Auto-Update: 2024-01-20T03:00:25.488368+00:00

This commit is contained in:
cad-safe-bot 2024-01-20 03:00:29 +00:00
parent b2e76196bb
commit 992036c78d
24 changed files with 1116 additions and 48 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-31314",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-20T01:15:07.770",
"lastModified": "2024-01-20T02:58:09.603",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "File upload vulnerability in ejinshan v8+ terminal security system allows attackers to upload arbitrary files to arbitrary locations on the server."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/huahaiYa/jinshansoft/blob/main/Kingsoft%20Security%20Arbitrary%20File%20Upload%20%2B%20File%20Contains%20Vulnerabilities.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-47024",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-20T02:15:07.600",
"lastModified": "2024-01-20T02:58:09.603",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Request Forgery vulnerability in NCR Terminal Handler v.1.5.1 allows a remote attacker to obtain sensitive information and escalate privileges via a crafted script to the UserSelfService component."
}
],
"metrics": {},
"references": [
{
"url": "https://docs.google.com/document/d/18EOsFghBsAme0b3Obur8Oc6h5xV9zUCNKyQLw5ERs9Q/edit?usp=sharing",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Patrick0x41/Security-Advisories/tree/main/CVE-2023-47024",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51729",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-01-17T07:15:52.113",
"lastModified": "2024-01-17T14:01:37.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-20T02:45:53.173",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -50,10 +80,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51730",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-01-17T07:15:52.710",
"lastModified": "2024-01-17T14:01:37.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-20T02:46:01.520",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -50,10 +80,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51731",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-01-17T07:15:53.290",
"lastModified": "2024-01-17T14:01:37.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-20T02:46:14.247",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -50,10 +80,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51732",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-01-17T07:15:53.873",
"lastModified": "2024-01-17T14:01:37.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-20T02:46:20.933",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -50,10 +80,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51733",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-01-17T08:15:36.110",
"lastModified": "2024-01-17T14:01:37.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-20T02:46:44.103",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -50,10 +80,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51734",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-01-17T08:15:36.477",
"lastModified": "2024-01-17T14:01:37.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-20T02:46:49.553",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -50,10 +80,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51735",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-01-17T08:15:36.730",
"lastModified": "2024-01-17T14:01:37.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-20T02:46:54.347",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -50,10 +80,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51736",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-01-17T08:15:36.990",
"lastModified": "2024-01-17T14:01:37.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-20T02:46:57.723",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -50,10 +80,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51737",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-01-17T08:15:37.230",
"lastModified": "2024-01-17T14:01:37.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-20T02:47:01.867",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -50,10 +80,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51740",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-01-17T08:15:37.970",
"lastModified": "2024-01-17T14:01:37.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-20T02:47:22.467",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -50,10 +80,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51741",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-01-17T08:15:38.223",
"lastModified": "2024-01-17T14:01:37.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-20T02:47:27.847",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -50,10 +80,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51742",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-01-17T08:15:38.487",
"lastModified": "2024-01-17T14:01:37.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-20T02:47:30.753",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -50,10 +80,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51743",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-01-17T08:15:38.750",
"lastModified": "2024-01-17T14:01:37.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-20T02:45:39.117",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
@ -50,10 +80,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013",
"source": "vdisclose@cert-in.org.in"
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-51892",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-20T01:15:07.857",
"lastModified": "2024-01-20T02:58:09.603",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in weaver e-cology v.10.0.2310.01 allows a remote attacker to execute arbitrary code via a crafted script to the FrameworkShellController component."
}
],
"metrics": {},
"references": [
{
"url": "http://e-cology.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51892.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.weaver.com.cn/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-51906",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-20T02:15:07.670",
"lastModified": "2024-01-20T02:58:09.603",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in yonyou YonBIP v3_23.05 allows a remote attacker to execute arbitrary code via a crafted script to the ServiceDispatcherServlet uap.framework.rc.itf.IResourceManager component."
}
],
"metrics": {},
"references": [
{
"url": "http://yonbip.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51906.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.yonyou.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-51924",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-20T02:15:07.723",
"lastModified": "2024-01-20T02:58:09.603",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the uap.framework.rc.itf.IResourceManager interface of YonBIP v3_23.05 allows attackers to execute arbitrary code via uploading a crafted file."
}
],
"metrics": {},
"references": [
{
"url": "http://yonbip.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51924.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.yonyou.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-51925",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-20T02:15:07.773",
"lastModified": "2024-01-20T02:58:09.603",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the nccloud.web.arcp.taskmonitor.action.ArcpUploadAction.doAction() method of YonBIP v3_23.05 allows attackers to execute arbitrary code via uploading a crafted file."
}
],
"metrics": {},
"references": [
{
"url": "http://yonbip.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51925.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.yonyou.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-51926",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-20T01:15:07.907",
"lastModified": "2024-01-20T02:58:09.603",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "YonBIP v3_23.05 was discovered to contain an arbitrary file read vulnerability via the nc.bs.framework.comn.serv.CommonServletDispatcher component."
