Auto-Update: 2023-09-16T02:00:25.450496+00:00

This commit is contained in:
cad-safe-bot 2023-09-16 02:00:29 +00:00
parent af49e4fbee
commit 9258d25681
7 changed files with 125 additions and 100 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-36160",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-16T00:15:07.857",
"lastModified": "2023-09-16T00:15:07.857",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Qubo Smart Plug10A version HSP02_01_01_14_SYSTEM-10 A, allows local attackers to gain sensitive information and other unspecified impact via UART console."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Yashodhanvivek/Qubo_smart_switch_security_assessment/blob/main/Qubo_Smart_Plug_10A_Security_Assessment.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-39612",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-16T01:15:07.397",
"lastModified": "2023-09-16T01:15:07.397",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in FileBrowser before v2.23.0 allows an authenticated attacker to escalate privileges to Administrator via user interaction with a crafted HTML file or URL."
}
],
"metrics": {},
"references": [
{
"url": "https://febin0x4e4a.wordpress.com/2023/09/15/xss-in-filebrowser-leads-to-admin-account-takeover-in-filebrowser/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/filebrowser/filebrowser/commit/b508ac3d4f7f0f75d6b49c99bdc661a6d2173f30",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/filebrowser/filebrowser/issues/2570",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-39777",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-16T01:15:08.140",
"lastModified": "2023-09-16T01:15:08.140",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the Admin Control Panel of vBulletin 5.7.5 and 6.0.0 allows attackers to execute arbitrary web scripts or HTML via the /login.php?do=login url parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/GiongfNef/8fe658dce4c7fcf3a7b4e6387e50141c",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-41436",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-16T00:15:08.480",
"lastModified": "2023-09-16T00:15:08.480",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in CSZCMS v.1.3.0 allows a local attacker to execute arbitrary code via a crafted script to the Additional Meta Tag parameter in the Pages Content Menu component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/sromanhu/CSZ-CMS-Stored-XSS---Pages-Content/blob/main/README.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42336",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-16T01:15:08.250",
"lastModified": "2023-09-16T01:15:08.250",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in NETIS SYSTEMS WF2409Ev4 v.1.0.1.705 allows a remote attacker to execute arbitrary code and obtain sensitive information via the password parameter in the /etc/shadow.sample component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adhikara13/CVE/blob/main/netis_WF2409E/Root_Hard_Code.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,74 +2,14 @@
"id": "CVE-2023-4330",
"sourceIdentifier": "cret@cert.org",
"published": "2023-08-15T19:15:11.177",
"lastModified": "2023-08-21T18:40:31.387",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-16T00:15:11.397",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Broadcom RAID Controller web interface is vulnerable Denial of Service can be caused by an authenticated user to the REST API Interface"
"value": "** REJECT ** Broadcom were unable to duplicate the attack as described by Intel DCG Team. "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:raid_controller_web_interface:51.12.0-2779:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E02E4F-627F-49C5-867F-E872EC6A208C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.broadcom.com/support/resources/product-security-center",
