mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-30 02:00:53 +00:00
Auto-Update: 2023-09-16T02:00:25.450496+00:00
This commit is contained in:
parent
af49e4fbee
commit
9258d25681
20
CVE-2023/CVE-2023-361xx/CVE-2023-36160.json
Normal file
20
CVE-2023/CVE-2023-361xx/CVE-2023-36160.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-36160",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-16T00:15:07.857",
|
||||
"lastModified": "2023-09-16T00:15:07.857",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Qubo Smart Plug10A version HSP02_01_01_14_SYSTEM-10 A, allows local attackers to gain sensitive information and other unspecified impact via UART console."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Yashodhanvivek/Qubo_smart_switch_security_assessment/blob/main/Qubo_Smart_Plug_10A_Security_Assessment.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-396xx/CVE-2023-39612.json
Normal file
28
CVE-2023/CVE-2023-396xx/CVE-2023-39612.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-39612",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-16T01:15:07.397",
|
||||
"lastModified": "2023-09-16T01:15:07.397",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in FileBrowser before v2.23.0 allows an authenticated attacker to escalate privileges to Administrator via user interaction with a crafted HTML file or URL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://febin0x4e4a.wordpress.com/2023/09/15/xss-in-filebrowser-leads-to-admin-account-takeover-in-filebrowser/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/filebrowser/filebrowser/commit/b508ac3d4f7f0f75d6b49c99bdc661a6d2173f30",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/filebrowser/filebrowser/issues/2570",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-397xx/CVE-2023-39777.json
Normal file
20
CVE-2023/CVE-2023-397xx/CVE-2023-39777.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-39777",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-16T01:15:08.140",
|
||||
"lastModified": "2023-09-16T01:15:08.140",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the Admin Control Panel of vBulletin 5.7.5 and 6.0.0 allows attackers to execute arbitrary web scripts or HTML via the /login.php?do=login url parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/GiongfNef/8fe658dce4c7fcf3a7b4e6387e50141c",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-414xx/CVE-2023-41436.json
Normal file
20
CVE-2023/CVE-2023-414xx/CVE-2023-41436.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-41436",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-16T00:15:08.480",
|
||||
"lastModified": "2023-09-16T00:15:08.480",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in CSZCMS v.1.3.0 allows a local attacker to execute arbitrary code via a crafted script to the Additional Meta Tag parameter in the Pages Content Menu component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/sromanhu/CSZ-CMS-Stored-XSS---Pages-Content/blob/main/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-423xx/CVE-2023-42336.json
Normal file
20
CVE-2023/CVE-2023-423xx/CVE-2023-42336.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42336",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-16T01:15:08.250",
|
||||
"lastModified": "2023-09-16T01:15:08.250",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in NETIS SYSTEMS WF2409Ev4 v.1.0.1.705 allows a remote attacker to execute arbitrary code and obtain sensitive information via the password parameter in the /etc/shadow.sample component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adhikara13/CVE/blob/main/netis_WF2409E/Root_Hard_Code.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,74 +2,14 @@
|
||||
"id": "CVE-2023-4330",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.177",
|
||||
"lastModified": "2023-08-21T18:40:31.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-16T00:15:11.397",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable Denial of Service can be caused by an authenticated user to the REST API Interface"
|
||||
"value": "** REJECT ** Broadcom were unable to duplicate the attack as described by Intel DCG Team. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:broadcom:raid_controller_web_interface:51.12.0-2779:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0E02E4F-627F-49C5-867F-E872EC6A208C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
