diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10027.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10027.json index 8b741d8f14c..7a8c19635f0 100644 --- a/CVE-2013/CVE-2013-100xx/CVE-2013-10027.json +++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10027.json @@ -2,8 +2,8 @@ "id": "CVE-2013-10027", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-04T14:15:09.397", - "lastModified": "2023-06-04T14:15:09.397", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10028.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10028.json index 99aeb359497..c7db86e62d8 100644 --- a/CVE-2013/CVE-2013-100xx/CVE-2013-10028.json +++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10028.json @@ -2,8 +2,8 @@ "id": "CVE-2013-10028", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-04T19:15:09.620", - "lastModified": "2023-06-04T19:15:09.620", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125105.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125105.json index 9c94d7c1d3e..e995b3fb773 100644 --- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125105.json +++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125105.json @@ -2,12 +2,16 @@ "id": "CVE-2014-125105", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-05T01:15:45.637", - "lastModified": "2023-06-05T01:15:45.637", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Broken Link Checker Plugin up to 1.10.1 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function options_page of the file core/core.php of the component Settings Page. The manipulation of the argument exclusion_list/blc_custom_fields leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.10.2 is able to address this issue. The name of the patch is 90615fe9b0b6f9e6fb254d503c302e53a202e561. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230659." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en el plugin Broken Link Checker hasta la versi\u00f3n 1.10.1 en WordPress. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n \"options_page\" del archivo \"core/core.php\" del componente \"Settings Page\". La manipulaci\u00f3n del argumento \"exclusion_list/blc_custom_fields\" conduce a Cross-Site Scripting. El ataque puede lanzarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.10.2 soluciona este problema. El nombre del parche es 90615fe9b0b6f9e6fb254d503c302e53a202e561. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-230659." } ], "metrics": { diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10111.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10111.json index d1b5859486a..898509d5c98 100644 --- a/CVE-2015/CVE-2015-101xx/CVE-2015-10111.json +++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10111.json @@ -2,8 +2,8 @@ "id": "CVE-2015-10111", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-04T12:15:09.237", - "lastModified": "2023-06-04T12:15:09.237", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10112.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10112.json index 6e0ca3671dc..977704b1ae5 100644 --- a/CVE-2015/CVE-2015-101xx/CVE-2015-10112.json +++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10112.json @@ -2,8 +2,8 @@ "id": "CVE-2015-10112", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-05T08:15:09.380", - "lastModified": "2023-06-05T08:15:09.380", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0041.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0041.json index e3ce3cfcaf5..188e018a5ec 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0041.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0041.json @@ -2,12 +2,16 @@ "id": "CVE-2023-0041", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-06-05T01:15:45.810", - "lastModified": "2023-06-05T03:15:09.207", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "IBM Security Guardium 11.5 could allow a user to take over another user's session due to insufficient session expiration. IBM X-Force ID: 243657." + }, + { + "lang": "es", + "value": "IBM Security Guardium v11.5 podr\u00eda permitir a un usuario tomar el control de la sesi\u00f3n de otro usuario debido a una caducidad de sesi\u00f3n insuficiente. IBM X-Force ID: 243657. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0583.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0583.json index 65ba5e4889b..f76adb4aeb1 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0583.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0583.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0583", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T02:15:09.050", - "lastModified": "2023-06-03T02:15:09.050", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0584.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0584.json index 4d73221b473..2a9ed20c604 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0584.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0584.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0584", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T02:15:09.120", - "lastModified": "2023-06-03T02:15:09.120", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0635.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0635.json index 49d67e34ebf..055a3bb3d10 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0635.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0635.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0635", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2023-06-05T04:15:09.493", - "lastModified": "2023-06-05T04:15:09.493", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0636.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0636.json index 7ade3ec879e..cae828049cf 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0636.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0636.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0636", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2023-06-05T04:15:10.587", - "lastModified": "2023-06-05T04:15:10.587", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1297.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1297.json index 81603ef78d1..11f690f1f3c 100644 --- a/CVE-2023/CVE-2023-12xx/CVE-2023-1297.json +++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1297.