Auto-Update: 2023-11-24T09:16:02.904301+00:00

This commit is contained in:
cad-safe-bot 2023-11-24 09:16:06 +00:00
parent f931c445ad
commit 86f82b2abf
3 changed files with 97 additions and 12 deletions

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-48796",
"sourceIdentifier": "security@apache.org",
"published": "2023-11-24T08:15:20.810",
"lastModified": "2023-11-24T08:15:20.810",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache DolphinScheduler.\n\nThe information exposed to unauthorized actors may include sensitive data such as database credentials.\n\nUsers who can't upgrade to the fixed version can also set environment variable `MANAGEMENT_ENDPOINTS_WEB_EXPOSURE_INCLUDE=health,metrics,prometheus` to workaround this, or add the following section in the `application.yaml` file\n\n```\nmanagement:\n\u00a0 endpoints:\n\u00a0 \u00a0 web:\n\u00a0 \u00a0 \u00a0 exposure:\n\u00a0 \u00a0 \u00a0 \u00a0 include: health,metrics,prometheus\n```\n\nThis issue affects Apache DolphinScheduler: from 3.0.0 before 3.0.2.\n\nUsers are recommended to upgrade to version 3.0.2, which fixes the issue.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/ffrmkcwgr2lcz0f5nnnyswhpn3fytsvo",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-6118",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-11-23T15:15:10.583",
"lastModified": "2023-11-24T08:15:21.163",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Path Traversal: '/../filedir' vulnerability in Neutron IP Camera allows Absolute Path Traversal.This issue affects IP Camera: before b1130.1.0.1.\n\n"
},
{
"lang": "es",
"value": ": Path Traversal: la vulnerabilidad '/../filedir' en Neutron IP Camera permite un Absolute Path Traversal. Este problema afecta a IP Camera: anterior a b1130.1.0.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-25"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0658",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-24T05:08:09.772071+00:00
2023-11-24T09:16:02.904301+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-24T03:15:08.063000+00:00
2023-11-24T08:15:21.163000+00:00
```
### Last Data Feed Release
@ -29,27 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
231470
231471
```
### CVEs added in the last Commit
Recently added CVEs: `1`
* [CVE-2023-44303](CVE-2023/CVE-2023-443xx/CVE-2023-44303.json) (`2023-11-24T03:15:07.317`)
* [CVE-2023-48796](CVE-2023/CVE-2023-487xx/CVE-2023-48796.json) (`2023-11-24T08:15:20.810`)
### CVEs modified in the last Commit
Recently modified CVEs: `7`
Recently modified CVEs: `1`
* [CVE-2023-48231](CVE-2023/CVE-2023-482xx/CVE-2023-48231.json) (`2023-11-24T03:15:07.513`)
* [CVE-2023-48232](CVE-2023/CVE-2023-482xx/CVE-2023-48232.json) (`2023-11-24T03:15:07.617`)
* [CVE-2023-48233](CVE-2023/CVE-2023-482xx/CVE-2023-48233.json) (`2023-11-24T03:15:07.713`)
* [CVE-2023-48234](CVE-2023/CVE-2023-482xx/CVE-2023-48234.json) (`2023-11-24T03:15:07.800`)
* [CVE-2023-48235](CVE-2023/CVE-2023-482xx/CVE-2023-48235.json) (`2023-11-24T03:15:07.893`)
* [CVE-2023-48236](CVE-2023/CVE-2023-482xx/CVE-2023-48236.json) (`2023-11-24T03:15:07.973`)
* [CVE-2023-48237](CVE-2023/CVE-2023-482xx/CVE-2023-48237.json) (`2023-11-24T03:15:08.063`)
* [CVE-2023-6118](CVE-2023/CVE-2023-61xx/CVE-2023-6118.json) (`2023-11-24T08:15:21.163`)
## Download and Usage