}
],
"metrics": {},
"references": [
{
"url": "http://yonbip.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51926.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.yonyou.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-51927",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-20T01:15:07.957",
"lastModified": "2024-01-20T02:58:09.603",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "YonBIP v3_23.05 was discovered to contain a SQL injection vulnerability via the com.yonyou.hrcloud.attend.web.AttendScriptController.runScript() method."
}
],
"metrics": {},
"references": [
{
"url": "http://yonbip.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51927.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.yonyou.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-51928",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-20T01:15:08.010",
"lastModified": "2024-01-20T02:58:09.603",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the nccloud.web.arcp.taskmonitor.action.ArcpUploadAction.doAction() method of YonBIP v3_23.05 allows attackers to execute arbitrary code via uploading a crafted file."
}
],
"metrics": {},
"references": [
{
"url": "http://yonbip.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51928.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.yonyou.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23332",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-01-19T23:15:07.930",
"lastModified": "2024-01-19T23:15:07.930",
"vulnStatus": "Received",
"lastModified": "2024-01-20T02:58:09.603",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-01-20T00:55:24.057895+00:00
2024-01-20T03:00:25.488368+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-01-19T23:15:07.930000+00:00
2024-01-20T02:58:09.603000+00:00
```
### Last Data Feed Release
@ -23,26 +23,48 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-01-19T01:00:28.268681+00:00
2024-01-20T01:00:28.246821+00:00
```
### Total Number of included CVEs
```plain
236454
236463
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `9`
* [CVE-2024-23332](CVE-2024/CVE-2024-233xx/CVE-2024-23332.json) (`2024-01-19T23:15:07.930`)
* [CVE-2021-31314](CVE-2021/CVE-2021-313xx/CVE-2021-31314.json) (`2024-01-20T01:15:07.770`)
* [CVE-2023-51892](CVE-2023/CVE-2023-518xx/CVE-2023-51892.json) (`2024-01-20T01:15:07.857`)
* [CVE-2023-51926](CVE-2023/CVE-2023-519xx/CVE-2023-51926.json) (`2024-01-20T01:15:07.907`)
* [CVE-2023-51927](CVE-2023/CVE-2023-519xx/CVE-2023-51927.json) (`2024-01-20T01:15:07.957`)
* [CVE-2023-51928](CVE-2023/CVE-2023-519xx/CVE-2023-51928.json) (`2024-01-20T01:15:08.010`)
* [CVE-2023-47024](CVE-2023/CVE-2023-470xx/CVE-2023-47024.json) (`2024-01-20T02:15:07.600`)
* [CVE-2023-51906](CVE-2023/CVE-2023-519xx/CVE-2023-51906.json) (`2024-01-20T02:15:07.670`)
* [CVE-2023-51924](CVE-2023/CVE-2023-519xx/CVE-2023-51924.json) (`2024-01-20T02:15:07.723`)
* [CVE-2023-51925](CVE-2023/CVE-2023-519xx/CVE-2023-51925.json) (`2024-01-20T02:15:07.773`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `14`
* [CVE-2023-51743](CVE-2023/CVE-2023-517xx/CVE-2023-51743.json) (`2024-01-20T02:45:39.117`)
* [CVE-2023-51729](CVE-2023/CVE-2023-517xx/CVE-2023-51729.json) (`2024-01-20T02:45:53.173`)
* [CVE-2023-51730](CVE-2023/CVE-2023-517xx/CVE-2023-51730.json) (`2024-01-20T02:46:01.520`)
* [CVE-2023-51731](CVE-2023/CVE-2023-517xx/CVE-2023-51731.json) (`2024-01-20T02:46:14.247`)
* [CVE-2023-51732](CVE-2023/CVE-2023-517xx/CVE-2023-51732.json) (`2024-01-20T02:46:20.933`)
* [CVE-2023-51733](CVE-2023/CVE-2023-517xx/CVE-2023-51733.json) (`2024-01-20T02:46:44.103`)
* [CVE-2023-51734](CVE-2023/CVE-2023-517xx/CVE-2023-51734.json) (`2024-01-20T02:46:49.553`)
* [CVE-2023-51735](CVE-2023/CVE-2023-517xx/CVE-2023-51735.json) (`2024-01-20T02:46:54.347`)
* [CVE-2023-51736](CVE-2023/CVE-2023-517xx/CVE-2023-51736.json) (`2024-01-20T02:46:57.723`)
* [CVE-2023-51737](CVE-2023/CVE-2023-517xx/CVE-2023-51737.json) (`2024-01-20T02:47:01.867`)
* [CVE-2023-51740](CVE-2023/CVE-2023-517xx/CVE-2023-51740.json) (`2024-01-20T02:47:22.467`)
* [CVE-2023-51741](CVE-2023/CVE-2023-517xx/CVE-2023-51741.json) (`2024-01-20T02:47:27.847`)
* [CVE-2023-51742](CVE-2023/CVE-2023-517xx/CVE-2023-51742.json) (`2024-01-20T02:47:30.753`)
* [CVE-2024-23332](CVE-2024/CVE-2024-233xx/CVE-2024-23332.json) (`2024-01-20T02:58:09.603`)
## Download and Usage