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1297", "sourceIdentifier": "security@hashicorp.com", "published": "2023-06-02T23:15:09.293", - "lastModified": "2023-06-02T23:15:09.293", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22862.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22862.json index 2b011602b26..26315956b8c 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22862.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22862.json @@ -2,12 +2,16 @@ "id": "CVE-2023-22862", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-06-05T00:15:09.703", - "lastModified": "2023-06-05T00:15:09.703", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "IBM Aspera Connect 4.2.5 and IBM Aspera Cargo 4.2.5 transmits authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. IBM X-Force ID: 244107." + }, + { + "lang": "es", + "value": "IBM Aspera Connect e IBM Aspera Cargo 4.2.5 transmite credenciales de autenticaci\u00f3n, pero utiliza un m\u00e9todo inseguro que es susceptible de ser interceptado y/o recuperado sin autorizaci\u00f3n. IBM X-Force ID: 244107" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2298.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2298.json index 5ae34d15770..2c61b22a33f 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2298.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2298.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2298", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.173", - "lastModified": "2023-06-03T05:15:09.173", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2299.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2299.json index 18a17f2a65b..64704b582c6 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2299.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2299.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2299", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.267", - "lastModified": "2023-06-03T05:15:09.267", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2300.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2300.json index 2f1bbec4e1c..de629e13a03 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2300.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2300.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2300", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.330", - "lastModified": "2023-06-03T05:15:09.330", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2301.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2301.json index 3e4aa039210..02fe0d0fda0 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2301.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2301.json @@ -2,12 +2,16 @@ "id": "CVE-2023-2301", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.397", - "lastModified": "2023-06-03T05:15:09.397", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Contact Form Builder by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.9.1. This is due to missing nonce validation on the ls_parse_vcita_callback function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El plugin Contact Form Builder by vcita para WordPress es vulnerable a Cross-Site Request Forgery en versiones hasta la 4.9.1 inclusive. Esto se debe a la falta de validaci\u00f3n nonce en la funci\u00f3n \"ls_parse_vcita_callback\". Esto hace posible que los atacantes no autenticados modifiquen la configuraci\u00f3n del plugin e inyecten JavaScript malicioso a trav\u00e9s de una solicitud falsificada concedida y puedan enga\u00f1ar a un administrador del sitio para realizar una acci\u00f3n como hacer clic en un enlace. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2302.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2302.json index 250d296a0d4..54c3af5d0c8 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2302.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2302.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2302", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.460", - "lastModified": "2023-06-03T05:15:09.460", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2303.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2303.json index 3b902953079..6bfca1fb85f 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2303.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2303.json @@ -2,12 +2,16 @@ "id": "CVE-2023-2303", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.527", - "lastModified": "2023-06-03T05:15:09.527", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.6.4. This is due to missing nonce validation in the vcita-callback.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El plugin Contact Form y el Calls To Action by vcita para WordPress es vulnerable a Cross-Site Request Forgery en versiones hasta la 2.6.4 inclusive. Esto se debe a la falta de validaci\u00f3n nonce en el archivo \"vcita-callback.php\". Esto hace posible que los atacantes no autenticados modifiquen la configuraci\u00f3n del plugin e inyecten JavaScript malicioso a trav\u00e9s de una solicitud falsificada concedida y puedan enga\u00f1ar a un administrador del sitio para realizar una acci\u00f3n como hacer clic en un enlace. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2404.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2404.json index ab180fb7d19..2bb969d9031 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2404.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2404.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2404", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.593", - "lastModified": "2023-06-03T05:15:09.593", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2405.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2405.json index 9f9919df540..2039c99fe32 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2405.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2405.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2405", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.653", - "lastModified": "2023-06-03T05:15:09.653", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2406.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2406.json index f8c234189cc..43122859005 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2406.