Auto-Update: 2023-11-28T19:00:19.440058+00:00

This commit is contained in:
cad-safe-bot 2023-11-28 19:00:23 +00:00
parent 66aeb67583
commit a9f22b0330
48 changed files with 46223 additions and 116 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2006-1078", "id": "CVE-2006-1078",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2006-03-09T00:02:00.000", "published": "2006-03-09T00:02:00.000",
"lastModified": "2023-11-27T22:15:07.177", "lastModified": "2023-11-28T17:15:07.407",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -95,6 +95,10 @@
"url": "http://marc.info/?l=thttpd&m=114154083000296&w=2", "url": "http://marc.info/?l=thttpd&m=114154083000296&w=2",
"source": "cve@mitre.org" "source": "cve@mitre.org"
}, },
{
"url": "http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html",
"source": "cve@mitre.org"
},
{ {
"url": "http://seclists.org/bugtraq/2004/Oct/0359.html", "url": "http://seclists.org/bugtraq/2004/Oct/0359.html",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2006-1079", "id": "CVE-2006-1079",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2006-03-09T00:02:00.000", "published": "2006-03-09T00:02:00.000",
"lastModified": "2023-11-27T22:15:07.283", "lastModified": "2023-11-28T17:15:07.500",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -79,6 +79,10 @@
"url": "http://marc.info/?l=thttpd&m=114154083000296&w=2", "url": "http://marc.info/?l=thttpd&m=114154083000296&w=2",
"source": "cve@mitre.org" "source": "cve@mitre.org"
}, },
{
"url": "http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html",
"source": "cve@mitre.org"
},
{ {
"url": "http://seclists.org/fulldisclosure/2023/Nov/13", "url": "http://seclists.org/fulldisclosure/2023/Nov/13",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2007-0664", "id": "CVE-2007-0664",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2007-02-02T21:28:00.000", "published": "2007-02-02T21:28:00.000",
"lastModified": "2023-11-27T22:15:07.350", "lastModified": "2023-11-28T17:15:07.560",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -84,6 +84,10 @@
"url": "http://osvdb.org/31965", "url": "http://osvdb.org/31965",
"source": "cve@mitre.org" "source": "cve@mitre.org"
}, },
{
"url": "http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html",
"source": "cve@mitre.org"
},
{ {
"url": "http://seclists.org/fulldisclosure/2023/Nov/13", "url": "http://seclists.org/fulldisclosure/2023/Nov/13",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2009-4491", "id": "CVE-2009-4491",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2010-01-13T20:30:00.500", "published": "2010-01-13T20:30:00.500",
"lastModified": "2023-11-27T22:15:07.440", "lastModified": "2023-11-28T17:15:07.637",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -71,6 +71,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html",
"source": "cve@mitre.org"
},
{ {
"url": "http://seclists.org/fulldisclosure/2023/Nov/13", "url": "http://seclists.org/fulldisclosure/2023/Nov/13",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-14628", "id": "CVE-2018-14628",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2023-01-17T18:15:10.810", "published": "2023-01-17T18:15:10.810",
"lastModified": "2023-01-24T20:03:25.860", "lastModified": "2023-11-28T18:15:07.370",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -80,6 +80,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/11/28/4",
"source": "secalert@redhat.com"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445",
"source": "secalert@redhat.com", "source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41678", "id": "CVE-2022-41678",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2023-11-28T16:15:06.840", "published": "2023-11-28T16:15:06.840",
"lastModified": "2023-11-28T16:15:06.840", "lastModified": "2023-11-28T18:29:23.617",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -24,6 +24,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/11/28/1",
"source": "security@apache.org"
},
{ {
"url": "https://activemq.apache.org/security-advisories.data/CVE-2022-41678-announcement.txt", "url": "https://activemq.apache.org/security-advisories.data/CVE-2022-41678-announcement.txt",
"source": "security@apache.org" "source": "security@apache.org"

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-24587", "id": "CVE-2023-24587",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2023-11-14T19:15:18.297", "published": "2023-11-14T19:15:18.297",
"lastModified": "2023-11-14T19:30:32.597", "lastModified": "2023-11-28T17:01:41.183",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Insufficient control flow management in firmware for some Intel(R) Optane(TM) SSD products may allow a privileged user to potentially enable denial of service via local access." "value": "Insufficient control flow management in firmware for some Intel(R) Optane(TM) SSD products may allow a privileged user to potentially enable denial of service via local access."
