CVE-2023-33xx/CVE-2023-3325.json create mode 100644 CVE-2023/CVE-2023-358xx/CVE-2023-35878.json create mode 100644 CVE-2023/CVE-2023-358xx/CVE-2023-35882.json create mode 100644 CVE-2023/CVE-2023-358xx/CVE-2023-35884.json diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125106.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125106.json index 7913b6a66b4..1b9b5eb1ec0 100644 --- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125106.json +++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125106.json @@ -2,12 +2,16 @@ "id": "CVE-2014-125106", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-17T22:15:09.267", - "lastModified": "2023-06-17T22:15:09.267", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Nanopb before 0.3.1 allows size_t overflows in pb_dec_bytes and pb_dec_string." + }, + { + "lang": "es", + "value": "Nanopb antes de v0.3.1 permite desbordamientos \"size_t\" en \"pb_dec_bytes\" y \"pb_dec_string\". " } ], "metrics": {}, diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25136.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25136.json index 358ce7ec258..2aa4a33230e 100644 --- a/CVE-2019/CVE-2019-251xx/CVE-2019-25136.json +++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25136.json @@ -2,8 +2,8 @@ "id": "CVE-2019-25136", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:09.430", - "lastModified": "2023-06-19T11:15:09.430", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46850.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46850.json index f6d1dbbff15..3e079c5ad2b 100644 --- a/CVE-2022/CVE-2022-468xx/CVE-2022-46850.json +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46850.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46850", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-19T13:15:09.493", - "lastModified": "2023-06-19T13:15:09.493", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-475xx/CVE-2022-47586.json b/CVE-2022/CVE-2022-475xx/CVE-2022-47586.json index e870ce0a1cf..a337b889f24 100644 --- a/CVE-2022/CVE-2022-475xx/CVE-2022-47586.json +++ b/CVE-2022/CVE-2022-475xx/CVE-2022-47586.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47586", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-19T12:15:09.340", - "lastModified": "2023-06-19T12:15:09.340", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48486.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48486.json index 6e586141ffc..869ecf7dbb3 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48486.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48486.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48486", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.333", - "lastModified": "2023-06-19T17:15:11.333", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48487.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48487.json index 86262e29103..441a0fd333e 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48487.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48487.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48487", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.383", - "lastModified": "2023-06-19T17:15:11.383", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48488.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48488.json index 60adda6e256..29099354da4 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48488.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48488.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48488", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.427", - "lastModified": "2023-06-19T17:15:11.427", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48489.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48489.json index 8cc1e2a8ad0..83ed42ddc3a 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48489.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48489.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48489", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.467", - "lastModified": "2023-06-19T17:15:11.467", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48490.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48490.json index eb76792a171..e594be616cc 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48490.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48490.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48490", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.507", - "lastModified": "2023-06-19T17:15:11.507", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48491.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48491.json index 788784d1ea6..03788c39c2f 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48491.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48491.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48491", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.547", - "lastModified": "2023-06-19T17:15:11.547", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48492.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48492.json index f3b0856290e..34216790e57 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48492.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48492.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48492", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.590", - "lastModified": "2023-06-19T17:15:11.590", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48493.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48493.json index f33a974be13..3b9a25afcba 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48493.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48493.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48493", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.633", - "lastModified": "2023-06-19T17:15:11.633", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48494.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48494.json index 4a42fd4ba0e..458f0494975 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48494.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48494.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48494", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.673", - "lastModified": "2023-06-19T17:15:11.673", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48495.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48495.json index 0ead1a07aee..1731ac9377c 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48495.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48495.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48495", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.710", - "lastModified": "2023-06-19T17:15:11.710", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48496.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48496.json index af688216e60..de71b0a0dca 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48496.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48496.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48496", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.753", - "lastModified": "2023-06-19T17:15:11.753", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48497.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48497.json index 98bcd789945..e50e267ae58 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48497.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48497.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48497", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.793", - "lastModified": "2023-06-19T17:15:11.793", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48498.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48498.json index aeab1b0c725..50d37fd6d0a 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48498.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48498.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48498", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.833", - "lastModified": "2023-06-19T17:15:11.833", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48499.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48499.json index a63dbdb1610..0d241cb47a5 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48499.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48499.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48499", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.880", - "lastModified": "2023-06-19T17:15:11.880", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48500.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48500.json index a66f36a7e7a..7de4f240045 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48500.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48500.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48500", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.920", - "lastModified": "2023-06-19T17:15:11.920", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48501.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48501.json index f80c2467c78..b32ebbf80c0 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48501.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48501.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48501", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.960", - "lastModified": "2023-06-19T17:15:11.960", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48506.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48506.json index 0c78dcee7d5..eef1b8610f1 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48506.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48506.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48506", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T16:15:09.640", - "lastModified": "2023-06-19T16:15:09.640", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0368.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0368.json index 2e935cfae4f..344d54d94f2 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0368.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0368.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0368", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:09.537", - "lastModified": "2023-06-19T11:15:09.537", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-04xx/CVE-2023-0489.json b/CVE-2023/CVE-2023-04xx/CVE-2023-0489.json index 40bb0cfec6e..6088bacb274 100644 --- a/CVE-2023/CVE-2023-04xx/CVE-2023-0489.json +++ b/CVE-2023/CVE-2023-04xx/CVE-2023-0489.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0489", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:09.607", - "lastModified": "2023-06-19T11:15:09.607", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2221.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2221.json index 80799012b7e..5771330cd10 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2221.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2221.