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2406.json @@ -2,12 +2,16 @@ "id": "CVE-2023-2406", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.717", - "lastModified": "2023-06-03T05:15:09.717", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Event Registration Calendar By vcita plugin, versions up to and including 3.9.1, and Online Payments \u2013 Get Paid with PayPal, Square & Stripe plugin, for WordPress are vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El plugin Event Registration Calendar By vcita, versiones hasta la 3.9.1 inlcusive, y el plugin Online Payments \u2013 Get Paid with PayPal, Square & Stripe, para WordPress son vulnerables a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro \"email\" en versiones hasta la 1.3.1 inclusive, debido a un insuficiente saneamiento de entrada y escape de salida. Esto hace posible que atacantes autenticados con la capacidad \"edit_posts\", como los contribuidores y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2407.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2407.json index c3eab833a01..0c3f907ede7 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2407.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2407.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2407", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.780", - "lastModified": "2023-06-03T05:15:09.780", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2415.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2415.json index 3d4c7692d57..a178b2c17bd 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2415.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2415.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2415", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.843", - "lastModified": "2023-06-03T05:15:09.843", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2416.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2416.json index 5fd051dd564..31dcb8fb4be 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2416.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2416.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2416", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.903", - "lastModified": "2023-06-03T05:15:09.903", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27285.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27285.json index 31e69091dcf..ce7b4d7352b 100644 --- a/CVE-2023/CVE-2023-272xx/CVE-2023-27285.json +++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27285.json @@ -2,12 +2,16 @@ "id": "CVE-2023-27285", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-06-05T00:15:09.920", - "lastModified": "2023-06-05T00:15:09.920", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "IBM Aspera Connect 4.2.5 and IBM Aspera Cargo 4.2.5 is vulnerable to a buffer overflow, caused by improper bounds checking. An attacker could overflow a buffer and execute arbitrary code on the system. IBM X-Force ID: 248625." + }, + { + "lang": "es", + "value": "IBM Aspera Connect v4.2.5 e IBM Aspera Cargo v4.2.5 son vulnerables a un desbordamiento de b\u00fafer, causado por una comprobaci\u00f3n de l\u00edmites incorrecta. Un atacante podr\u00eda desbordar un b\u00fafer y ejecutar c\u00f3digo arbitrario en el sistema. IBM X-Force ID: 248625. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27861.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27861.json index 49b11a66cc6..fea6a3a073b 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27861.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27861.json @@ -2,12 +2,16 @@ "id": "CVE-2023-27861", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-06-05T01:15:45.890", - "lastModified": "2023-06-05T01:15:45.890", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "IBM Maximo Application Suite - Manage Component 8.8.0 and 8.9.0 transmits sensitive information in cleartext that could be intercepted by an attacker using man in the middle techniques. IBM X-Force ID: 249208." + }, + { + "lang": "es", + "value": "IBM Maximo Application Suite - Manage Component v8.8.0 y v8.9.0 transmite informaci\u00f3n confidencial en texto claro que podr\u00eda ser interceptada por un atacante mediante t\u00e9cnicas de \"man in the middle\". IBM X-Force ID: 249208. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27989.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27989.json new file mode 100644 index 00000000000..ea614210a38 --- /dev/null +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27989.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27989", + "sourceIdentifier": "security@zyxel.com.tw", + "published": "2023-06-05T12:15:09.360", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow vulnerability in the CGI program of the Zyxel NR7101 firmware versions prior to V1.00(ABUV.8)C0 could allow a remote authenticated attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zyxel.com.tw", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@zyxel.com.tw", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerability-in-4g-lte-and-5g-nr-outdoor-routers", + "source": "security@zyxel.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2781.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2781.json index 101916317ae..20fce8b1cf8 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2781.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2781.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2781", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T00:15:09.353", - "lastModified": "2023-06-03T00:15:09.353", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2816.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2816.json index 5e30e4f0ea1..71899e8120b 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2816.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2816.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2816", "sourceIdentifier": "security@hashicorp.com", "published": "2023-06-02T23:15:09.503", - "lastModified": "2023-06-02T23:15:09.503", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3044.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3044.json index 0dc92d7896e..447cacbce1f 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3044.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3044.