},
{
"lang": "es",
"value": "La gesti\u00f3n insuficiente del flujo de control en el firmware para algunos productos Intel(R) Optane(TM) SSD puede permitir que un usuario privilegiado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{ {
"source": "secure@intel.com", "source": "secure@intel.com",
"type": "Secondary", "type": "Secondary",
@ -35,6 +59,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{ {
"source": "secure@intel.com", "source": "secure@intel.com",
"type": "Secondary", "type": "Secondary",
@ -46,10 +80,155 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:optane_memory_h20_with_solid_state_storage_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "u4110553-g004",
"matchCriteriaId": "FA3AE360-6625-4682-9E17-32BCEE976552"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:optane_memory_h20_with_solid_state_storage:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00EFD6D0-2B8B-4450-A073-C6121264C94F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:optane_ssd_900p_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "e2010650",
"matchCriteriaId": "4E6363E3-64FC-4D8C-9779-B140AC0F9FE0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:optane_ssd_900p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFC9CF7-581F-4B2D-B93C-3D7E3C136F4C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:optane_ssd_dc_p4800x_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "e2010650",
"matchCriteriaId": "9D850E02-9A03-49A8-86F4-1D2B9203143D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:optane_ssd_dc_p4800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE6F7C04-DA32-42BC-9C5F-651DF61E5589"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:optane_ssd_dc_p4801x_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "e2010650",
"matchCriteriaId": "A73436E5-92D0-4C3A-AF56-8551ABAF04F9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:optane_ssd_dc_p4801x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15DAAAC1-DBA7-47BC-8796-B7C8B86DEFD0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:optane_ssd_905p_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "e2010650",
"matchCriteriaId": "AFDD04FB-5301-42FF-AA92-FD0BC5CD26EE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:optane_ssd_905p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BD5595C-0047-441A-B398-8ACA421BB439"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00758.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00758.html",
"source": "secure@intel.com" "source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3812", "id": "CVE-2023-3812",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-24T16:15:13.337", "published": "2023-07-24T16:15:13.337",
"lastModified": "2023-11-21T17:15:07.663", "lastModified": "2023-11-28T18:15:07.760",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -162,6 +162,14 @@
"url": "https://access.redhat.com/errata/RHSA-2023:7418", "url": "https://access.redhat.com/errata/RHSA-2023:7418",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2023:7548",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7549",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-3812", "url": "https://access.redhat.com/security/cve/CVE-2023-3812",
"source": "secalert@redhat.com", "source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39417", "id": "CVE-2023-39417",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-11T13:15:09.870", "published": "2023-08-11T13:15:09.870",
"lastModified": "2023-11-14T14:15:28.793", "lastModified": "2023-11-28T18:15:07.600",
"vulnStatus": "Modified", "vulnStatus": "Undergoing Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -168,6 +168,10 @@
} }
], ],
"references": [ "references": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:7545",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-39417", "url": "https://access.redhat.com/security/cve/CVE-2023-39417",
"source": "secalert@redhat.com", "source": "secalert@redhat.com",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-40056",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2023-11-28T18:15:07.900",
"lastModified": "2023-11-28T18:29:23.617",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "\n\n\n\n\n\n\n\n\n\n\n\nSQL Injection Remote Code Vulnerability was found in the SolarWinds\nPlatform. This vulnerability can be exploited with a low privileged account. \n\n\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2023-4-2_release_notes.htm",
"source": "psirt@solarwinds.com"
},
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40056",
"source": "psirt@solarwinds.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-41109", "id": "CVE-2023-41109",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T20:15:08.273", "published": "2023-08-28T20:15:08.273",
"lastModified": "2023-11-27T22:15:07.867", "lastModified": "2023-11-28T17:15:07.790",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -77,6 +77,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/175945/SmartNode-SN200-3.21.2-23021-OS-Command-Injection.html",
"source": "cve@mitre.org"
},
{ {
"url": "http://seclists.org/fulldisclosure/2023/Nov/12", "url": "http://seclists.org/fulldisclosure/2023/Nov/12",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-41264",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-28T17:15:07.857",
"lastModified": "2023-11-28T18:29:23.617",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Netwrix Usercube before 6.0.215, in certain misconfigured on-premises installations, allows authentication bypass on deployment endpoints, leading to privilege escalation. This only occurs if the configuration omits the required restSettings.AuthorizedClientId and restSettings.AuthorizedSecret fields (for the POST /api/Deployment/ExportConfiguration and POST /api/Deployment endpoints)."