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2221", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:09.987", - "lastModified": "2023-06-19T11:15:09.987", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2359.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2359.json index f673f94ff74..e236e7a69d9 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2359.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2359.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2359", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.043", - "lastModified": "2023-06-19T11:15:10.043", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2399.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2399.json index e3ef0a70158..744d5bdf3b7 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2399.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2399.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2399", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.100", - "lastModified": "2023-06-19T11:15:10.100", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2401.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2401.json index 0b867acd5de..050f44c1e46 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2401.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2401.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2401", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.153", - "lastModified": "2023-06-19T11:15:10.153", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2492.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2492.json index d9bcd012683..41dab6b6a10 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2492.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2492.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2492", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.213", - "lastModified": "2023-06-19T11:15:10.213", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25733.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25733.json index 93d850d7032..98c0137fb46 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25733.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25733.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25733", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:09.670", - "lastModified": "2023-06-19T11:15:09.670", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25736.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25736.json index 1c2e11248f5..bf5e0d44c89 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25736.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25736.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25736", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:09.713", - "lastModified": "2023-06-19T11:15:09.713", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25747.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25747.json index 5363bff3a7e..e9b7a39044d 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25747.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25747.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25747", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:09.753", - "lastModified": "2023-06-19T11:15:09.753", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2527.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2527.json index bb3176a637d..889a149162a 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2527.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2527.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2527", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.270", - "lastModified": "2023-06-19T11:15:10.270", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-264xx/CVE-2023-26427.json b/CVE-2023/CVE-2023-264xx/CVE-2023-26427.json new file mode 100644 index 00000000000..a1534a2d537 --- /dev/null +++ b/CVE-2023/CVE-2023-264xx/CVE-2023-26427.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-26427", + "sourceIdentifier": "security@open-xchange.com", + "published": "2023-06-20T08:15:09.073", + "lastModified": "2023-06-20T08:15:09.073", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Default permissions for a properties file were too permissive. Local system users could read potentially sensitive information. We updated the default permissions for noreply.properties set during package installation. No publicly available exploits are known.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.2, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0002.json", + "source": "security@open-xchange.com" + }, + { + "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6219_7.10.6_2023-03-20.pdf", + "source": "security@open-xchange.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-264xx/CVE-2023-26428.json b/CVE-2023/CVE-2023-264xx/CVE-2023-26428.json new file mode 100644 index 00000000000..c41a0167cea --- /dev/null +++ b/CVE-2023/CVE-2023-264xx/CVE-2023-26428.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-26428", + "sourceIdentifier": "security@open-xchange.com", + "published": "2023-06-20T08:15:09.163", + "lastModified": "2023-06-20T08:15:09.163", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Attackers can successfully request arbitrary snippet IDs, including E-Mail signatures of other users within the same context. Signatures of other users could be read even though they are not explicitly shared. We improved permission handling when requesting snippets that are not explicitly shared with other users. No publicly available exploits are known.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0002.json", + "source": "security@open-xchange.com" + }, + { + "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6219_7.10.6_2023-03-20.pdf", + "source": "security@open-xchange.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-264xx/CVE-2023-26429.json b/CVE-2023/CVE-2023-264xx/CVE-2023-26429.json new file mode 100644 index 00000000000..69e6b9d19fe --- /dev/null +++ b/CVE-2023/CVE-2023-264xx/CVE-2023-26429.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-26429", + "sourceIdentifier": "security@open-xchange.com", + "published": "2023-06-20T08:15:09.230", + "lastModified": "2023-06-20T08:15:09.230", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Control characters were not removed when exporting user feedback content. This allowed attackers to include unexpected content via user feedback and potentially break the exported data structure. We now drop all control characters that are not whitespace character during the export. No publicly available exploits are known.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0002.json", + "source": "security@open-xchange.com" + }, + { + "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6219_7.10.6_2023-03-20.pdf", + "source": "security@open-xchange.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-264xx/CVE-2023-26431.json b/CVE-2023/CVE-2023-264xx/CVE-2023-26431.json new file mode 100644 index 00000000000..d7d22183167 --- /dev/null +++ b/CVE-2023/CVE-2023-264xx/CVE-2023-26431.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-26431", + "sourceIdentifier": "security@open-xchange.com", + "published": "2023-06-20T08:15:09.297", + "lastModified": "2023-06-20T08:15:09.297", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IPv4-mapped IPv6 addresses did not get recognized as \"local\" by the code and a connection attempt is made. Attackers with access to user accounts could use this to bypass existing deny-list functionality and trigger requests to restricted network infrastructure to gain insight about topology and running services. We now respect possible IPV4-mapped IPv6 addresses when checking if contained in a deny-list. No publicly available exploits are known.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0002.json", + "source": "security@open-xchange.com" + }, + { + "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6219_7.10.6_2023-03-20.pdf", + "source": "security@open-xchange.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-264xx/CVE-2023-26432.json b/CVE-2023/CVE-2023-264xx/CVE-2023-26432.json new file mode 100644 index 00000000000..d1420882cc2 --- /dev/null +++ b/CVE-2023/CVE-2023-264xx/CVE-2023-26432.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-26432", + "sourceIdentifier": "security@open-xchange.com", + "published": "2023-06-20T08:15:09.360", + "lastModified": "2023-06-20T08:15:09.360", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "When adding an external mail account, processing of SMTP \"capabilities\" responses are not limited to plausible sizes. Attacker with access to a rogue SMTP service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted SMTP server response to reasonable length/size. No publicly available exploits are known.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0002.json", + "source": "security@open-xchange.com" + }, + { + "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6219_7.10.6_2023-03-20.pdf", + "source": "security@open-xchange.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-264xx/CVE-2023-26433.json b/CVE-2023/CVE-2023-264xx/CVE-2023-26433.json new file mode 100644 index 00000000000..4149eebd947 --- /dev/null +++ b/CVE-2023/CVE-2023-264xx/CVE-2023-26433.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-26433", + "sourceIdentifier": "security@open-xchange.com", + "published": "2023-06-20T08:15:09.427", + "lastModified": "2023-06-20T08:15:09.427", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "When adding an external mail account, processing of IMAP \"capabilities\" responses are not limited to plausible sizes. Attacker with access to a rogue IMAP service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted IMAP server response to reasonable length/size. No publicly available exploits are known.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0002.json", + "source": "security@open-xchange.com" + }, + { + "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6219_7.10.6_2023-03-20.pdf", + "source": "security@open-xchange.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-264xx/CVE-2023-26434.json b/CVE-2023/CVE-2023-264xx/CVE-2023-26434.json new file mode 100644 index 00000000000..882a520c76f --- /dev/null +++ b/CVE-2023/CVE-2023-264xx/CVE-2023-26434.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-26434", + "sourceIdentifier": "security@open-xchange.com", + "published": "2023-06-20T08:15:09.487", + "lastModified": "2023-06-20T08:15:09.487", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "When adding an external mail account, processing of POP3 \"capabilities\" responses are not limited to plausible sizes. Attacker with access to a rogue POP3 service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted POP3 server response to reasonable length/size. No publicly available exploits are known.