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3044", "sourceIdentifier": "xpdf@xpdfreader.com", "published": "2023-06-02T23:15:09.580", - "lastModified": "2023-06-02T23:15:09.580", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3051.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3051.json index cce552a4a84..ffb4a306f3a 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3051.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3051.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3051", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T00:15:09.437", - "lastModified": "2023-06-03T00:15:09.437", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3052.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3052.json index c20c5e9e9a1..48f4a484db7 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3052.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3052.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3052", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T00:15:09.503", - "lastModified": "2023-06-03T00:15:09.503", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3053.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3053.json index e2b4d185b14..331cf4c6c0b 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3053.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3053.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3053", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T00:15:09.570", - "lastModified": "2023-06-03T00:15:09.570", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3055.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3055.json index 5a9bfcf29e9..f7f8328e597 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3055.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3055.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3055", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T00:15:09.637", - "lastModified": "2023-06-03T00:15:09.637", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3064.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3064.json index 21df3b99791..c6833c0a506 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3064.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3064.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3064", "sourceIdentifier": "vulnerability@ncsc.ch", "published": "2023-06-05T09:15:09.413", - "lastModified": "2023-06-05T09:15:09.413", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3065.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3065.json index eef6aae900b..62842150408 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3065.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3065.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3065", "sourceIdentifier": "vulnerability@ncsc.ch", "published": "2023-06-05T09:15:09.530", - "lastModified": "2023-06-05T09:15:09.530", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3066.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3066.json index 07984b72a87..0afdad98682 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3066.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3066.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3066", "sourceIdentifier": "vulnerability@ncsc.ch", "published": "2023-06-05T09:15:09.593", - "lastModified": "2023-06-05T09:15:09.593", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3083.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3083.json index 88ed93bab2c..d1a08680c7e 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3083.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3083.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3083", "sourceIdentifier": "security@huntr.dev", "published": "2023-06-03T08:15:08.853", - "lastModified": "2023-06-03T08:15:08.853", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3084.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3084.json index 42f08c56fb9..06c42dccab8 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3084.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3084.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3084", "sourceIdentifier": "security@huntr.dev", "published": "2023-06-03T11:15:20.737", - "lastModified": "2023-06-03T11:15:20.737", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3085.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3085.json index 3e108b893c2..cd43b8a557a 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3085.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3085.json @@ -2,12 +2,16 @@ "id": "CVE-2023-3085", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-03T11:15:21.443", - "lastModified": "2023-06-03T11:15:21.443", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in X-WRT luci up to 22.10_b202303061504. This issue affects the function run_action of the file modules/luci-base/ucode/dispatcher.uc of the component 404 Error Template Handler. The manipulation of the argument request_path leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 22.10_b202303121313 is able to address this issue. The name of the patch is 24d7da2416b9ab246825c33c213fe939a89b369c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230663." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, clasificada como problem\u00e1tica, en X-WRT luci hasta la versi\u00f3n 22.10_b202303061504. Este problema afecta a la funci\u00f3n \"run_action\" del archivo \"modules/luci-base/ucode/dispatcher.uc\" del componente \"404 Error Template Handler\". La manipulaci\u00f3n del argumento \"request_path\" conduce a Cross-Site Scripting. El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 22.10_b202303121313 soluciona este problema. El nombre del parche es 24d7da2416b9ab246825c33c213fe939a89b369c. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-230663." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3086.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3086.json index 338352bbc9e..117b4fbeb80 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3086.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3086.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3086", "sourceIdentifier": "security@huntr.dev", "published": "2023-06-03T12:15:09.317", - "lastModified": "2023-06-03T12:15:09.317", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3091.