"source": "cret@cert.org",
"tags": [
"Product"
]
}
]
"metrics": {},
"references": []
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-15T23:55:25.027890+00:00
2023-09-16T02:00:25.450496+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-15T23:15:07.370000+00:00
2023-09-16T01:15:08.250000+00:00
```
### Last Data Feed Release
@ -23,54 +23,31 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2023-09-15T00:00:13.565802+00:00
2023-09-16T00:00:13.553570+00:00
```
### Total Number of included CVEs
```plain
225706
225711
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `5`
* [CVE-2023-36562](CVE-2023/CVE-2023-365xx/CVE-2023-36562.json) (`2023-09-15T22:15:13.490`)
* [CVE-2023-36727](CVE-2023/CVE-2023-367xx/CVE-2023-36727.json) (`2023-09-15T22:15:13.613`)
* [CVE-2023-36735](CVE-2023/CVE-2023-367xx/CVE-2023-36735.json) (`2023-09-15T22:15:13.700`)
* [CVE-2023-41626](CVE-2023/CVE-2023-416xx/CVE-2023-41626.json) (`2023-09-15T23:15:07.370`)
* [CVE-2023-36160](CVE-2023/CVE-2023-361xx/CVE-2023-36160.json) (`2023-09-16T00:15:07.857`)
* [CVE-2023-41436](CVE-2023/CVE-2023-414xx/CVE-2023-41436.json) (`2023-09-16T00:15:08.480`)
* [CVE-2023-39612](CVE-2023/CVE-2023-396xx/CVE-2023-39612.json) (`2023-09-16T01:15:07.397`)
* [CVE-2023-39777](CVE-2023/CVE-2023-397xx/CVE-2023-39777.json) (`2023-09-16T01:15:08.140`)
* [CVE-2023-42336](CVE-2023/CVE-2023-423xx/CVE-2023-42336.json) (`2023-09-16T01:15:08.250`)
### CVEs modified in the last Commit
Recently modified CVEs: `50`
Recently modified CVEs: `1`
* [CVE-2023-22054](CVE-2023/CVE-2023-220xx/CVE-2023-22054.json) (`2023-09-15T22:15:12.923`)
* [CVE-2023-22056](CVE-2023/CVE-2023-220xx/CVE-2023-22056.json) (`2023-09-15T22:15:13.037`)
* [CVE-2023-22057](CVE-2023/CVE-2023-220xx/CVE-2023-22057.json) (`2023-09-15T22:15:13.170`)
* [CVE-2023-22058](CVE-2023/CVE-2023-220xx/CVE-2023-22058.json) (`2023-09-15T22:15:13.267`)
* [CVE-2023-2906](CVE-2023/CVE-2023-29xx/CVE-2023-2906.json) (`2023-09-15T22:15:13.367`)
* [CVE-2023-36811](CVE-2023/CVE-2023-368xx/CVE-2023-36811.json) (`2023-09-15T22:15:13.833`)
* [CVE-2023-37464](CVE-2023/CVE-2023-374xx/CVE-2023-37464.json) (`2023-09-15T22:15:13.967`)
* [CVE-2023-39968](CVE-2023/CVE-2023-399xx/CVE-2023-39968.json) (`2023-09-15T22:15:14.217`)
* [CVE-2023-40170](CVE-2023/CVE-2023-401xx/CVE-2023-40170.json) (`2023-09-15T22:15:14.333`)
* [CVE-2023-40184](CVE-2023/CVE-2023-401xx/CVE-2023-40184.json) (`2023-09-15T22:15:14.457`)
* [CVE-2023-41053](CVE-2023/CVE-2023-410xx/CVE-2023-41053.json) (`2023-09-15T22:15:14.573`)
* [CVE-2023-4427](CVE-2023/CVE-2023-44xx/CVE-2023-4427.json) (`2023-09-15T22:15:14.777`)
* [CVE-2023-4428](CVE-2023/CVE-2023-44xx/CVE-2023-4428.json) (`2023-09-15T22:15:15.447`)
* [CVE-2023-4429](CVE-2023/CVE-2023-44xx/CVE-2023-4429.json) (`2023-09-15T22:15:15.523`)
* [CVE-2023-4430](CVE-2023/CVE-2023-44xx/CVE-2023-4430.json) (`2023-09-15T22:15:15.613`)
* [CVE-2023-4431](CVE-2023/CVE-2023-44xx/CVE-2023-4431.json) (`2023-09-15T22:15:15.730`)
* [CVE-2023-4511](CVE-2023/CVE-2023-45xx/CVE-2023-4511.json) (`2023-09-15T22:15:16.123`)
* [CVE-2023-4512](CVE-2023/CVE-2023-45xx/CVE-2023-4512.json) (`2023-09-15T22:15:16.230`)
* [CVE-2023-4513](CVE-2023/CVE-2023-45xx/CVE-2023-4513.json) (`2023-09-15T22:15:16.323`)
* [CVE-2023-4572](CVE-2023/CVE-2023-45xx/CVE-2023-4572.json) (`2023-09-15T22:15:16.910`)
* [CVE-2023-4761](CVE-2023/CVE-2023-47xx/CVE-2023-4761.json) (`2023-09-15T22:15:17.267`)
* [CVE-2023-4762](CVE-2023/CVE-2023-47xx/CVE-2023-4762.json) (`2023-09-15T22:15:17.353`)
* [CVE-2023-4763](CVE-2023/CVE-2023-47xx/CVE-2023-4763.json) (`2023-09-15T22:15:17.443`)
* [CVE-2023-4764](CVE-2023/CVE-2023-47xx/CVE-2023-4764.json) (`2023-09-15T22:15:18.340`)
* [CVE-2023-4863](CVE-2023/CVE-2023-48xx/CVE-2023-4863.json) (`2023-09-15T22:15:19.227`)
* [CVE-2023-4330](CVE-2023/CVE-2023-43xx/CVE-2023-4330.json) (`2023-09-16T00:15:11.397`)
## Download and Usage