mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-12-25T05:00:25.323061+00:00
This commit is contained in:
parent
4e8e8632be
commit
87fc5952eb
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2014-125108",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-23T17:15:07.773",
|
||||
"lastModified": "2023-12-23T17:15:07.773",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2016-15036",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-23T20:15:37.930",
|
||||
"lastModified": "2023-12-23T20:15:37.930",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-36769",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-12-23T10:15:08.113",
|
||||
"lastModified": "2023-12-23T10:15:08.113",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2021/CVE-2021-389xx/CVE-2021-38927.json
Normal file
59
CVE-2021/CVE-2021-389xx/CVE-2021-38927.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2021-38927",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-12-25T03:15:07.943",
|
||||
"lastModified": "2023-12-25T03:15:07.943",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Aspera Console 3.4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 210322."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/210322",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7101252",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-430xx/CVE-2023-43064.json
Normal file
59
CVE-2023/CVE-2023-430xx/CVE-2023-43064.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-43064",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-12-25T03:15:08.210",
|
||||
"lastModified": "2023-12-25T03:15:08.210",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Facsimile Support for IBM i 7.2, 7.3, 7.4, and 7.5 could allow a local user to gain elevated privileges due to an unqualified library call. A malicious actor could cause arbitrary code to run with the privilege of the user invoking the facsimile support. IBM X-Force ID: 267689."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267689",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7101330",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49594",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-12-23T20:15:38.250",
|
||||
"lastModified": "2023-12-24T18:15:44.833",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
47
CVE-2023/CVE-2023-498xx/CVE-2023-49880.json
Normal file
47
CVE-2023/CVE-2023-498xx/CVE-2023-49880.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2023-49880",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-12-25T03:15:08.430",
|
||||
"lastModified": "2023-12-25T03:15:08.430",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Message Entry and Repair (MER) facility of IBM Financial Transaction Manager for SWIFT Services 3.2.4 the sending address and the message type of FIN messages are assumed to be immutable. However, an attacker might modify these elements of a business transaction. IBM X-Force ID: 273183."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/273183",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7101167",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50727",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-22T21:15:07.690",
|
||||
"lastModified": "2023-12-22T21:15:07.690",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50730",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-22T21:15:07.930",
|
||||
"lastModified": "2023-12-22T21:15:07.930",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50731",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-22T21:15:08.150",
|
||||
"lastModified": "2023-12-22T21:15:08.150",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50924",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-22T21:15:08.370",
|
||||
"lastModified": "2023-12-22T21:15:08.370",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50928",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-22T21:15:08.580",
|
||||
"lastModified": "2023-12-22T21:15:08.580",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51386",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-22T22:15:07.827",
|
||||
"lastModified": "2023-12-22T22:15:07.827",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51387",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-22T21:15:08.790",
|
||||
"lastModified": "2023-12-22T21:15:08.790",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51449",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-22T21:15:09.000",
|
||||
"lastModified": "2023-12-22T21:15:09.000",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51451",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-22T21:15:09.297",
|
||||
"lastModified": "2023-12-22T21:15:09.297",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51650",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-22T21:15:09.503",
|
||||
"lastModified": "2023-12-22T21:15:09.503",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51651",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-22T21:15:09.700",
|
||||
"lastModified": "2023-12-22T21:15:09.700",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51714",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-24T21:15:25.470",
|
||||