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3091.json index fcec4521ee7..46199480af2 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3091.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3091.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3091", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-04T00:15:09.553", - "lastModified": "2023-06-04T00:15:09.553", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3094.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3094.json index d542c1dc0d7..dea59769283 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3094.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3094.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3094", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-04T09:15:09.730", - "lastModified": "2023-06-04T09:15:09.730", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3095.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3095.json index 1e68699df1e..5bd9098f9c7 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3095.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3095.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3095", "sourceIdentifier": "security@huntr.dev", "published": "2023-06-04T11:15:09.167", - "lastModified": "2023-06-04T11:15:09.167", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3096.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3096.json index 154d9b0b181..98db441ed61 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3096.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3096.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3096", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-05T06:15:09.227", - "lastModified": "2023-06-05T06:15:09.227", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3097.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3097.json index 8acb8ac206f..27613d8fa6a 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3097.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3097.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3097", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-05T06:15:09.463", - "lastModified": "2023-06-05T06:15:09.463", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3098.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3098.json index aee6037ed23..c7b9f8fd0e1 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3098.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3098.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3098", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-05T07:15:09.420", - "lastModified": "2023-06-05T07:15:09.420", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3099.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3099.json index 446dee2683d..0f07c0a7121 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3099.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3099.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3099", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-05T07:15:11.143", - "lastModified": "2023-06-05T07:15:11.143", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3100.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3100.json index f59bf4bcb73..983e34d42b3 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3100.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3100.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3100", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-05T08:15:09.667", - "lastModified": "2023-06-05T08:15:09.667", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32217.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32217.json index c4d0712e2e7..be9fb17dbaa 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32217.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32217.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32217", "sourceIdentifier": "psirt@sailpoint.com", "published": "2023-06-05T04:15:10.927", - "lastModified": "2023-06-05T04:15:10.927", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32334.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32334.json index 7b41ee6d788..0f6cd32793e 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32334.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32334.json @@ -2,12 +2,16 @@ "id": "CVE-2023-32334", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-06-05T01:15:45.960", - "lastModified": "2023-06-05T01:15:45.960", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "IBM Maximo Asset Management 7.6.1.2, 7.6.1.3 and IBM Maximo Application Suite 8.8.0 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 255074." + }, + { + "lang": "es", + "value": "IBM Maximo Asset Management v7.6.1.2, v7.6.1.3 e IBM Maximo Application Suite v8.8.0 almacenan informaci\u00f3n confidencial en par\u00e1metros de URL. Esto puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n si partes no autorizadas tienen acceso a las URL a trav\u00e9s de los registros del servidor, el encabezado de referencia o el historial del navegador. IBM X-Force ID: 255074. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32582.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32582.json index c05e0c908a7..ea46e2293ac 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32582.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32582.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32582", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-03T12:15:09.233", - "lastModified": "2023-06-03T12:15:09.233", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:03.327", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33143.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33143.json index c1cc954a64f..69079aca068 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33143.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33143.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33143", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-03T01:15:36.693", - "lastModified": "2023-06-03T01:15:36.693", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:03:17.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33187.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33187.json index baa841bf31a..3e07420343e 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33187.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33187.