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0002.json", + "source": "security@open-xchange.com" + }, + { + "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6219_7.10.6_2023-03-20.pdf", + "source": "security@open-xchange.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-264xx/CVE-2023-26435.json b/CVE-2023/CVE-2023-264xx/CVE-2023-26435.json new file mode 100644 index 00000000000..f361737aeca --- /dev/null +++ b/CVE-2023/CVE-2023-264xx/CVE-2023-26435.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-26435", + "sourceIdentifier": "security@open-xchange.com", + "published": "2023-06-20T08:15:09.547", + "lastModified": "2023-06-20T08:15:09.547", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "It was possible to call filesystem and network references using the local LibreOffice instance using manipulated ODT documents. Attackers could discover restricted network topology and services as well as including local files with read permissions of the open-xchange system user. This was limited to specific file-types, like images. We have improved existing content filters and validators to avoid including any local resources. No publicly available exploits are known.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0002.json", + "source": "security@open-xchange.com" + }, + { + "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6219_7.10.6_2023-03-20.pdf", + "source": "security@open-xchange.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-264xx/CVE-2023-26436.json b/CVE-2023/CVE-2023-264xx/CVE-2023-26436.json new file mode 100644 index 00000000000..5043fa9b538 --- /dev/null +++ b/CVE-2023/CVE-2023-264xx/CVE-2023-26436.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-26436", + "sourceIdentifier": "security@open-xchange.com", + "published": "2023-06-20T08:15:09.607", + "lastModified": "2023-06-20T08:15:09.607", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Attackers with access to the \"documentconverterws\" API were able to inject serialized Java objects, that were not properly checked during deserialization. Access to this API endpoint is restricted to local networks by default. Arbitrary code could be injected that is being executed when processing the request. A check has been introduced to restrict processing of legal and expected classes for this API. We now log a warning in case there are attempts to inject illegal classes. No publicly available exploits are known.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0002.json", + "source": "security@open-xchange.com" + }, + { + "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6219_7.10.6_2023-03-20.pdf", + "source": "security@open-xchange.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2600.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2600.json index 3d94e1f0dd8..0a8357ec9e6 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2600.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2600.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2600", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.327", - "lastModified": "2023-06-19T11:15:10.327", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2654.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2654.json index 5802f24c34a..d75c88c79ad 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2654.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2654.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2654", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.380", - "lastModified": "2023-06-19T11:15:10.380", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2684.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2684.json index 9b7d4d0a46d..e73af87bcf6 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2684.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2684.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2684", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.433", - "lastModified": "2023-06-19T11:15:10.433", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27396.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27396.json index 5f0ec86af45..94b4e5ce93b 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27396.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27396.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27396", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-19T05:15:09.187", - "lastModified": "2023-06-19T05:15:09.187", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27992.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27992.json index f975daebf2d..2e09a4e2f83 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27992.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27992.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27992", "sourceIdentifier": "security@zyxel.com.tw", "published": "2023-06-19T12:15:09.433", - "lastModified": "2023-06-19T12:15:09.433", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2719.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2719.json index 22d947ade55..55c2923bcb7 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2719.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2719.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2719", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.487", - "lastModified": "2023-06-19T11:15:10.487", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2742.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2742.json index fdd1ee7cacf..b75cbe1657c 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2742.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2742.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2742", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.543", - "lastModified": "2023-06-19T11:15:10.543", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2751.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2751.json index cf8563cf63d..03f11cb8002 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2751.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2751.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2751", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.600", - "lastModified": "2023-06-19T11:15:10.600", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2779.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2779.json index e6d8a6b02d4..838a60b1fa4 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2779.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2779.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2779", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.653", - "lastModified": "2023-06-19T11:15:10.653", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2805.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2805.json index b094f0f0ab6..237a859df8a 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2805.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2805.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2805", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.710", - "lastModified": "2023-06-19T11:15:10.710", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2811.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2811.json index 327d2798f2c..601c4a1e23f 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2811.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2811.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2811", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.763", - "lastModified": "2023-06-19T11:15:10.763", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2812.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2812.json index 4768602cdbd..14e645e68f8 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2812.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2812.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2812", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.813", - "lastModified": "2023-06-19T11:15:10.813", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2899.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2899.json index c0a4a091d57..9bfecb27617 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2899.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2899.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2899", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-19T11:15:10.867", - "lastModified": "2023-06-19T11:15:10.867", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29158.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29158.json index 1796e91513d..c888f4397cc 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29158.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29158.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29158", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-06-19T21:15:42.033", - "lastModified": "2023-06-19T21:15:42.033", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29531.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29531.json index 6ea8e642915..92614cfb1b3 100644 --- a/CVE-2023/CVE-2023-295xx/CVE-2023-29531.json +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29531.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29531", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T10:15:09.373", - "lastModified": "2023-06-19T10:15:09.373", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29532.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29532.json index 01a04a15a5f..81754e6c079 100644 --- a/CVE-2023/CVE-2023-295xx/CVE-2023-29532.json +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29532.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29532", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T10:15:09.430", - "lastModified": "2023-06-19T10:15:09.430", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29534.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29534.json index 05726fc0f1e..5506e417063 100644 --- a/CVE-2023/CVE-2023-295xx/CVE-2023-29534.json +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29534.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29534", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:09.797", - "lastModified": "2023-06-19T11:15:09.797", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29542.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29542.json index 5a8b50bb06a..389e4d23264 100644 --- a/CVE-2023/CVE-2023-295xx/CVE-2023-29542.json +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29542.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29542", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:09.847", - "lastModified": "2023-06-19T11:15:09.847", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29545.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29545.json index eb6dac97d74..a3b90fda1df 100644 --- a/CVE-2023/CVE-2023-295xx/CVE-2023-29545.json +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29545.