From 8792538e1d49e28a6af46a78bb7effe481e6e6b0 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 6 Aug 2023 16:00:28 +0000 Subject: [PATCH] Auto-Update: 2023-08-06T16:00:25.309342+00:00 --- CVE-2020/CVE-2020-223xx/CVE-2020-22336.json | 8 +- CVE-2023/CVE-2023-375xx/CVE-2023-37581.json | 6 +- CVE-2023/CVE-2023-41xx/CVE-2023-4186.json | 88 +++++++++++++++++++++ README.md | 40 ++-------- 4 files changed, 107 insertions(+), 35 deletions(-) create mode 100644 CVE-2023/CVE-2023-41xx/CVE-2023-4186.json diff --git a/CVE-2020/CVE-2020-223xx/CVE-2020-22336.json b/CVE-2020/CVE-2020-223xx/CVE-2020-22336.json index de7d966482b..66290e48ad5 100644 --- a/CVE-2020/CVE-2020-223xx/CVE-2020-22336.json +++ b/CVE-2020/CVE-2020-223xx/CVE-2020-22336.json @@ -2,8 +2,8 @@ "id": "CVE-2020-22336", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-06T14:15:10.127", - "lastModified": "2023-07-12T18:35:02.373", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-06T14:15:09.397", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -66,6 +66,10 @@ } ], "references": [ + { + "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00004.html", + "source": "cve@mitre.org" + }, { "url": "https://sourceforge.net/p/pdfcrack/bugs/12/", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37581.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37581.json index 5e097de35b6..a17c16bf507 100644 --- a/CVE-2023/CVE-2023-375xx/CVE-2023-37581.json +++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37581.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37581", "sourceIdentifier": "security@apache.org", "published": "2023-08-06T08:15:09.013", - "lastModified": "2023-08-06T12:00:51.333", + "lastModified": "2023-08-06T14:15:10.040", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -24,6 +24,10 @@ } ], "references": [ + { + "url": "http://seclists.org/fulldisclosure/2023/Jul/43", + "source": "security@apache.org" + }, { "url": "https://lists.apache.org/thread/n9mjhhlm7z7b7to646tkvf3otkf21flp", "source": "security@apache.org" diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4186.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4186.json new file mode 100644 index 00000000000..b6738184ca6 --- /dev/null +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4186.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-4186", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-08-06T14:15:10.167", + "lastModified": "2023-08-06T14:15:10.167", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Pharmacy Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file manage_website.php. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-236221 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1even-321/Pharmacy-system/blob/main/Pharmacy%20Management%20System%20has%20a%20file%20upload%20(RCE)%20vulnerability.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.236221", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.236221", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 311fdaba337..e380e6266b4 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-06T14:00:24.778701+00:00 +2023-08-06T16:00:25.309342+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-06T13:15:14.137000+00:00 +2023-08-06T14:15:10.167000+00:00 ``` ### Last Data Feed Release @@ -29,46 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -221736 +221737 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `1` -* [CVE-2023-4184](CVE-2023/CVE-2023-41xx/CVE-2023-4184.json) (`2023-08-06T12:15:09.263`) -* [CVE-2023-4185](CVE-2023/CVE-2023-41xx/CVE-2023-4185.json) (`2023-08-06T13:15:14.137`) +* [CVE-2023-4186](CVE-2023/CVE-2023-41xx/CVE-2023-4186.json) (`2023-08-06T14:15:10.167`) ### CVEs modified in the last Commit -Recently modified CVEs: `48` +Recently modified CVEs: `2` -* [CVE-2023-4181](CVE-2023/CVE-2023-41xx/CVE-2023-4181.json) (`2023-08-06T12:00:51.333`) -* [CVE-2023-4182](CVE-2023/CVE-2023-41xx/CVE-2023-4182.json) (`2023-08-06T12:00:51.333`) -* [CVE-2023-4183](CVE-2023/CVE-2023-41xx/CVE-2023-4183.json) (`2023-08-06T12:00:51.333`) -* [CVE-2023-39346](CVE-2023/CVE-2023-393xx/CVE-2023-39346.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-33367](CVE-2023/CVE-2023-333xx/CVE-2023-33367.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-38943](CVE-2023/CVE-2023-389xx/CVE-2023-38943.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-36095](CVE-2023/CVE-2023-360xx/CVE-2023-36095.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-39508](CVE-2023/CVE-2023-395xx/CVE-2023-39508.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-4165](CVE-2023/CVE-2023-41xx/CVE-2023-4165.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-4166](CVE-2023/CVE-2023-41xx/CVE-2023-4166.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-4167](CVE-2023/CVE-2023-41xx/CVE-2023-4167.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-4168](CVE-2023/CVE-2023-41xx/CVE-2023-4168.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-4169](CVE-2023/CVE-2023-41xx/CVE-2023-4169.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-4187](CVE-2023/CVE-2023-41xx/CVE-2023-4187.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-4170](CVE-2023/CVE-2023-41xx/CVE-2023-4170.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-4188](CVE-2023/CVE-2023-41xx/CVE-2023-4188.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-4189](CVE-2023/CVE-2023-41xx/CVE-2023-4189.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-4171](CVE-2023/CVE-2023-41xx/CVE-2023-4171.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-30491](CVE-2023/CVE-2023-304xx/CVE-2023-30491.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-34010](CVE-2023/CVE-2023-340xx/CVE-2023-34010.json) (`2023-08-06T12:01:01.827`) -* [CVE-2023-38700](CVE-2023/CVE-2023-387xx/CVE-2023-38700.json) (`2023-08-06T12:01:17.683`) -* [CVE-2023-38702](CVE-2023/CVE-2023-387xx/CVE-2023-38702.json) (`2023-08-06T12:01:17.683`) -* [CVE-2023-39551](CVE-2023/CVE-2023-395xx/CVE-2023-39551.json) (`2023-08-06T12:01:17.683`) -* [CVE-2023-39552](CVE-2023/CVE-2023-395xx/CVE-2023-39552.json) (`2023-08-06T12:01:17.683`) -* [CVE-2023-39344](CVE-2023/CVE-2023-393xx/CVE-2023-39344.json) (`2023-08-06T12:01:17.683`) +* [CVE-2020-22336](CVE-2020/CVE-2020-223xx/CVE-2020-22336.json) (`2023-08-06T14:15:09.397`) +* [CVE-2023-37581](CVE-2023/CVE-2023-375xx/CVE-2023-37581.json) (`2023-08-06T14:15:10.040`) ## Download and Usage