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33187", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-26T21:15:20.693", - "lastModified": "2023-05-28T02:28:04.970", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-05T13:50:24.813", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +76,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:highlight:highlight:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "6.0.0", + "matchCriteriaId": "98A60E3C-555D-4105-91BD-5E3FBAFE4465" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/highlight/highlight/security/advisories/GHSA-9qpj-qq2r-5mcc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/rrweb-io/rrweb/pull/1184", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34407.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34407.json index eae59c99a70..768c9a1ed5d 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34407.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34407.json @@ -2,12 +2,16 @@ "id": "CVE-2023-34407", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-05T02:15:09.407", - "lastModified": "2023-06-05T02:15:09.407", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "OfflinePlayerService.exe in Harbinger Offline Player 4.0.6.0.2 allows directory traversal as LocalSystem via ..\\ in a URL." + }, + { + "lang": "es", + "value": "El archivo ejecutable \"OfflinePlayerService.exe\" en Harbinger Offline Player v4.0.6.0.2 permite el salto de directorios como LocalSystem a trav\u00e9s de ..\\ en una URL. " } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34408.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34408.json index f117a6542f8..1cdc2322997 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34408.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34408.json @@ -2,12 +2,16 @@ "id": "CVE-2023-34408", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-05T02:15:09.537", - "lastModified": "2023-06-05T02:15:09.537", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "DokuWiki before 2023-04-04a allows XSS via RSS titles." + }, + { + "lang": "es", + "value": "DokuWiki antes de la fecha 04-04-2023 permite ataques de Cross-Site Scripting (XSS) a trav\u00e9s de t\u00edtulos RSS. " } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34410.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34410.json index 5b90a6d225f..ba207a351a3 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34410.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34410.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34410", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-05T03:15:09.390", - "lastModified": "2023-06-05T03:15:09.390", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34411.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34411.json index 960a3f4e4cc..235b35ec01e 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34411.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34411.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34411", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-05T04:15:11.153", - "lastModified": "2023-06-05T04:15:11.153", - "vulnStatus": "Received", + "lastModified": "2023-06-05T13:02:53.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 165b6d6a43a..850f1cb507f 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-05T12:00:28.900504+00:00 +2023-06-05T14:00:28.217196+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-05T11:15:09.357000+00:00 +2023-06-05T13:50:24.813000+00:00 ``` ### Last Data Feed Release @@ -29,20 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -216844 +216845 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `1` +* [CVE-2023-27989](CVE-2023/CVE-2023-279xx/CVE-2023-27989.json) (`2023-06-05T12:15:09.360`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `57` -* [CVE-2022-45853](CVE-2022/CVE-2022-458xx/CVE-2022-45853.json) (`2023-06-05T11:15:09.357`) +* [CVE-2023-32582](CVE-2023/CVE-2023-325xx/CVE-2023-32582.json) (`2023-06-05T13:03:03.327`) +* [CVE-2023-3086](CVE-2023/CVE-2023-30xx/CVE-2023-3086.json) (`2023-06-05T13:03:03.327`) +* [CVE-2023-3091](CVE-2023/CVE-2023-30xx/CVE-2023-3091.json) (`2023-06-05T13:03:03.327`) +* [CVE-2023-3094](CVE-2023/CVE-2023-30xx/CVE-2023-3094.json) (`2023-06-05T13:03:03.327`) +* [CVE-2023-3095](CVE-2023/CVE-2023-30xx/CVE-2023-3095.json) (`2023-06-05T13:03:03.327`) +* [CVE-2023-22862](CVE-2023/CVE-2023-228xx/CVE-2023-22862.json) (`2023-06-05T13:03:03.327`) +* [CVE-2023-27285](CVE-2023/CVE-2023-272xx/CVE-2023-27285.json) (`2023-06-05T13:03:03.327`) +* [CVE-2023-1297](CVE-2023/CVE-2023-12xx/CVE-2023-1297.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-2816](CVE-2023/CVE-2023-28xx/CVE-2023-2816.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-3044](CVE-2023/CVE-2023-30xx/CVE-2023-3044.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-2781](CVE-2023/CVE-2023-27xx/CVE-2023-2781.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-3051](CVE-2023/CVE-2023-30xx/CVE-2023-3051.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-3052](CVE-2023/CVE-2023-30xx/CVE-2023-3052.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-3053](CVE-2023/CVE-2023-30xx/CVE-2023-3053.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-3055](CVE-2023/CVE-2023-30xx/CVE-2023-3055.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-33143](CVE-2023/CVE-2023-331xx/CVE-2023-33143.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-0583](CVE-2023/CVE-2023-05xx/CVE-2023-0583.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-0584](CVE-2023/CVE-2023-05xx/CVE-2023-0584.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-2298](CVE-2023/CVE-2023-22xx/CVE-2023-2298.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-2299](CVE-2023/CVE-2023-22xx/CVE-2023-2299.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-2300](CVE-2023/CVE-2023-23xx/CVE-2023-2300.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-2301](CVE-2023/CVE-2023-23xx/CVE-2023-2301.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-2302](CVE-2023/CVE-2023-23xx/CVE-2023-2302.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-2303](CVE-2023/CVE-2023-23xx/CVE-2023-2303.json) (`2023-06-05T13:03:17.903`) +* [CVE-2023-33187](CVE-2023/CVE-2023-331xx/CVE-2023-33187.json) (`2023-06-05T13:50:24.813`) ## Download and Usage