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29545", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:09.890", - "lastModified": "2023-06-19T11:15:09.890", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29546.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29546.json index 7398946aeee..0975137774a 100644 --- a/CVE-2023/CVE-2023-295xx/CVE-2023-29546.json +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29546.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29546", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:09.943", - "lastModified": "2023-06-19T11:15:09.943", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2907.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2907.json index 70dc91129ac..ebfa17ce0d1 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2907.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2907.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2907", "sourceIdentifier": "cve@usom.gov.tr", "published": "2023-06-19T13:15:09.580", - "lastModified": "2023-06-19T13:15:09.580", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30759.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30759.json index f791edb3368..c92b9a1b646 100644 --- a/CVE-2023/CVE-2023-307xx/CVE-2023-30759.json +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30759.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30759", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-19T05:15:09.290", - "lastModified": "2023-06-19T05:15:09.290", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3022.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3022.json index 63ffc0999dd..90eb91c7a37 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3022.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3022.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3022", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-19T18:15:09.870", - "lastModified": "2023-06-19T18:15:09.870", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31239.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31239.json index c5ca6bde1e7..cec7d242a00 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31239.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31239.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31239", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-19T05:15:09.330", - "lastModified": "2023-06-19T05:15:09.330", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31410.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31410.json index 4ae4e74a60e..29aaa2e3e7d 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31410.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31410.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31410", "sourceIdentifier": "psirt@sick.de", "published": "2023-06-19T15:15:09.173", - "lastModified": "2023-06-19T15:15:09.173", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31411.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31411.json index 466dffdde06..8f8a845fcf5 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31411.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31411.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31411", "sourceIdentifier": "psirt@sick.de", "published": "2023-06-19T15:15:09.230", - "lastModified": "2023-06-19T15:15:09.230", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32201.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32201.json index b0572d0fdc6..fd249058865 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32201.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32201.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32201", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-19T05:15:09.367", - "lastModified": "2023-06-19T05:15:09.367", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32208.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32208.json index 507cfb36493..46db55c0f7b 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32208.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32208.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32208", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T10:15:09.480", - "lastModified": "2023-06-19T10:15:09.480", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32209.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32209.json index 7bc823f4127..a6f4003d5fa 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32209.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32209.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32209", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T10:15:09.523", - "lastModified": "2023-06-19T10:15:09.523", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32210.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32210.json index d55761d8ca1..a3fa1455b38 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32210.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32210.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32210", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T10:15:09.573", - "lastModified": "2023-06-19T10:15:09.573", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32214.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32214.json index baeaa34b1ec..574628494bf 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32214.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32214.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32214", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T10:15:09.613", - "lastModified": "2023-06-19T10:15:09.613", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32216.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32216.json index e28acc40d47..810aa725751 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32216.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32216.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32216", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T10:15:09.660", - "lastModified": "2023-06-19T10:15:09.660", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32270.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32270.json index 62debae1dd1..e262e6798b4 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32270.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32270.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32270", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-19T05:15:09.407", - "lastModified": "2023-06-19T05:15:09.407", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32273.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32273.json index 82caf18ae08..801f7619416 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32273.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32273.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32273", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-19T05:15:09.443", - "lastModified": "2023-06-19T05:15:09.443", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32276.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32276.json index be54d2fdc7c..b8b4d20cc17 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32276.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32276.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32276", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-19T05:15:09.480", - "lastModified": "2023-06-19T05:15:09.480", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32288.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32288.json index 69aa75dedbb..9d617611e05 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32288.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32288.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32288", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-19T05:15:09.517", - "lastModified": "2023-06-19T05:15:09.517", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32538.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32538.json index 4cdae97a425..91336870e12 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32538.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32538.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32538", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-19T05:15:09.553", - "lastModified": "2023-06-19T05:15:09.553", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32542.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32542.json index 0ea5b571206..1671355da80 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32542.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32542.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32542", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-19T05:15:09.593", - "lastModified": "2023-06-19T05:15:09.593", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32659.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32659.json index 76cb9046fe4..4b08a4cf4ca 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32659.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32659.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32659", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-06-19T21:15:42.113", - "lastModified": "2023-06-19T21:15:42.113", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3214.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3214.json index b199373edd8..7eab00051f1 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3214.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3214.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3214", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-06-13T18:15:22.170", - "lastModified": "2023-06-16T04:15:14.263", + "lastModified": "2023-06-20T02:15:43.417", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://crbug.com/1450568", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5428", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3215.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3215.json index 534143f9b65..552f279460b 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3215.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3215.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3215", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-06-13T18:15:22.223", - "lastModified": "2023-06-16T04:15:14.337", + "lastModified": "2023-06-20T02:15:43.477", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://crbug.com/1446274", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5428", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3216.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3216.json index f81bd43093a..c1878c193f3 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3216.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3216.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3216", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-06-13T18:15:22.273", - "lastModified": "2023-06-16T04:15:14.393", + "lastModified": "2023-06-20T02:15:43.513", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://crbug.com/1450114", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5428", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3217.