Auto-Update: 2023-08-01T14:00:29.325562+00:00

This commit is contained in:
cad-safe-bot 2023-08-01 14:00:33 +00:00
parent 2fe3da0760
commit 95b5e51b1b
22 changed files with 302 additions and 59 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-10962",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-01T02:15:09.687",
"lastModified": "2023-08-01T02:15:09.687",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42182",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T20:15:09.993",
"lastModified": "2023-07-31T20:15:09.993",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42183",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T20:15:10.050",
"lastModified": "2023-07-31T20:15:10.050",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23548",
"sourceIdentifier": "security@checkmk.com",
"published": "2023-08-01T10:15:09.740",
"lastModified": "2023-08-01T10:15:09.740",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26139",
"sourceIdentifier": "report@snyk.io",
"published": "2023-08-01T05:15:34.843",
"lastModified": "2023-08-01T05:15:34.843",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32302",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-01T11:15:09.667",
"lastModified": "2023-08-01T11:15:09.667",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34960",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-01T02:15:10.307",
"lastModified": "2023-08-01T02:15:10.307",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3462",
"sourceIdentifier": "security@hashicorp.com",
"published": "2023-07-31T23:15:10.360",
"lastModified": "2023-07-31T23:15:10.360",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36983",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-01T02:15:10.450",
"lastModified": "2023-08-01T02:15:10.450",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36984",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-01T02:15:10.510",
"lastModified": "2023-08-01T02:15:10.510",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-37478",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-01T12:15:09.937",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "pnpm is a package manager. It is possible to construct a tarball that, when installed via npm or parsed by the registry is safe, but when installed via pnpm is malicious, due to how pnpm parses tar archives. This can result in a package that appears safe on the npm registry or when installed via npm being replaced with a compromised or malicious version when installed via pnpm. This issue has been patched in version(s) 7.33.4 and 8.6.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/pnpm/pnpm/releases/tag/v7.33.4",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pnpm/pnpm/releases/tag/v8.6.8",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pnpm/pnpm/security/advisories/GHSA-5r98-f33j-g8h7",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37496",
"sourceIdentifier": "psirt@hcl.com",
"published": "2023-08-01T01:15:10.770",
"lastModified": "2023-08-01T01:15:10.770",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37772",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-01T01:15:10.850",
"lastModified": "2023-08-01T01:15:10.850",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37903",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-21T20:15:16.057",
"lastModified": "2023-08-01T01:51:31.417",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-08-01T12:55:19.457",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,20 +17,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"impactScore": 6.0
},
{
"source": "security-advisories@github.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37905",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-21T20:15:16.297",
"lastModified": "2023-07-24T13:09:06.887",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-01T13:39:10.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,18 +66,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ckeditor-wordcount-plugin_project:ckeditor-wordcount-plugin:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "1.17.12",
"matchCriteriaId": "4B7E16B7-710D-488E-BF73-81442C64AA9B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/w8tcha/CKEditor-WordCount-Plugin/commit/0f03b3e5b7c1409998a13aba3a95396e6fa349d8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/w8tcha/CKEditor-WordCount-Plugin/commit/a4b154bdf35b3465320136fcb078f196b437c2f1",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/w8tcha/CKEditor-WordCount-Plugin/security/advisories/GHSA-q9w4-w667-qqj4",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-38195",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-22T17:15:09.687",
