Auto-Update: 2023-10-07T20:00:24.606889+00:00

This commit is contained in:
cad-safe-bot 2023-10-07 20:00:28 +00:00
parent 587a4ff77e
commit 994236a0ff
2 changed files with 9 additions and 91 deletions

View File

@ -2,91 +2,14 @@
"id": "CVE-2023-5312",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-06T06:15:13.257",
"lastModified": "2023-10-06T12:48:29.920",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-10-07T19:15:49.110",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in DedeCMS 5.7.111. Affected is an unknown function of the file baidunews.php. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240948."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en DedeCMS 5.7.111 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo baidunews.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una carga sin restricciones. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-240948."
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-43226. Reason: This candidate is a reservation duplicate of CVE-2023-43226. Notes: All CVE users should reference CVE-2023-43226 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/zzq66/cve/blob/main/rce_poc.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.240948",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.240948",
"source": "cna@vuldb.com"
}
]
"metrics": {},
"references": []
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-10-07T06:00:24.585552+00:00
2023-10-07T20:00:24.606889+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-10-07T04:15:10.747000+00:00
2023-10-07T19:15:49.110000+00:00
```
### Last Data Feed Release
@ -40,14 +40,9 @@ Recently added CVEs: `0`
### CVEs modified in the last Commit
Recently modified CVEs: `6`
Recently modified CVEs: `1`
* [CVE-2020-24292](CVE-2020/CVE-2020-242xx/CVE-2020-24292.json) (`2023-10-07T04:15:10.257`)
* [CVE-2020-24293](CVE-2020/CVE-2020-242xx/CVE-2020-24293.json) (`2023-10-07T04:15:10.367`)
* [CVE-2020-24295](CVE-2020/CVE-2020-242xx/CVE-2020-24295.json) (`2023-10-07T04:15:10.450`)
* [CVE-2021-40263](CVE-2021/CVE-2021-402xx/CVE-2021-40263.json) (`2023-10-07T04:15:10.547`)
* [CVE-2021-40266](CVE-2021/CVE-2021-402xx/CVE-2021-40266.json) (`2023-10-07T04:15:10.633`)
* [CVE-2023-5344](CVE-2023/CVE-2023-53xx/CVE-2023-5344.json) (`2023-10-07T04:15:10.747`)
* [CVE-2023-5312](CVE-2023/CVE-2023-53xx/CVE-2023-5312.json) (`2023-10-07T19:15:49.110`)
## Download and Usage