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3217.json index cbedf756d66..f608dc321ad 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3217.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3217.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3217", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-06-13T18:15:22.320", - "lastModified": "2023-06-16T04:15:14.453", + "lastModified": "2023-06-20T02:15:43.550", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://crbug.com/1450601", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5428", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33213.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33213.json index 6e6149ba8aa..589c4606fee 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33213.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33213.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33213", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-19T13:15:09.743", - "lastModified": "2023-06-19T13:15:09.743", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3305.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3305.json index caf811c4157..3e3886f5c0e 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3305.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3305.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3305", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-18T08:15:09.023", - "lastModified": "2023-06-18T08:15:09.023", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3306.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3306.json index c13ef255861..4c5ded24844 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3306.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3306.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3306", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-18T08:15:09.287", - "lastModified": "2023-06-18T08:15:09.287", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3307.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3307.json index 9b76b5e4ff0..5dad640453c 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3307.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3307.json @@ -2,12 +2,16 @@ "id": "CVE-2023-3307", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-18T09:15:09.330", - "lastModified": "2023-06-18T09:15:09.330", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in miniCal 1.0.0. It has been rated as critical. This issue affects some unknown processing of the file /booking/show_bookings/. The manipulation of the argument search_query leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231803. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en miniCal v1.0.0. Se ha calificado como cr\u00edtica. Este problema afecta a alg\u00fan procesamiento desconocido del archivo \"/booking/show_bookings/\". La manipulaci\u00f3n del argumento \"search_query\" conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido revelado al p\u00fablico y puede ser utilizado. El identificador asociado a esta vulnerabilidad es VDB-231803. NOTA: Se contact\u00f3 con el proveedor con antelaci\u00f3n acerca de esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3308.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3308.json index e0f518f155e..bd58c6da3d9 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3308.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3308.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3308", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-18T09:15:09.677", - "lastModified": "2023-06-18T09:15:09.677", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json index 8c7bd0a684c..1c6bfa9968f 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3309", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-18T12:15:09.267", - "lastModified": "2023-06-19T08:15:09.270", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3310.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3310.json index a3527e7046b..e1d01cf4483 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3310.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3310.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3310", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-18T12:15:09.347", - "lastModified": "2023-06-18T12:15:09.347", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3311.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3311.json index 278dbd7d397..646e9f0d256 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3311.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3311.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3311", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-18T15:15:11.660", - "lastModified": "2023-06-19T15:15:10.560", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3312.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3312.json index 66e12d1f009..c2bbb1100a7 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3312.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3312.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3312", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-19T18:15:09.920", - "lastModified": "2023-06-19T18:15:09.920", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3315.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3315.json index bb3a47090df..f277ed813cd 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3315.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3315.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3315", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-06-19T21:15:42.177", - "lastModified": "2023-06-19T21:15:42.177", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3316.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3316.json index f99a3ce1057..8303a4ecad5 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3316.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3316.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3316", "sourceIdentifier": "reefs@jfrog.com", "published": "2023-06-19T12:15:09.520", - "lastModified": "2023-06-19T12:15:09.520", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3318.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3318.json index 873d94411f9..06ed19b235e 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3318.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3318.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3318", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-19T13:15:10.173", - "lastModified": "2023-06-19T15:15:10.617", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3320.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3320.json new file mode 100644 index 00000000000..0641ffdd8ec --- /dev/null +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3320.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-3320", + "sourceIdentifier": "security@wordfence.com", + "published": "2023-06-20T03:15:09.100", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The WP Sticky Social plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.1. This is due to missing nonce validation in the ~/admin/views/admin.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2926150%40wp-sticky-social&new=2926150%40wp-sticky-social", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a272e12b-97a2-421a-a703-3acce2ed8313?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3325.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3325.json new file mode 100644 index 00000000000..e6d96403ae6 --- /dev/null +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3325.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-3325", + "sourceIdentifier": "security@wordfence.com", + "published": "2023-06-20T05:15:09.170", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The CMS Commander plugin for WordPress is vulnerable to authorization bypass due to the use of an insufficiently unique cryptographic signature on the 'cmsc_add_site' function in versions up to, and including, 2.287. This makes it possible for unauthenticated attackers to the plugin to change the '_cmsc_public_key' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation. This can only be exploited if the plugin has not been configured yet, however, if combined with another arbitrary plugin installation and activation vulnerability, the impact can be severe." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/cms-commander-client/tags/2.287/init.php#L88", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/2927811/cms-commander-client", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca37d453-9f9a-46b2-a17f-65a16e3e2ed1?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34155.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34155.json index ed06edd1918..d0cfbc29246 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34155.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34155.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34155", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.007", - "lastModified": "2023-06-19T17:15:12.007", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34156.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34156.json index 01ca63146dd..898a3b22339 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34156.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34156.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34156", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.050", - "lastModified": "2023-06-19T17:15:12.050", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34158.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34158.json index 6236e96de0c..828b7afc67a 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34158.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34158.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34158", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.090", - "lastModified": "2023-06-19T17:15:12.090", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34159.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34159.json index 8da1fba634a..2ab5097d95b 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34159.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34159.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34159", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.130", - "lastModified": "2023-06-19T17:15:12.130", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34160.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34160.json index 95bd5463d96..dec4207c1c7 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34160.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34160.