"lastModified": "2023-12-24T21:15:25.470",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51763",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-24T04:15:07.633",
|
||||
"lastModified": "2023-12-24T04:15:07.633",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51764",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-24T05:15:08.273",
|
||||
"lastModified": "2023-12-24T12:15:37.670",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51765",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-24T06:15:07.527",
|
||||
"lastModified": "2023-12-24T12:15:38.020",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51766",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-24T06:15:07.673",
|
||||
"lastModified": "2023-12-24T12:15:38.070",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51767",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-24T07:15:07.410",
|
||||
"lastModified": "2023-12-24T07:15:07.410",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5961",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-12-23T09:15:07.730",
|
||||
"lastModified": "2023-12-23T09:15:07.730",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5962",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-12-23T09:15:08.050",
|
||||
"lastModified": "2023-12-23T09:15:08.050",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6377",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-12-13T07:15:30.030",
|
||||
"lastModified": "2023-12-21T17:18:05.783",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-25T04:15:07.613",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -290,6 +290,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6478",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-12-13T07:15:31.213",
|
||||
"lastModified": "2023-12-21T17:21:03.223",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-25T04:15:07.777",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -283,6 +283,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6744",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-12-23T10:15:10.570",
|
||||
"lastModified": "2023-12-23T10:15:10.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6971",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-12-23T02:15:45.150",
|
||||
"lastModified": "2023-12-23T02:15:45.150",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6972",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-12-23T02:15:45.333",
|
||||
"lastModified": "2023-12-23T02:15:45.333",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7002",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-12-23T02:15:45.490",
|
||||
"lastModified": "2023-12-23T02:15:45.490",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7008",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-12-23T13:15:07.573",
|
||||
"lastModified": "2023-12-23T13:15:07.573",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:20.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7090",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-12-23T23:15:07.560",
|
||||
"lastModified": "2023-12-23T23:15:07.560",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7091",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-24T21:15:25.530",
|
||||
"lastModified": "2023-12-24T21:15:25.530",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7092",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-24T23:15:08.290",
|
||||
"lastModified": "2023-12-24T23:15:08.290",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7093",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-25T00:15:08.400",
|
||||
"lastModified": "2023-12-25T00:15:08.400",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7094",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-25T00:15:08.677",
|
||||
"lastModified": "2023-12-25T00:15:08.677",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7095",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-25T01:15:08.203",
|
||||
"lastModified": "2023-12-25T01:15:08.203",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7096",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-25T01:15:08.457",
|
||||
"lastModified": "2023-12-25T01:15:08.457",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7097",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-25T02:15:44.337",
|
||||
"lastModified": "2023-12-25T02:15:44.337",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7098",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-25T02:15:44.603",
|
||||
"lastModified": "2023-12-25T02:15:44.603",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
92
CVE-2023/CVE-2023-70xx/CVE-2023-7099.json
Normal file
92
CVE-2023/CVE-2023-70xx/CVE-2023-7099.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2023-7099",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-25T03:15:08.620",
|
||||
"lastModified": "2023-12-25T03:15:08.620",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This issue affects some unknown processing of the file bwdates-report-result.php. The manipulation of the argument fromdate leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248951."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/laoquanshi/heishou/blob/main/niv%20-SQL",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/laoquanshi/heishou/blob/main/sqlmap.png",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.248951",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.248951",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-71xx/CVE-2023-7100.json
