diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38880.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38880.json index 322274ec86b..5a6f2b038d8 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38880.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38880.json @@ -2,12 +2,16 @@ "id": "CVE-2023-38880", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-20T19:15:08.600", - "lastModified": "2023-11-20T19:18:51.140", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-29T23:15:20.310", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", - "value": "The Community Edition version 9.0 of OS4ED's openSIS Classic has a broken access control vulnerability in the database backup functionality. Whenever an admin generates a database backup, the backup is stored in the web root while the file name has a format of \"opensisBackup.sq|\" (e.g. \"opensisBackup07-20-2023.sql\"), i.e. can easily be guessed. This file can be accessed by any unauthenticated actor and contains a dump of the whole database including password hashes." + "value": "The Community Edition version 9.0 of OS4ED's openSIS Classic has a broken access control vulnerability in the database backup functionality. Whenever an admin generates a database backup, the backup is stored in the web root while the file name has a format of \"opensisBackup.sql\" (e.g. \"opensisBackup07-20-2023.sql\"), i.e. can easily be guessed. This file can be accessed by any unauthenticated actor and contains a dump of the whole database including password hashes." + }, + { + "lang": "es", + "value": "La versi\u00f3n Community Edition 9.0 de openSIS Classic de OS4ED tiene una vulnerabilidad de control de acceso rota en la funcionalidad de copia de seguridad de la base de datos. Siempre que un administrador genera una copia de seguridad de la base de datos, la copia de seguridad se almacena en la ra\u00edz web mientras el nombre del archivo tiene el formato \"opensisBackup.sq|\" (p. ej., \"opensisBackup07-20-2023.sql\"), es decir, se puede adivinar f\u00e1cilmente. Cualquier actor no autenticado puede acceder a este archivo y contiene un volcado de toda la base de datos, incluidos los hashes de contrase\u00f1as." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40458.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40458.json new file mode 100644 index 00000000000..c1b066edddb --- /dev/null +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40458.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-40458", + "sourceIdentifier": "security@sierrawireless.com", + "published": "2023-11-29T23:15:20.367", + "lastModified": "2023-11-29T23:15:20.367", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Sierra Wireless, Inc ALEOS could potentially allow a remote attacker to trigger a \nDenial of Service (DoS) condition for ACEManager without impairing \nother router functions. This condition is cleared by restarting the \ndevice.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@sierrawireless.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@sierrawireless.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "references": [ + { + "url": "https://https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.5ZcnyPM1.dpbs", + "source": "security@sierrawireless.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49693.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49693.json new file mode 100644 index 00000000000..5a6c2149e7b --- /dev/null +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49693.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-49693", + "sourceIdentifier": "vulnreport@tenable.com", + "published": "2023-11-29T23:15:20.567", + "lastModified": "2023-11-29T23:15:20.567", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nNETGEAR ProSAFE Network Management System has Java Debug Wire Protocol (JDWP) listening on port 11611 and it is remotely accessible by unauthenticated users, allowing attackers to execute arbitrary code.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "vulnreport@tenable.