}
],
"metrics": {},
"references": [
{
"url": "https://www.netwrix.com/identity_governance_and_administration_solution.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.synacktiv.com/advisories/usercube-netwrix-multiple-vulnerabilities",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-42502",
"sourceIdentifier": "security@apache.org",
"published": "2023-11-28T17:15:07.907",
"lastModified": "2023-11-28T18:29:23.617",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An authenticated attacker with update datasets permission could change a dataset link to an untrusted site by spoofing the HTTP Host header, users could be redirected to this site when clicking on that specific dataset. This issue affects Apache Superset versions before 3.0.0.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@apache.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/11/28/3",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/n8348f194d8o8mln3oxd0s8jdl5bxbmn",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-42504",
"sourceIdentifier": "security@apache.org",
"published": "2023-11-28T18:15:08.353",
"lastModified": "2023-11-28T18:29:23.617",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An authenticated malicious user could initiate multiple concurrent requests, each requesting multiple dashboard exports, leading to a possible denial of service.\n\nThis issue affects Apache Superset: before 3.0.0\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@apache.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/11/28/6",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/yzq5gk1y9lyw6nxwd3xdkxg1djqw1h6l",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-42505",
"sourceIdentifier": "security@apache.org",
"published": "2023-11-28T17:15:08.093",
"lastModified": "2023-11-28T18:29:23.617",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An authenticated user with read permissions on database connections metadata could potentially access sensitive information such as the connection's username.\n\nThis issue affects Apache Superset before 3.0.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@apache.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/11/28/5",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/bd0fhtfzrtgo1q8x35tpm8ms144d1t2y",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-42753", "id": "CVE-2023-42753",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-25T21:15:15.923", "published": "2023-09-25T21:15:15.923",
"lastModified": "2023-11-21T17:15:07.763", "lastModified": "2023-11-28T18:15:08.790",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -163,6 +163,10 @@
"url": "https://access.redhat.com/errata/RHSA-2023:7418", "url": "https://access.redhat.com/errata/RHSA-2023:7418",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2023:7539",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-42753", "url": "https://access.redhat.com/security/cve/CVE-2023-42753",
"source": "secalert@redhat.com", "source": "secalert@redhat.com",

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-45286",
"sourceIdentifier": "security@golang.org",
"published": "2023-11-28T17:15:08.280",
"lastModified": "2023-11-28T18:29:23.617",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/go-resty/resty/issues/739",
"source": "security@golang.org"
},
{
"url": "https://github.com/go-resty/resty/issues/743",
"source": "security@golang.org"
},
{
"url": "https://github.com/go-resty/resty/pull/745",
"source": "security@golang.org"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2328",
"source": "security@golang.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-46402", "id": "CVE-2023-46402",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-11-18T00:15:07.183", "published": "2023-11-18T00:15:07.183",
"lastModified": "2023-11-25T01:22:39.930", "lastModified": "2023-11-28T18:15:08.910",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "git-urls version 1.0.1 is vulnerable to ReDOS (Regular Expression Denial of Service) in Go package." "value": "git-urls 1.0.0 allows ReDOS (Regular Expression Denial of Service) in urls.go."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46589", "id": "CVE-2023-46589",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2023-11-28T16:15:06.943", "published": "2023-11-28T16:15:06.943",
"lastModified": "2023-11-28T16:15:06.943", "lastModified": "2023-11-28T18:29:23.617",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -24,6 +24,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/11/28/2",
"source": "security@apache.org"
},
{ {
"url": "https://lists.apache.org/thread/0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr", "url": "https://lists.apache.org/thread/0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr",
"source": "security@apache.org" "source": "security@apache.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-47250", "id": "CVE-2023-47250",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-11-22T18:15:08.883", "published": "2023-11-22T18:15:08.883",
"lastModified": "2023-11-27T22:15:07.997", "lastModified": "2023-11-28T17:15:08.327",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
@ -16,6 +16,10 @@