Normal file
88
CVE-2023/CVE-2023-71xx/CVE-2023-7100.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-7100",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-25T03:15:08.840",
|
||||
"lastModified": "2023-12-25T03:15:08.840",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file /admin/bwdates-report-details.php. The manipulation of the argument fdate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248952."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/@2839549219ljk/restaurant-table-booking-system-sql-injection-vulnerability-30708cfabe03",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.248952",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.248952",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7101",
|
||||
"sourceIdentifier": "mandiant-cve@google.com",
|
||||
"published": "2023-12-24T22:15:07.983",
|
||||
"lastModified": "2023-12-24T22:15:07.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7102",
|
||||
"sourceIdentifier": "mandiant-cve@google.com",
|
||||
"published": "2023-12-24T22:15:08.107",
|
||||
"lastModified": "2023-12-24T22:15:08.107",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-25T03:08:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
44
README.md
44
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-12-25T03:00:32.236336+00:00
|
||||
2023-12-25T05:00:25.323061+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-12-25T02:15:44.603000+00:00
|
||||
2023-12-25T04:15:07.777000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,23 +29,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
234166
|
||||
234171
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
* [CVE-2023-7095](CVE-2023/CVE-2023-70xx/CVE-2023-7095.json) (`2023-12-25T01:15:08.203`)
|
||||
* [CVE-2023-7096](CVE-2023/CVE-2023-70xx/CVE-2023-7096.json) (`2023-12-25T01:15:08.457`)
|
||||
* [CVE-2023-7097](CVE-2023/CVE-2023-70xx/CVE-2023-7097.json) (`2023-12-25T02:15:44.337`)
|
||||
* [CVE-2023-7098](CVE-2023/CVE-2023-70xx/CVE-2023-7098.json) (`2023-12-25T02:15:44.603`)
|
||||
* [CVE-2021-38927](CVE-2021/CVE-2021-389xx/CVE-2021-38927.json) (`2023-12-25T03:15:07.943`)
|
||||
* [CVE-2023-43064](CVE-2023/CVE-2023-430xx/CVE-2023-43064.json) (`2023-12-25T03:15:08.210`)
|
||||
* [CVE-2023-49880](CVE-2023/CVE-2023-498xx/CVE-2023-49880.json) (`2023-12-25T03:15:08.430`)
|
||||
* [CVE-2023-7099](CVE-2023/CVE-2023-70xx/CVE-2023-7099.json) (`2023-12-25T03:15:08.620`)
|
||||
* [CVE-2023-7100](CVE-2023/CVE-2023-71xx/CVE-2023-7100.json) (`2023-12-25T03:15:08.840`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `41`
|
||||
|
||||
* [CVE-2023-7094](CVE-2023/CVE-2023-70xx/CVE-2023-7094.json) (`2023-12-25T03:08:09.833`)
|
||||
* [CVE-2023-7095](CVE-2023/CVE-2023-70xx/CVE-2023-7095.json) (`2023-12-25T03:08:09.833`)
|
||||
* [CVE-2023-7096](CVE-2023/CVE-2023-70xx/CVE-2023-7096.json) (`2023-12-25T03:08:09.833`)
|
||||
* [CVE-2023-7097](CVE-2023/CVE-2023-70xx/CVE-2023-7097.json) (`2023-12-25T03:08:09.833`)
|
||||
* [CVE-2023-7098](CVE-2023/CVE-2023-70xx/CVE-2023-7098.json) (`2023-12-25T03:08:09.833`)
|
||||
* [CVE-2023-50727](CVE-2023/CVE-2023-507xx/CVE-2023-50727.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-50730](CVE-2023/CVE-2023-507xx/CVE-2023-50730.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-50731](CVE-2023/CVE-2023-507xx/CVE-2023-50731.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-50924](CVE-2023/CVE-2023-509xx/CVE-2023-50924.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-50928](CVE-2023/CVE-2023-509xx/CVE-2023-50928.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-51387](CVE-2023/CVE-2023-513xx/CVE-2023-51387.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-51449](CVE-2023/CVE-2023-514xx/CVE-2023-51449.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-51451](CVE-2023/CVE-2023-514xx/CVE-2023-51451.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-51650](CVE-2023/CVE-2023-516xx/CVE-2023-51650.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-51651](CVE-2023/CVE-2023-516xx/CVE-2023-51651.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-51386](CVE-2023/CVE-2023-513xx/CVE-2023-51386.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-6971](CVE-2023/CVE-2023-69xx/CVE-2023-6971.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-6972](CVE-2023/CVE-2023-69xx/CVE-2023-6972.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-7002](CVE-2023/CVE-2023-70xx/CVE-2023-7002.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-5961](CVE-2023/CVE-2023-59xx/CVE-2023-5961.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-5962](CVE-2023/CVE-2023-59xx/CVE-2023-5962.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-6744](CVE-2023/CVE-2023-67xx/CVE-2023-6744.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-7008](CVE-2023/CVE-2023-70xx/CVE-2023-7008.json) (`2023-12-25T03:08:20.540`)
|
||||
* [CVE-2023-6377](CVE-2023/CVE-2023-63xx/CVE-2023-6377.json) (`2023-12-25T04:15:07.613`)
|
||||
* [CVE-2023-6478](CVE-2023/CVE-2023-64xx/CVE-2023-6478.json) (`2023-12-25T04:15:07.777`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user