"lastModified": "2023-07-24T13:09:06.887",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-01T13:46:25.913",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Datalust Seq before 2023.2.9489 allows insertion of sensitive information into an externally accessible file or directory. This is exploitable only when external (SQL Server or PostgreSQL) metadata storage is used. Exploitation can only occur from a high-privileged user account."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:datalust:seq:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.2.9489",
"matchCriteriaId": "5269A09C-FA07-409F-BB84-44D94F1D6F70"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/datalust/seq-tickets/issues/1886",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,77 @@
"id": "CVE-2023-38632",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-21T02:15:09.840",
"lastModified": "2023-07-21T12:52:26.790",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-01T13:50:50.473",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "async-sockets-cpp through 0.3.1 has a stack-based buffer overflow in tcpsocket.hpp when processing malformed TCP packets."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asynchronous_sockets_for_c\\+\\+_project:asynchronous_sockets_for_c\\+\\+:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.3.1",
"matchCriteriaId": "3CDB1086-DC4C-4C3F-AB2E-3F531B06C2A5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/eminfedar/async-sockets-cpp/issues/31",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3825",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-07-31T23:15:10.437",
"lastModified": "2023-07-31T23:15:10.437",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39122",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T23:15:10.297",
"lastModified": "2023-07-31T23:15:10.297",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3983",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-07-31T19:15:18.243",
"lastModified": "2023-07-31T19:15:18.243",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4033",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-08-01T01:15:10.913",
"lastModified": "2023-08-01T01:15:10.913",
"vulnStatus": "Received",
"lastModified": "2023-08-01T12:55:38.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-01T12:00:27.611059+00:00
2023-08-01T14:00:29.325562+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-01T11:15:09.773000+00:00
2023-08-01T13:50:50.473000+00:00
```
### Last Data Feed Release
@ -29,22 +29,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
221357
221358
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `1`
* [CVE-2023-23548](CVE-2023/CVE-2023-235xx/CVE-2023-23548.json) (`2023-08-01T10:15:09.740`)
* [CVE-2023-32302](CVE-2023/CVE-2023-323xx/CVE-2023-32302.json) (`2023-08-01T11:15:09.667`)
* [CVE-2023-37478](CVE-2023/CVE-2023-374xx/CVE-2023-37478.json) (`2023-08-01T12:15:09.937`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `20`
* [CVE-2023-3817](CVE-2023/CVE-2023-38xx/CVE-2023-3817.json) (`2023-08-01T11:15:09.773`)
* [CVE-2020-10962](CVE-2020/CVE-2020-109xx/CVE-2020-10962.json) (`2023-08-01T12:55:38.437`)
* [CVE-2022-42182](CVE-2022/CVE-2022-421xx/CVE-2022-42182.json) (`2023-08-01T12:55:38.437`)
* [CVE-2022-42183](CVE-2022/CVE-2022-421xx/CVE-2022-42183.json) (`2023-08-01T12:55:38.437`)
* [CVE-2023-37903](CVE-2023/CVE-2023-379xx/CVE-2023-37903.json) (`2023-08-01T12:55:19.457`)
* [CVE-2023-3983](CVE-2023/CVE-2023-39xx/CVE-2023-3983.json) (`2023-08-01T12:55:38.437`)
* [CVE-2023-39122](CVE-2023/CVE-2023-391xx/CVE-2023-39122.json) (`2023-08-01T12:55:38.437`)
* [CVE-2023-3462](CVE-2023/CVE-2023-34xx/CVE-2023-3462.json) (`2023-08-01T12:55:38.437`)
* [CVE-2023-3825](CVE-2023/CVE-2023-38xx/CVE-2023-3825.json) (`2023-08-01T12:55:38.437`)
* [CVE-2023-37496](CVE-2023/CVE-2023-374xx/CVE-2023-37496.json) (`2023-08-01T12:55:38.437`)
* [CVE-2023-37772](CVE-2023/CVE-2023-377xx/CVE-2023-37772.json) (`2023-08-01T12:55:38.437`)
* [CVE-2023-4033](CVE-2023/CVE-2023-40xx/CVE-2023-4033.json) (`2023-08-01T12:55:38.437`)
* [CVE-2023-34960](CVE-2023/CVE-2023-349xx/CVE-2023-34960.json) (`2023-08-01T12:55:38.437`)
* [CVE-2023-36983](CVE-2023/CVE-2023-369xx/CVE-2023-36983.json) (`2023-08-01T12:55:38.437`)
* [CVE-2023-36984](CVE-2023/CVE-2023-369xx/CVE-2023-36984.json) (`2023-08-01T12:55:38.437`)
* [CVE-2023-26139](CVE-2023/CVE-2023-261xx/CVE-2023-26139.json) (`2023-08-01T12:55:38.437`)
* [CVE-2023-23548](CVE-2023/CVE-2023-235xx/CVE-2023-23548.json) (`2023-08-01T12:55:38.437`)
* [CVE-2023-32302](CVE-2023/CVE-2023-323xx/CVE-2023-32302.json) (`2023-08-01T12:55:38.437`)
* [CVE-2023-37905](CVE-2023/CVE-2023-379xx/CVE-2023-37905.json) (`2023-08-01T13:39:10.290`)
* [CVE-2023-38195](CVE-2023/CVE-2023-381xx/CVE-2023-38195.json) (`2023-08-01T13:46:25.913`)
* [CVE-2023-38632](CVE-2023/CVE-2023-386xx/CVE-2023-38632.json) (`2023-08-01T13:50:50.473`)
## Download and Usage