], ],
"metrics": {}, "metrics": {},
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html",
"source": "cve@mitre.org"
},
{ {
"url": "http://seclists.org/fulldisclosure/2023/Nov/13", "url": "http://seclists.org/fulldisclosure/2023/Nov/13",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-47251", "id": "CVE-2023-47251",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-11-22T18:15:08.930", "published": "2023-11-22T18:15:08.930",
"lastModified": "2023-11-27T22:15:08.037", "lastModified": "2023-11-28T17:15:08.370",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
@ -16,6 +16,10 @@
], ],
"metrics": {}, "metrics": {},
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html",
"source": "cve@mitre.org"
},
{ {
"url": "http://seclists.org/fulldisclosure/2023/Nov/13", "url": "http://seclists.org/fulldisclosure/2023/Nov/13",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4732", "id": "CVE-2023-4732",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-03T17:15:09.853", "published": "2023-10-03T17:15:09.853",
"lastModified": "2023-11-14T21:15:14.000", "lastModified": "2023-11-28T18:15:09.030",
"vulnStatus": "Modified", "vulnStatus": "Undergoing Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -122,6 +122,10 @@
"url": "https://access.redhat.com/errata/RHSA-2023:7077", "url": "https://access.redhat.com/errata/RHSA-2023:7077",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2023:7539",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-4732", "url": "https://access.redhat.com/security/cve/CVE-2023-4732",
"source": "secalert@redhat.com", "source": "secalert@redhat.com",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-48848",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-28T17:15:08.417",
"lastModified": "2023-11-28T18:29:23.617",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file read vulnerability in ureport v2.2.9 allows a remote attacker to arbitrarily read files on the server by inserting a crafted path."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/h00klod0er/ureport2-vuln/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49062", "id": "CVE-2023-49062",
"sourceIdentifier": "cve-assign@fb.com", "sourceIdentifier": "cve-assign@fb.com",
"published": "2023-11-28T16:15:07.023", "published": "2023-11-28T16:15:07.023",
"lastModified": "2023-11-28T16:15:07.023", "lastModified": "2023-11-28T18:29:23.617",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49313", "id": "CVE-2023-49313",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-11-28T15:15:07.710", "published": "2023-11-28T15:15:07.710",
"lastModified": "2023-11-28T15:15:07.710", "lastModified": "2023-11-28T18:29:23.617",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49314", "id": "CVE-2023-49314",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-11-28T15:15:07.770", "published": "2023-11-28T15:15:07.770",
"lastModified": "2023-11-28T15:15:07.770", "lastModified": "2023-11-28T18:29:23.617",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5178", "id": "CVE-2023-5178",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-01T17:15:11.920", "published": "2023-11-01T17:15:11.920",
"lastModified": "2023-11-21T18:15:09.220", "lastModified": "2023-11-28T18:15:09.157",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -161,6 +161,18 @@
"url": "https://access.redhat.com/errata/RHSA-2023:7418", "url": "https://access.redhat.com/errata/RHSA-2023:7418",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2023:7548",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7549",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7551",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-5178", "url": "https://access.redhat.com/security/cve/CVE-2023-5178",
"source": "secalert@redhat.com", "source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5367", "id": "CVE-2023-5367",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-25T20:15:18.323", "published": "2023-10-25T20:15:18.323",
"lastModified": "2023-11-21T17:15:08.180", "lastModified": "2023-11-28T18:15:09.293",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Undergoing Analysis",
"descriptions": [ "descriptions": [
{ {
@ -193,6 +193,14 @@
"url": "https://access.redhat.com/errata/RHSA-2023:7436", "url": "https://access.redhat.com/errata/RHSA-2023:7436",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2023:7526",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7533",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-5367", "url": "https://access.redhat.com/security/cve/CVE-2023-5367",
"source": "secalert@redhat.com", "source": "secalert@redhat.com",

View File

@ -2,15 +2,41 @@
"id": "CVE-2023-6013", "id": "CVE-2023-6013",
"sourceIdentifier": "security@huntr.dev", "sourceIdentifier": "security@huntr.dev",
"published": "2023-11-16T17:15:08.460", "published": "2023-11-16T17:15:08.460",
"lastModified": "2023-11-16T17:30:31.273", "lastModified": "2023-11-28T17:07:15.017",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "H2O is vulnerable to stored XSS vulnerability which can lead to a Local File Include attack." "value": "H2O is vulnerable to stored XSS vulnerability which can lead to a Local File Include attack."
