diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48796.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48796.json new file mode 100644 index 00000000000..a9941ee3249 --- /dev/null +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48796.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-48796", + "sourceIdentifier": "security@apache.org", + "published": "2023-11-24T08:15:20.810", + "lastModified": "2023-11-24T08:15:20.810", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache DolphinScheduler.\n\nThe information exposed to unauthorized actors may include sensitive data such as database credentials.\n\nUsers who can't upgrade to the fixed version can also set environment variable `MANAGEMENT_ENDPOINTS_WEB_EXPOSURE_INCLUDE=health,metrics,prometheus` to workaround this, or add the following section in the `application.yaml` file\n\n```\nmanagement:\n\u00a0 endpoints:\n\u00a0 \u00a0 web:\n\u00a0 \u00a0 \u00a0 exposure:\n\u00a0 \u00a0 \u00a0 \u00a0 include: health,metrics,prometheus\n```\n\nThis issue affects Apache DolphinScheduler: from 3.0.0 before 3.0.2.\n\nUsers are recommended to upgrade to version 3.0.2, which fixes the issue.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/ffrmkcwgr2lcz0f5nnnyswhpn3fytsvo", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6118.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6118.json new file mode 100644 index 00000000000..ae1d83123f0 --- /dev/null +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6118.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-6118", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2023-11-23T15:15:10.583", + "lastModified": "2023-11-24T08:15:21.163", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Path Traversal: '/../filedir' vulnerability in Neutron IP Camera allows Absolute Path Traversal.This issue affects IP Camera: before b1130.1.0.1.\n\n" + }, + { + "lang": "es", + "value": ": Path Traversal: la vulnerabilidad '/../filedir' en Neutron IP Camera permite un Absolute Path Traversal. Este problema afecta a IP Camera: anterior a b1130.1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-25" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-23-0658", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0ee8ddc78b3..7f23a0d413b 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-24T05:08:09.772071+00:00 +2023-11-24T09:16:02.904301+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-24T03:15:08.063000+00:00 +2023-11-24T08:15:21.163000+00:00 ``` ### Last Data Feed Release @@ -29,27 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -231470 +231471 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -* [CVE-2023-44303](CVE-2023/CVE-2023-443xx/CVE-2023-44303.json) (`2023-11-24T03:15:07.317`) +* [CVE-2023-48796](CVE-2023/CVE-2023-487xx/CVE-2023-48796.json) (`2023-11-24T08:15:20.810`) ### CVEs modified in the last Commit -Recently modified CVEs: `7` +Recently modified CVEs: `1` -* [CVE-2023-48231](CVE-2023/CVE-2023-482xx/CVE-2023-48231.json) (`2023-11-24T03:15:07.513`) -* [CVE-2023-48232](CVE-2023/CVE-2023-482xx/CVE-2023-48232.json) (`2023-11-24T03:15:07.617`) -* [CVE-2023-48233](CVE-2023/CVE-2023-482xx/CVE-2023-48233.json) (`2023-11-24T03:15:07.713`) -* [CVE-2023-48234](CVE-2023/CVE-2023-482xx/CVE-2023-48234.json) (`2023-11-24T03:15:07.800`) -* [CVE-2023-48235](CVE-2023/CVE-2023-482xx/CVE-2023-48235.json) (`2023-11-24T03:15:07.893`) -* [CVE-2023-48236](CVE-2023/CVE-2023-482xx/CVE-2023-48236.json) (`2023-11-24T03:15:07.973`) -* [CVE-2023-48237](CVE-2023/CVE-2023-482xx/CVE-2023-48237.json) (`2023-11-24T03:15:08.063`) +* [CVE-2023-6118](CVE-2023/CVE-2023-61xx/CVE-2023-6118.json) (`2023-11-24T08:15:21.163`) ## Download and Usage