Auto-Update: 2023-12-26T09:00:24.312836+00:00

This commit is contained in:
cad-safe-bot 2023-12-26 09:00:27 +00:00
parent 59773fbc54
commit 91a3243420
18 changed files with 429 additions and 7 deletions

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-42436",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:09.637",
"lastModified": "2023-12-26T08:15:09.637",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting vulnerability exists in the presentation feature of GROWI versions prior to v3.4.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-45737",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:09.907",
"lastModified": "2023-12-26T08:15:09.907",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page and the Markdown Settings (/admin/markdown) page of GROWI versions prior to v3.5.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-45740",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:10.010",
"lastModified": "2023-12-26T08:15:10.010",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting vulnerability when processing profile images exists in GROWI versions prior to v4.1.3. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-45741",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:10.107",
"lastModified": "2023-12-26T08:15:10.107",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "VR-S1000 firmware Ver. 2.37 and earlier allows an attacker with access to the product's web management page to execute arbitrary OS commands."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN23771490/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.buffalo.jp/news/detail/20231225-01.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-46681",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:10.247",
"lastModified": "2023-12-26T08:15:10.247",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability in VR-S1000 firmware Ver. 2.37 and earlier allows an authenticated attacker who can access to the product's command line interface to execute an arbitrary command."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN23771490/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.buffalo.jp/news/detail/20231225-01.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-46699",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:10.407",
"lastModified": "2023-12-26T08:15:10.407",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability exists in the User settings (/me) page of GROWI versions prior to v6.0.0. If a user views a malicious page while logging in, settings may be changed without the user's intention."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-46711",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:10.530",
"lastModified": "2023-12-26T08:15:10.530",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "VR-S1000 firmware Ver. 2.37 and earlier uses a hard-coded cryptographic key which may allow an attacker to analyze the password of a specific product user."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN23771490/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.buffalo.jp/news/detail/20231225-01.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-47215",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:10.643",
"lastModified": "2023-12-26T08:15:10.643",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting vulnerability which is exploiting a behavior of the XSS Filter exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-49119",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:10.793",
"lastModified": "2023-12-26T08:15:10.793",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting vulnerability via the img tags exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-49598",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:10.930",
"lastModified": "2023-12-26T08:15:10.930",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting vulnerability exists in the event handlers of the pre tags in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-49779",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:11.017",
"lastModified": "2023-12-26T08:15:11.017",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting vulnerability exists in the anchor tag of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-49807",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:11.113",
"lastModified": "2023-12-26T08:15:11.113",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting vulnerability when processing the MathJax exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-50175",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:11.290",
"lastModified": "2023-12-26T08:15:11.290",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page, the Markdown Settings (/admin/markdown) page, and the Customize (/admin/customize) page of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-50294",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:11.427",
"lastModified": "2023-12-26T08:15:11.427",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The App Settings (/admin/app) page in GROWI versions prior to v6.0.6 stores sensitive information in cleartext form. As a result, the Secret access key for external service may be obtained by an attacker who can access the App Settings page."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-50332",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:11.570",
"lastModified": "2023-12-26T08:15:11.570",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper authorization vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.0.6. If this vulnerability is exploited, a user may delete or suspend its own account without the user's intention.\r\n"
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-50339",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:11.657",
"lastModified": "2023-12-26T08:15:11.657",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.1.11. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-51363",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-26T08:15:11.760",
"lastModified": "2023-12-26T08:15:11.760",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "VR-S1000 firmware Ver. 2.37 and earlier allows a network-adjacent unauthenticated attacker who can access the product's web management page to obtain sensitive information."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN23771490/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.buffalo.jp/news/detail/20231225-01.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-12-26T07:00:24.303947+00:00
2023-12-26T09:00:24.312836+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-12-26T06:15:07.530000+00:00
2023-12-26T08:15:11.760000+00:00
```
### Last Data Feed Release
@ -29,16 +29,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
234212
234229
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `17`
* [CVE-2023-49117](CVE-2023/CVE-2023-491xx/CVE-2023-49117.json) (`2023-12-26T06:15:07.260`)
* [CVE-2023-50297](CVE-2023/CVE-2023-502xx/CVE-2023-50297.json) (`2023-12-26T06:15:07.473`)
* [CVE-2023-51654](CVE-2023/CVE-2023-516xx/CVE-2023-51654.json) (`2023-12-26T06:15:07.530`)
* [CVE-2023-42436](CVE-2023/CVE-2023-424xx/CVE-2023-42436.json) (`2023-12-26T08:15:09.637`)
* [CVE-2023-45737](CVE-2023/CVE-2023-457xx/CVE-2023-45737.json) (`2023-12-26T08:15:09.907`)
* [CVE-2023-45740](CVE-2023/CVE-2023-457xx/CVE-2023-45740.json) (`2023-12-26T08:15:10.010`)
* [CVE-2023-45741](CVE-2023/CVE-2023-457xx/CVE-2023-45741.json) (`2023-12-26T08:15:10.107`)
* [CVE-2023-46681](CVE-2023/CVE-2023-466xx/CVE-2023-46681.json) (`2023-12-26T08:15:10.247`)
* [CVE-2023-46699](CVE-2023/CVE-2023-466xx/CVE-2023-46699.json) (`2023-12-26T08:15:10.407`)
* [CVE-2023-46711](CVE-2023/CVE-2023-467xx/CVE-2023-46711.json) (`2023-12-26T08:15:10.530`)
* [CVE-2023-47215](CVE-2023/CVE-2023-472xx/CVE-2023-47215.json) (`2023-12-26T08:15:10.643`)
* [CVE-2023-49119](CVE-2023/CVE-2023-491xx/CVE-2023-49119.json) (`2023-12-26T08:15:10.793`)
* [CVE-2023-49598](CVE-2023/CVE-2023-495xx/CVE-2023-49598.json) (`2023-12-26T08:15:10.930`)
* [CVE-2023-49779](CVE-2023/CVE-2023-497xx/CVE-2023-49779.json) (`2023-12-26T08:15:11.017`)
* [CVE-2023-49807](CVE-2023/CVE-2023-498xx/CVE-2023-49807.json) (`2023-12-26T08:15:11.113`)
* [CVE-2023-50175](CVE-2023/CVE-2023-501xx/CVE-2023-50175.json) (`2023-12-26T08:15:11.290`)
* [CVE-2023-50294](CVE-2023/CVE-2023-502xx/CVE-2023-50294.json) (`2023-12-26T08:15:11.427`)
* [CVE-2023-50332](CVE-2023/CVE-2023-503xx/CVE-2023-50332.json) (`2023-12-26T08:15:11.570`)
* [CVE-2023-50339](CVE-2023/CVE-2023-503xx/CVE-2023-50339.json) (`2023-12-26T08:15:11.657`)
* [CVE-2023-51363](CVE-2023/CVE-2023-513xx/CVE-2023-51363.json) (`2023-12-26T08:15:11.760`)
### CVEs modified in the last Commit