diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3704.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3704.json new file mode 100644 index 00000000000..8350b302a89 --- /dev/null +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3704.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-3704", + "sourceIdentifier": "vdisclose@cert-in.org.in", + "published": "2023-08-24T07:15:11.670", + "lastModified": "2023-08-24T07:15:11.670", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The vulnerability exists in CP-Plus DVR due to an improper input validation within the web-based management interface of the affected products. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device.\n\nSuccessful exploitation of this vulnerability could allow the remote attacker to change system time of the targeted device.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "vdisclose@cert-in.org.in", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0240", + "source": "vdisclose@cert-in.org.in" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38898.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38898.json index 1e3de450179..8b0d5cc24ac 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38898.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38898.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38898", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-15T17:15:12.187", - "lastModified": "2023-08-22T15:07:48.627", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-24T07:15:11.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,13 +64,6 @@ } ], "references": [ - { - "url": "http://python.com", - "source": "cve@mitre.org", - "tags": [ - "Not Applicable" - ] - }, { "url": "https://github.com/python/cpython/issues/105987", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4227.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4227.json new file mode 100644 index 00000000000..034abb56ce1 --- /dev/null +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4227.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-4227", + "sourceIdentifier": "psirt@moxa.com", + "published": "2023-08-24T06:15:44.177", + "lastModified": "2023-08-24T06:15:44.177", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in the ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which can be exploited by malicious actors to potentially gain unauthorized access to the product. This could lead to security breaches, data theft, and unauthorized manipulation of sensitive information. The vulnerability is attributed to the presence of an unauthorized service, which could potentially enable unauthorized access to the. device.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230310-iologik-4000-series-multiple-web-server-vulnerabilities-and-improper-access-control-vulnerability", + "source": "psirt@moxa.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4228.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4228.json new file mode 100644 index 00000000000..5d9db493612 --- /dev/null +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4228.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-4228", + "sourceIdentifier": "psirt@moxa.com", + "published": "2023-08-24T07:15:11.823", + "lastModified": "2023-08-24T07:15:11.823", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, where the session cookies attribute is not set properly in the affected application. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1004" + } + ] + } + ], + "references": [ + { + "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230310-iologik-4000-series-multiple-web-server-vulnerabilities-and-improper-access-control-vulnerability", + "source": "psirt@moxa.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4229.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4229.json new file mode 100644 index 00000000000..675d8803a47 --- /dev/null +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4229.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-4229", + "sourceIdentifier": "psirt@moxa.com", + "published": "2023-08-24T07:15:11.930", + "lastModified": "2023-08-24T07:15:11.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, potentially exposing users to security risks. This vulnerability may allow attackers to trick users into interacting with malicious content, leading to unintended actions or unauthorized data disclosures." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], + "references": [ + { + "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230310-iologik-4000-series-multiple-web-server-vulnerabilities-and-improper-access-control-vulnerability", + "source": "psirt@moxa.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4230.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4230.json new file mode 100644 index 00000000000..e1d78826d3e --- /dev/null +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4230.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-4230", + "sourceIdentifier": "psirt@moxa.com", + "published": "2023-08-24T07:15:12.013", + "lastModified": "2023-08-24T07:15:12.013", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which has the potential to facilitate the collection of information on ioLogik 4000 Series devices. This vulnerability may enable attackers to gather information for the purpose of assessing vulnerabilities and potential attack vectors." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230310-iologik-4000-series-multiple-web-server-vulnerabilities-and-improper-access-control-vulnerability", + "source": "psirt@moxa.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4511.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4511.json new file mode 100644 index 00000000000..42c26755b8f --- /dev/null +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4511.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-4511", + "sourceIdentifier": "cve@gitlab.com", + "published": "2023-08-24T07:15:12.107", + "lastModified": "2023-08-24T07:15:12.107", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/wireshark/wireshark/-/issues/19258", + "source": "cve@gitlab.com" + }, + { + "url": "https://www.wireshark.org/security/wnpa-sec-2023-24.html", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4512.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4512.json new file mode 100644 index 00000000000..7d893a6510f --- /dev/null +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4512.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-4512", + "sourceIdentifier": "cve@gitlab.com", + "published": "2023-08-24T07:15:12.207", + "lastModified": "2023-08-24T07:15:12.207", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "CBOR dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-674" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/wireshark/wireshark/-/issues/19144", + "source": "cve@gitlab.com" + }, + { + "url": "https://www.wireshark.org/security/wnpa-sec-2023-23.html", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4513.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4513.json new file mode 100644 index 00000000000..a507214af2b --- /dev/null +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4513.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-4513", + "sourceIdentifier": "cve@gitlab.com", + "published": "2023-08-24T07:15:12.300", + "lastModified": "2023-08-24T07:15:12.300", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/wireshark/wireshark/-/issues/19259", + "source": "cve@gitlab.com" + }, + { + "url": "https://www.wireshark.org/security/wnpa-sec-2023-25.html", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index cab985f23fa..b8d1cf2dd50 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-24T06:00:29.169651+00:00 +2023-08-24T08:00:48.315339+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-24T05:01:10.127000+00:00 +2023-08-24T07:15:12.300000+00:00 ``` ### Last Data Feed Release @@ -29,23 +29,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -223346 +223354 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `8` +* [CVE-2023-4227](CVE-2023/CVE-2023-42xx/CVE-2023-4227.json) (`2023-08-24T06:15:44.177`) +* [CVE-2023-3704](CVE-2023/CVE-2023-37xx/CVE-2023-3704.json) (`2023-08-24T07:15:11.670`) +* [CVE-2023-4228](CVE-2023/CVE-2023-42xx/CVE-2023-4228.json) (`2023-08-24T07:15:11.823`) +* [CVE-2023-4229](CVE-2023/CVE-2023-42xx/CVE-2023-4229.json) (`2023-08-24T07:15:11.930`) +* [CVE-2023-4230](CVE-2023/CVE-2023-42xx/CVE-2023-4230.json) (`2023-08-24T07:15:12.013`) +* [CVE-2023-4511](CVE-2023/CVE-2023-45xx/CVE-2023-4511.json) (`2023-08-24T07:15:12.107`) +* [CVE-2023-4512](CVE-2023/CVE-2023-45xx/CVE-2023-4512.json) (`2023-08-24T07:15:12.207`) +* [CVE-2023-4513](CVE-2023/CVE-2023-45xx/CVE-2023-4513.json) (`2023-08-24T07:15:12.300`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `1` -* [CVE-2023-4360](CVE-2023/CVE-2023-43xx/CVE-2023-4360.json) (`2023-08-24T04:51:09.303`) -* [CVE-2023-4359](CVE-2023/CVE-2023-43xx/CVE-2023-4359.json) (`2023-08-24T04:51:26.233`) -* [CVE-2023-4358](CVE-2023/CVE-2023-43xx/CVE-2023-4358.json) (`2023-08-24T04:51:54.440`) -* [CVE-2023-4357](CVE-2023/CVE-2023-43xx/CVE-2023-4357.json) (`2023-08-24T05:01:10.127`) +* [CVE-2023-38898](CVE-2023/CVE-2023-388xx/CVE-2023-38898.json) (`2023-08-24T07:15:11.413`) ## Download and Usage