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34160", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.170", - "lastModified": "2023-06-19T17:15:12.170", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34161.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34161.json index 6ef96615a82..b25dd79d007 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34161.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34161.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34161", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.207", - "lastModified": "2023-06-19T17:15:12.207", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34162.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34162.json index eaca54d0dca..0bda8a4b2d4 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34162.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34162.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34162", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.247", - "lastModified": "2023-06-19T17:15:12.247", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34163.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34163.json index d86f73f1f7d..a05531b6e6b 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34163.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34163.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34163", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.287", - "lastModified": "2023-06-19T17:15:12.287", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34166.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34166.json index 1bf04d59483..b0cc69a23de 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34166.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34166.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34166", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.327", - "lastModified": "2023-06-19T17:15:12.327", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34167.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34167.json index 11c517614f4..f7251e910c7 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34167.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34167.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34167", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.367", - "lastModified": "2023-06-19T17:15:12.367", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34373.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34373.json index e639a483835..03c96930009 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34373.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34373.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34373", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-19T13:15:09.813", - "lastModified": "2023-06-19T13:15:09.813", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34414.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34414.json index 5cb0300d5f0..6f42faade9c 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34414.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34414.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34414", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:10.927", - "lastModified": "2023-06-19T11:15:10.927", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34415.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34415.json index 9979428ad53..ee732c782b5 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34415.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34415.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34415", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:10.980", - "lastModified": "2023-06-19T11:15:10.980", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34416.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34416.json index 68ce165faea..156bd21b710 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34416.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34416.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34416", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:11.023", - "lastModified": "2023-06-19T11:15:11.023", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34417.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34417.json index d72e5a3a3f4..cf89d9dcf16 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34417.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34417.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34417", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:11.067", - "lastModified": "2023-06-19T11:15:11.067", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34461.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34461.json index 1f078b17cca..5d366e5db42 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34461.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34461.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34461", "sourceIdentifier": "security-advisories@github.com", "published": "2023-06-19T18:15:09.763", - "lastModified": "2023-06-19T18:15:09.763", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-346xx/CVE-2023-34602.json b/CVE-2023/CVE-2023-346xx/CVE-2023-34602.json index 2330e1f33e5..21cce9e37a8 100644 --- a/CVE-2023/CVE-2023-346xx/CVE-2023-34602.json +++ b/CVE-2023/CVE-2023-346xx/CVE-2023-34602.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34602", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T06:15:09.047", - "lastModified": "2023-06-19T06:15:09.047", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-346xx/CVE-2023-34603.json b/CVE-2023/CVE-2023-346xx/CVE-2023-34603.json index f04a0c8d91e..57e4866ab23 100644 --- a/CVE-2023/CVE-2023-346xx/CVE-2023-34603.json +++ b/CVE-2023/CVE-2023-346xx/CVE-2023-34603.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34603", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T06:15:09.180", - "lastModified": "2023-06-19T06:15:09.180", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-346xx/CVE-2023-34641.json b/CVE-2023/CVE-2023-346xx/CVE-2023-34641.json index c5a6f7c323e..ca7ae12c042 100644 --- a/CVE-2023/CVE-2023-346xx/CVE-2023-34641.json +++ b/CVE-2023/CVE-2023-346xx/CVE-2023-34641.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34641", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T05:15:09.630", - "lastModified": "2023-06-19T05:15:09.630", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-346xx/CVE-2023-34642.json b/CVE-2023/CVE-2023-346xx/CVE-2023-34642.json index cbe87eaa960..0e25aeb8887 100644 --- a/CVE-2023/CVE-2023-346xx/CVE-2023-34642.json +++ b/CVE-2023/CVE-2023-346xx/CVE-2023-34642.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34642", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T05:15:09.670", - "lastModified": "2023-06-19T05:15:09.670", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-346xx/CVE-2023-34657.json b/CVE-2023/CVE-2023-346xx/CVE-2023-34657.json index 5f9b64ab1bd..cdb6e2ad03d 100644 --- a/CVE-2023/CVE-2023-346xx/CVE-2023-34657.json +++ b/CVE-2023/CVE-2023-346xx/CVE-2023-34657.json @@ -2,12 +2,16 @@ "id": "CVE-2023-34657", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T04:15:10.873", - "lastModified": "2023-06-19T04:15:10.873", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in Eyoucms v1.6.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the web_recordnum parameter." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en Eyoucms v1.6.2 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de una carga \u00fatil manipulada inyectada en el par\u00e1metro \"web_recordnum\". " } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35005.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35005.json index 77fb19b9194..08c56c6c3a5 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35005.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35005.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35005", "sourceIdentifier": "security@apache.org", "published": "2023-06-19T09:15:09.380", - "lastModified": "2023-06-19T09:15:09.380", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35772.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35772.json index 705200150f5..3de40b3fab3 100644 --- a/CVE-2023/CVE-2023-357xx/CVE-2023-35772.json +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35772.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35772", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-19T14:15:09.620", - "lastModified": "2023-06-19T14:15:09.620", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35775.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35775.json index b232158b772..52a016b845c 100644 --- a/CVE-2023/CVE-2023-357xx/CVE-2023-35775.json +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35775.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35775", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-19T14:15:09.693", - "lastModified": "2023-06-19T14:15:09.693", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35776.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35776.json index 9fdba8d9a67..ac66063dda8 100644 --- a/CVE-2023/CVE-2023-357xx/CVE-2023-35776.json +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35776.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35776", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-19T14:15:09.763", - "lastModified": "2023-06-19T14:15:09.763", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35779.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35779.json index eb5c1ca43a9..2b869674633 100644 --- a/CVE-2023/CVE-2023-357xx/CVE-2023-35779.json +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35779.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35779", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-19T14:15:09.827", - "lastModified": "2023-06-19T14:15:09.827", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35808.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35808.json index e28a9d983e1..4f43391d830 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35808.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35808.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35808", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-17T22:15:09.477", - "lastModified": "2023-06-17T22:15:09.477", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35809.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35809.json index 22a50883784..ff3438324ae 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35809.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35809.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35809", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-17T22:15:09.517", - "lastModified": "2023-06-17T22:15:09.517", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35810.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35810.json index da3d49793b4..6f47209dd4d 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35810.