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "vulnreport@tenable.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://kb.netgear.com/000065886/Security-Advisory-for-Sensitive-Information-Disclosure-on-the-NMS300-PSV-2023-0126", + "source": "vulnreport@tenable.com" + }, + { + "url": "https://www.tenable.com/security/research/tra-2023-39", + "source": "vulnreport@tenable.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49694.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49694.json new file mode 100644 index 00000000000..4cf22737bd4 --- /dev/null +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49694.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-49694", + "sourceIdentifier": "vulnreport@tenable.com", + "published": "2023-11-29T23:15:20.750", + "lastModified": "2023-11-29T23:15:20.750", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\n\n\nA low-privileged OS user with access to a Windows host where NETGEAR ProSAFE Network Management System is installed can create arbitrary JSP files in a Tomcat web application directory. The user can then execute the JSP files under the security context of SYSTEM.\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "vulnreport@tenable.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "vulnreport@tenable.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://kb.netgear.com/000065885/Security-Advisory-for-Vertical-Privilege-Escalation-on-the-NMS300-PSV-2023-0127", + "source": "vulnreport@tenable.com" + }, + { + "url": "https://www.tenable.com/security/research/tra-2023-39", + "source": "vulnreport@tenable.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 48ea76aa000..3b4421cd66c 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-29T23:00:18.446215+00:00 +2023-11-30T00:55:17.816434+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-29T22:15:07.363000+00:00 +2023-11-29T23:15:20.750000+00:00 ``` ### Last Data Feed Release @@ -29,35 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -231713 +231716 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `3` -* [CVE-2022-42536](CVE-2022/CVE-2022-425xx/CVE-2022-42536.json) (`2023-11-29T22:15:07.110`) -* [CVE-2022-42537](CVE-2022/CVE-2022-425xx/CVE-2022-42537.json) (`2023-11-29T22:15:07.173`) -* [CVE-2022-42538](CVE-2022/CVE-2022-425xx/CVE-2022-42538.json) (`2023-11-29T22:15:07.220`) -* [CVE-2022-42539](CVE-2022/CVE-2022-425xx/CVE-2022-42539.json) (`2023-11-29T22:15:07.267`) -* [CVE-2022-42540](CVE-2022/CVE-2022-425xx/CVE-2022-42540.json) (`2023-11-29T22:15:07.317`) -* [CVE-2022-42541](CVE-2022/CVE-2022-425xx/CVE-2022-42541.json) (`2023-11-29T22:15:07.363`) +* [CVE-2023-40458](CVE-2023/CVE-2023-404xx/CVE-2023-40458.json) (`2023-11-29T23:15:20.367`) +* [CVE-2023-49693](CVE-2023/CVE-2023-496xx/CVE-2023-49693.json) (`2023-11-29T23:15:20.567`) +* [CVE-2023-49694](CVE-2023/CVE-2023-496xx/CVE-2023-49694.json) (`2023-11-29T23:15:20.750`) ### CVEs modified in the last Commit -Recently modified CVEs: `10` +Recently modified CVEs: `1` -* [CVE-2022-28958](CVE-2022/CVE-2022-289xx/CVE-2022-28958.json) (`2023-11-29T21:15:07.480`) -* [CVE-2023-41789](CVE-2023/CVE-2023-417xx/CVE-2023-41789.json) (`2023-11-29T21:01:34.793`) -* [CVE-2023-41788](CVE-2023/CVE-2023-417xx/CVE-2023-41788.json) (`2023-11-29T21:02:14.287`) -* [CVE-2023-41787](CVE-2023/CVE-2023-417xx/CVE-2023-41787.json) (`2023-11-29T21:04:56.717`) -* [CVE-2023-49083](CVE-2023/CVE-2023-490xx/CVE-2023-49083.json) (`2023-11-29T21:15:07.823`) -* [CVE-2023-5368](CVE-2023/CVE-2023-53xx/CVE-2023-5368.json) (`2023-11-29T21:15:07.940`) -* [CVE-2023-4595](CVE-2023/CVE-2023-45xx/CVE-2023-4595.json) (`2023-11-29T21:23:11.087`) -* [CVE-2023-4594](CVE-2023/CVE-2023-45xx/CVE-2023-4594.json) (`2023-11-29T21:23:22.717`) -* [CVE-2023-4593](CVE-2023/CVE-2023-45xx/CVE-2023-4593.json) (`2023-11-29T21:23:46.107`) -* [CVE-2023-4406](CVE-2023/CVE-2023-44xx/CVE-2023-4406.json) (`2023-11-29T21:24:04.640`) +* [CVE-2023-38880](CVE-2023/CVE-2023-388xx/CVE-2023-38880.json) (`2023-11-29T23:15:20.310`) ## Download and Usage