47
README.md
47
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-09-15T23:55:25.027890+00:00
|
||||
2023-09-16T02:00:25.450496+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-09-15T23:15:07.370000+00:00
|
||||
2023-09-16T01:15:08.250000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -23,54 +23,31 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2023-09-15T00:00:13.565802+00:00
|
||||
2023-09-16T00:00:13.553570+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
225706
|
||||
225711
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
* [CVE-2023-36562](CVE-2023/CVE-2023-365xx/CVE-2023-36562.json) (`2023-09-15T22:15:13.490`)
|
||||
* [CVE-2023-36727](CVE-2023/CVE-2023-367xx/CVE-2023-36727.json) (`2023-09-15T22:15:13.613`)
|
||||
* [CVE-2023-36735](CVE-2023/CVE-2023-367xx/CVE-2023-36735.json) (`2023-09-15T22:15:13.700`)
|
||||
* [CVE-2023-41626](CVE-2023/CVE-2023-416xx/CVE-2023-41626.json) (`2023-09-15T23:15:07.370`)
|
||||
* [CVE-2023-36160](CVE-2023/CVE-2023-361xx/CVE-2023-36160.json) (`2023-09-16T00:15:07.857`)
|
||||
* [CVE-2023-41436](CVE-2023/CVE-2023-414xx/CVE-2023-41436.json) (`2023-09-16T00:15:08.480`)
|
||||
* [CVE-2023-39612](CVE-2023/CVE-2023-396xx/CVE-2023-39612.json) (`2023-09-16T01:15:07.397`)
|
||||
* [CVE-2023-39777](CVE-2023/CVE-2023-397xx/CVE-2023-39777.json) (`2023-09-16T01:15:08.140`)
|
||||
* [CVE-2023-42336](CVE-2023/CVE-2023-423xx/CVE-2023-42336.json) (`2023-09-16T01:15:08.250`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `50`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
* [CVE-2023-22054](CVE-2023/CVE-2023-220xx/CVE-2023-22054.json) (`2023-09-15T22:15:12.923`)
|
||||
* [CVE-2023-22056](CVE-2023/CVE-2023-220xx/CVE-2023-22056.json) (`2023-09-15T22:15:13.037`)
|
||||
* [CVE-2023-22057](CVE-2023/CVE-2023-220xx/CVE-2023-22057.json) (`2023-09-15T22:15:13.170`)
|
||||
* [CVE-2023-22058](CVE-2023/CVE-2023-220xx/CVE-2023-22058.json) (`2023-09-15T22:15:13.267`)
|
||||
* [CVE-2023-2906](CVE-2023/CVE-2023-29xx/CVE-2023-2906.json) (`2023-09-15T22:15:13.367`)
|
||||
* [CVE-2023-36811](CVE-2023/CVE-2023-368xx/CVE-2023-36811.json) (`2023-09-15T22:15:13.833`)
|
||||
* [CVE-2023-37464](CVE-2023/CVE-2023-374xx/CVE-2023-37464.json) (`2023-09-15T22:15:13.967`)
|
||||
* [CVE-2023-39968](CVE-2023/CVE-2023-399xx/CVE-2023-39968.json) (`2023-09-15T22:15:14.217`)
|
||||
* [CVE-2023-40170](CVE-2023/CVE-2023-401xx/CVE-2023-40170.json) (`2023-09-15T22:15:14.333`)
|
||||
* [CVE-2023-40184](CVE-2023/CVE-2023-401xx/CVE-2023-40184.json) (`2023-09-15T22:15:14.457`)
|
||||
* [CVE-2023-41053](CVE-2023/CVE-2023-410xx/CVE-2023-41053.json) (`2023-09-15T22:15:14.573`)
|
||||
* [CVE-2023-4427](CVE-2023/CVE-2023-44xx/CVE-2023-4427.json) (`2023-09-15T22:15:14.777`)
|
||||
* [CVE-2023-4428](CVE-2023/CVE-2023-44xx/CVE-2023-4428.json) (`2023-09-15T22:15:15.447`)
|
||||
* [CVE-2023-4429](CVE-2023/CVE-2023-44xx/CVE-2023-4429.json) (`2023-09-15T22:15:15.523`)
|
||||
* [CVE-2023-4430](CVE-2023/CVE-2023-44xx/CVE-2023-4430.json) (`2023-09-15T22:15:15.613`)
|
||||
* [CVE-2023-4431](CVE-2023/CVE-2023-44xx/CVE-2023-4431.json) (`2023-09-15T22:15:15.730`)
|
||||
* [CVE-2023-4511](CVE-2023/CVE-2023-45xx/CVE-2023-4511.json) (`2023-09-15T22:15:16.123`)
|
||||
* [CVE-2023-4512](CVE-2023/CVE-2023-45xx/CVE-2023-4512.json) (`2023-09-15T22:15:16.230`)
|
||||
* [CVE-2023-4513](CVE-2023/CVE-2023-45xx/CVE-2023-4513.json) (`2023-09-15T22:15:16.323`)
|
||||
* [CVE-2023-4572](CVE-2023/CVE-2023-45xx/CVE-2023-4572.json) (`2023-09-15T22:15:16.910`)
|
||||
* [CVE-2023-4761](CVE-2023/CVE-2023-47xx/CVE-2023-4761.json) (`2023-09-15T22:15:17.267`)
|
||||
* [CVE-2023-4762](CVE-2023/CVE-2023-47xx/CVE-2023-4762.json) (`2023-09-15T22:15:17.353`)
|
||||
* [CVE-2023-4763](CVE-2023/CVE-2023-47xx/CVE-2023-4763.json) (`2023-09-15T22:15:17.443`)
|
||||
* [CVE-2023-4764](CVE-2023/CVE-2023-47xx/CVE-2023-4764.json) (`2023-09-15T22:15:18.340`)
|
||||
* [CVE-2023-4863](CVE-2023/CVE-2023-48xx/CVE-2023-4863.json) (`2023-09-15T22:15:19.227`)
|
||||
* [CVE-2023-4330](CVE-2023/CVE-2023-43xx/CVE-2023-4330.json) (`2023-09-16T00:15:11.397`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user