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35810.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35810", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-17T22:15:09.553", - "lastModified": "2023-06-17T22:15:09.553", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35811.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35811.json index 1d968915d8a..161f9d5e0fc 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35811.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35811.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35811", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-17T22:15:09.590", - "lastModified": "2023-06-17T22:15:09.590", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. Two SQL Injection vectors have been identified in the REST API. By using crafted requests, custom SQL code can be injected through the REST API because of missing input validation. Regular user privileges can use used for exploitation. Editions other than Enterprise are also affected." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en SugarCRM Enterprise antes de v11.0.6 y v12.x antes de v12.0.3. Se han identificado dos vectores de inyecci\u00f3n SQL en la API REST. Mediante el uso de peticiones manipuladas, c\u00f3digo SQL personalizado puede ser inyectado a trav\u00e9s de la API REST debido a la falta de validaci\u00f3n de entrada. Los privilegios de un usuario normal pueden utilizarse para la explotaci\u00f3n. Las ediciones distintas a Enterprise tambi\u00e9n se ven afectadas. " } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35813.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35813.json index e331ec7dd32..07124a520e7 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35813.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35813.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35813", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-17T23:15:09.137", - "lastModified": "2023-06-17T23:15:09.137", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35823.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35823.json index a93a0924833..16d22997d33 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35823.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35823.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35823", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-18T22:15:09.187", - "lastModified": "2023-06-18T22:15:09.187", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35824.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35824.json index 09fc1353766..824f8255d89 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35824.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35824.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35824", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-18T22:15:09.240", - "lastModified": "2023-06-18T22:15:09.240", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35826.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35826.json index a5e7ad5dcfe..750faafc05a 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35826.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35826.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35826", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-18T22:15:09.330", - "lastModified": "2023-06-18T22:15:09.330", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35827.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35827.json index a7b8cb782ca..7fb1c2be897 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35827.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35827.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35827", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-18T22:15:09.373", - "lastModified": "2023-06-18T22:15:09.373", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35828.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35828.json index 822e53c5f90..32878184efc 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35828.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35828.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35828", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-18T22:15:09.417", - "lastModified": "2023-06-18T22:15:09.417", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35829.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35829.json index cbf652c36f2..7c8bee0e638 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35829.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35829.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35829", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-18T22:15:09.460", - "lastModified": "2023-06-18T22:15:09.460", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35839.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35839.json index 5a4cdbccaed..4c3223fdc57 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35839.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35839.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35839", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T01:15:08.667", - "lastModified": "2023-06-19T01:15:08.667", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Solon before 2.3.3 allows Deserialization of Untrusted Data." + }, + { + "lang": "es", + "value": "Solon antes de la versi\u00f3n 2.3.3 permite la Deserializaci\u00f3n de Datos No Confiables. " } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35840.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35840.json index 0d4dacbc89e..88a9a11909e 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35840.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35840.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35840", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T01:15:08.710", - "lastModified": "2023-06-19T01:15:08.710", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35843.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35843.json index 4e548e25d97..bf8a1293f35 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35843.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35843.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35843", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T18:15:09.830", - "lastModified": "2023-06-19T18:15:09.830", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35844.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35844.json index 3b50033a7e8..353ed566010 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35844.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35844.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35844", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T02:15:08.903", - "lastModified": "2023-06-19T02:15:08.903", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35846.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35846.json index 16b02ef5da7..5bda6012edf 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35846.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35846.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35846", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T03:15:09.227", - "lastModified": "2023-06-19T03:15:09.227", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not check the transport layer length in a frame before performing port filtering." + }, + { + "lang": "es", + "value": "VirtualSquare picoTCP (tambi\u00e9n conocido como PicoTCP-NG) a trav\u00e9s de la versi\u00f3n 2.1 no comprueba la longitud de la capa de transporte en una trama antes de realizar el filtrado de puertos. " } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35847.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35847.json index 877098eb55e..bcbab5d8f28 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35847.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35847.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35847", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T03:15:09.280", - "lastModified": "2023-06-19T03:15:09.280", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not have an MSS lower bound (e.g., it could be zero)." + }, + { + "lang": "es", + "value": "VirtualSquare picoTCP (tambi\u00e9n conocido como PicoTCP-NG) a trav\u00e9s de la versi\u00f3n 2.1 no tiene un l\u00edmite inferior de \"MSS\" (por ejemplo, podr\u00eda ser cero). " } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35848.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35848.json index 68973be9a77..683caf51a27 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35848.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35848.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35848", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T03:15:09.327", - "lastModified": "2023-06-19T03:15:09.327", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 lacks certain size calculations before attempting to set a value of an mss structure member." + }, + { + "lang": "es", + "value": "VirtualSquare picoTCP (tambi\u00e9n conocido como PicoTCP-NG) a trav\u00e9s de la versi\u00f3n 2.1 carece de ciertos c\u00e1lculos de tama\u00f1o antes de intentar establecer un valor de un miembro de la estructura \"mss\". " } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35849.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35849.json index 8929e3fa35a..cc243084d1d 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35849.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35849.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35849", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T03:15:09.370", - "lastModified": "2023-06-19T03:15:09.370", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not properly check whether header sizes would result in accessing data outside of a packet." + }, + { + "lang": "es", + "value": "VirtualSquare picoTCP (tambi\u00e9n conocido como PicoTCP-NG) a trav\u00e9s de la versi\u00f3n 2.1 no comprueba correctamente si los tama\u00f1os de cabecera resultar\u00edan en un acceso a lo datos fuera de un paquete. " } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35852.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35852.json index 9213e57c33f..2e78f0f21d4 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35852.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35852.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35852", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T04:15:11.217", - "lastModified": "2023-06-19T04:15:11.217", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation." + }, + { + "lang": "es", + "value": "En Suricata antes de la versi\u00f3n 6.0.13 (cuando hay un adversario que controla una fuente externa de reglas), un nombre de archivo de conjunto de datos, que proviene de una regla, puede desencadenar el salto de directorios absolutos o relativos, y conducir al acceso de escritura a un sistema de archivos local. Esto se soluciona en 6.0.13 requiriendo \"allow-absolute-filenames\" y \"allow-write\" (en la secci\u00f3n de configuraci\u00f3n de reglas de conjuntos de datos) si una instalaci\u00f3n requiere saltar/escribir en esta situaci\u00f3n. " } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35853.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35853.json index 4cbf9c55ecd..875b54c308c 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35853.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35853.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35853", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T04:15:11.287", - "lastModified": "2023-06-19T04:15:11.287", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section." + }, + { + "lang": "es", + "value": "En Suricata antes de la versi\u00f3n 6.0.13, un adversario que controle una fuente externa de reglas Lua puede ser capaz de ejecutar c\u00f3digo Lua. Esto se soluciona en la versi\u00f3n 6.0.13 deshabilitando Lua a menos que \"allow-rules\" sea verdadero en la secci\u00f3n de configuraci\u00f3n de seguridad de Lua. " } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35855.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35855.json index 51aa381aa95..02f55226dc5 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35855.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35855.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35855", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T04:15:11.363", - "lastModified": "2023-06-19T04:15:11.363", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A buffer overflow in Counter-Strike through 8684 allows a game server to execute arbitrary code on a remote client's machine by modifying the lservercfgfile console variable." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer en Counter-Strike a trav\u00e9s de 8684 permite a un servidor de juegos ejecutar c\u00f3digo arbitrario en la m\u00e1quina de un cliente remoto modificando la variable de consola \"lservercfgfile\"." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35856.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35856.json index d4c59922dcc..40880c4f741 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35856.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35856.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35856", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T04:15:11.430", - "lastModified": "2023-06-19T04:15:11.430", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35857.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35857.json index 81a1278999c..d1b3cc5f738 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35857.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35857.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35857", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T04:15:11.497", - "lastModified": "2023-06-19T04:15:11.497", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In Siren Investigate before 13.2.2, session keys remain active even after logging out." + }, + { + "lang": "es", + "value": "En Siren Investigate anterior a la versi\u00f3n 13.2.2, las claves de sesi\u00f3n permanecen activas incluso despu\u00e9s de cerrar la sesi\u00f3n. " } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35862.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35862.json index 700e19b05c0..2222a2cbac6 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35862.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35862.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35862", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T05:15:09.713", - "lastModified": "2023-06-19T05:15:09.713", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35866.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35866.json index 37917f4076c..324008593a4 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35866.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35866.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35866", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T06:15:09.240", - "lastModified": "2023-06-19T06:15:09.240", - "vulnStatus": "Received", + "lastModified": "2023-06-20T07:12:55.493", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35878.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35878.json new file mode 100644 index 00000000000..509c98302d6 --- /dev/null +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35878.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35878", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-06-20T08:15:09.670", + "lastModified": "2023-06-20T08:15:09.670", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Vadym K. Extra User Details plugin <=\u00a00.5 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/extra-user-details/wordpress-extra-user-details-plugin-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35882.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35882.json new file mode 100644 index 00000000000..9fa9a8addcc --- /dev/null +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35882.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35882", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-06-20T08:15:09.733", + "lastModified": "2023-06-20T08:15:09.733", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Team Heateor Super Socializer plugin <=\u00a07.13.52 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/super-socializer/wordpress-super-socializer-plugin-7-13-52-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35884.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35884.json new file mode 100644 index 00000000000..a463e08dc3a --- /dev/null +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35884.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35884", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-06-20T07:15:08.993", + "lastModified": "2023-06-20T07:15:08.993", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in EventPrime plugin <=\u00a03.0.5 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/eventprime-event-calendar-management/wordpress-eventprime-plugin-3-0-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f37319b8ef1..11323ae9dcd 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-19T22:00:26.423820+00:00 +2023-06-20T08:51:49.899643+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-19T21:15:42.177000+00:00 +2023-06-20T08:15:09.733000+00:00 ``` ### Last Data Feed Release @@ -23,28 +23,64 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2023-06-19T00:00:13.606142+00:00 +2023-06-20T00:00:13.608301+00:00 ``` ### Total Number of included CVEs ```plain -218107 +218121 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `14` -* [CVE-2023-29158](CVE-2023/CVE-2023-291xx/CVE-2023-29158.json) (`2023-06-19T21:15:42.033`) -* [CVE-2023-32659](CVE-2023/CVE-2023-326xx/CVE-2023-32659.json) (`2023-06-19T21:15:42.113`) -* [CVE-2023-3315](CVE-2023/CVE-2023-33xx/CVE-2023-3315.json) (`2023-06-19T21:15:42.177`) +* [CVE-2023-3320](CVE-2023/CVE-2023-33xx/CVE-2023-3320.json) (`2023-06-20T03:15:09.100`) +* [CVE-2023-3325](CVE-2023/CVE-2023-33xx/CVE-2023-3325.json) (`2023-06-20T05:15:09.170`) +* [CVE-2023-35884](CVE-2023/CVE-2023-358xx/CVE-2023-35884.json) (`2023-06-20T07:15:08.993`) +* [CVE-2023-26427](CVE-2023/CVE-2023-264xx/CVE-2023-26427.json) (`2023-06-20T08:15:09.073`) +* [CVE-2023-26428](CVE-2023/CVE-2023-264xx/CVE-2023-26428.json) (`2023-06-20T08:15:09.163`) +* [CVE-2023-26429](CVE-2023/CVE-2023-264xx/CVE-2023-26429.json) (`2023-06-20T08:15:09.230`) +* [CVE-2023-26431](CVE-2023/CVE-2023-264xx/CVE-2023-26431.json) (`2023-06-20T08:15:09.297`) +* [CVE-2023-26432](CVE-2023/CVE-2023-264xx/CVE-2023-26432.json) (`2023-06-20T08:15:09.360`) +* [CVE-2023-26433](CVE-2023/CVE-2023-264xx/CVE-2023-26433.json) (`2023-06-20T08:15:09.427`) +* [CVE-2023-26434](CVE-2023/CVE-2023-264xx/CVE-2023-26434.json) (`2023-06-20T08:15:09.487`) +* [CVE-2023-26435](CVE-2023/CVE-2023-264xx/CVE-2023-26435.json) (`2023-06-20T08:15:09.547`) +* [CVE-2023-26436](CVE-2023/CVE-2023-264xx/CVE-2023-26436.json) (`2023-06-20T08:15:09.607`) +* [CVE-2023-35878](CVE-2023/CVE-2023-358xx/CVE-2023-35878.json) (`2023-06-20T08:15:09.670`) +* [CVE-2023-35882](CVE-2023/CVE-2023-358xx/CVE-2023-35882.json) (`2023-06-20T08:15:09.733`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `139` +* [CVE-2023-34373](CVE-2023/CVE-2023-343xx/CVE-2023-34373.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-3318](CVE-2023/CVE-2023-33xx/CVE-2023-3318.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-35772](CVE-2023/CVE-2023-357xx/CVE-2023-35772.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-35775](CVE-2023/CVE-2023-357xx/CVE-2023-35775.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-35776](CVE-2023/CVE-2023-357xx/CVE-2023-35776.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-35779](CVE-2023/CVE-2023-357xx/CVE-2023-35779.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-31410](CVE-2023/CVE-2023-314xx/CVE-2023-31410.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-31411](CVE-2023/CVE-2023-314xx/CVE-2023-31411.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-34155](CVE-2023/CVE-2023-341xx/CVE-2023-34155.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-34156](CVE-2023/CVE-2023-341xx/CVE-2023-34156.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-34158](CVE-2023/CVE-2023-341xx/CVE-2023-34158.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-34159](CVE-2023/CVE-2023-341xx/CVE-2023-34159.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-34160](CVE-2023/CVE-2023-341xx/CVE-2023-34160.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-34161](CVE-2023/CVE-2023-341xx/CVE-2023-34161.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-34162](CVE-2023/CVE-2023-341xx/CVE-2023-34162.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-34163](CVE-2023/CVE-2023-341xx/CVE-2023-34163.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-34166](CVE-2023/CVE-2023-341xx/CVE-2023-34166.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-34167](CVE-2023/CVE-2023-341xx/CVE-2023-34167.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-34461](CVE-2023/CVE-2023-344xx/CVE-2023-34461.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-35843](CVE-2023/CVE-2023-358xx/CVE-2023-35843.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-3022](CVE-2023/CVE-2023-30xx/CVE-2023-3022.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-3312](CVE-2023/CVE-2023-33xx/CVE-2023-3312.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-29158](CVE-2023/CVE-2023-291xx/CVE-2023-29158.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-32659](CVE-2023/CVE-2023-326xx/CVE-2023-32659.json) (`2023-06-20T07:12:55.493`) +* [CVE-2023-3315](CVE-2023/CVE-2023-33xx/CVE-2023-3315.json) (`2023-06-20T07:12:55.493`) ## Download and Usage