},
{
"lang": "es",
"value": "H2O es afectado por una vulnerabilidad de XSS almacenada que puede provocar un ataque de inclusi\u00f3n de archivos locales."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "security@huntr.dev", "source": "security@huntr.dev",
@ -46,10 +72,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:h2o:h2o:-:*:*:*:*:*:*:*",
"matchCriteriaId": "794A8437-AAB6-4D58-8086-6DA65B54BFD5"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://huntr.com/bounties/9881569f-dc2a-437e-86b0-20d4b70ae7af", "url": "https://huntr.com/bounties/9881569f-dc2a-437e-86b0-20d4b70ae7af",
"source": "security@huntr.dev" "source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,15 +2,41 @@
"id": "CVE-2023-6016", "id": "CVE-2023-6016",
"sourceIdentifier": "security@huntr.dev", "sourceIdentifier": "security@huntr.dev",
"published": "2023-11-16T16:15:34.680", "published": "2023-11-16T16:15:34.680",
"lastModified": "2023-11-16T17:00:44.333", "lastModified": "2023-11-28T17:23:08.633",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An attacker is able to gain remote code execution on a server hosting the H2O dashboard through it's POJO model import feature." "value": "An attacker is able to gain remote code execution on a server hosting the H2O dashboard through it's POJO model import feature."
},
{
"lang": "es",
"value": "Un atacante puede obtener la ejecuci\u00f3n remota de c\u00f3digo en un servidor que aloja el panel de H2O a trav\u00e9s de su funci\u00f3n de importaci\u00f3n de modelo POJO."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "security@huntr.dev", "source": "security@huntr.dev",
@ -46,10 +72,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:h2o:h2o:-:*:*:*:*:*:*:*",
"matchCriteriaId": "794A8437-AAB6-4D58-8086-6DA65B54BFD5"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://huntr.com/bounties/83dd17ec-053e-453c-befb-7d6736bf1836", "url": "https://huntr.com/bounties/83dd17ec-053e-453c-befb-7d6736bf1836",
"source": "security@huntr.dev" "source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,15 +2,41 @@
"id": "CVE-2023-6017", "id": "CVE-2023-6017",
"sourceIdentifier": "security@huntr.dev", "sourceIdentifier": "security@huntr.dev",
"published": "2023-11-16T17:15:08.643", "published": "2023-11-16T17:15:08.643",
"lastModified": "2023-11-16T17:30:31.273", "lastModified": "2023-11-28T17:07:48.107",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "H2O included a reference to an S3 bucket that no longer existed allowing an attacker to take over the S3 bucket URL." "value": "H2O included a reference to an S3 bucket that no longer existed allowing an attacker to take over the S3 bucket URL."
},
{
"lang": "es",
"value": "H2O incluy\u00f3 una referencia a un dep\u00f3sito de S3 que ya no exist\u00eda, lo que permit\u00eda a un atacante hacerse cargo de la URL del dep\u00f3sito de S3."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "security@huntr.dev", "source": "security@huntr.dev",
@ -35,6 +61,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{ {
"source": "security@huntr.dev", "source": "security@huntr.dev",
"type": "Secondary", "type": "Secondary",
@ -46,10 +82,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:h2o:h2o:-:*:*:*:*:*:*:*",
"matchCriteriaId": "794A8437-AAB6-4D58-8086-6DA65B54BFD5"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://huntr.com/bounties/6a69952f-a1ba-4dee-9d8c-e87f52508b58", "url": "https://huntr.com/bounties/6a69952f-a1ba-4dee-9d8c-e87f52508b58",
"source": "security@huntr.dev" "source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6174", "id": "CVE-2023-6174",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-11-16T12:15:07.240", "published": "2023-11-16T12:15:07.240",
"lastModified": "2023-11-20T05:15:09.010", "lastModified": "2023-11-28T17:27:06.313",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -16,6 +16,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{ {
"source": "cve@gitlab.com", "source": "cve@gitlab.com",
"type": "Secondary", "type": "Secondary",
@ -39,6 +59,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
},
{ {
"source": "cve@gitlab.com", "source": "cve@gitlab.com",
"type": "Secondary", "type": "Secondary",
@ -50,18 +80,61 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndIncluding": "4.0.10",
"matchCriteriaId": "C9D0926F-17C4-4594-B8D7-5683A7CFF2DF"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gitlab.com/wireshark/wireshark/-/issues/19369", "url": "https://gitlab.com/wireshark/wireshark/-/issues/19369",
"source": "cve@gitlab.com" "source": "cve@gitlab.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://www.debian.org/security/2023/dsa-5559", "url": "https://www.debian.org/security/2023/dsa-5559",
"source": "cve@gitlab.com" "source": "cve@gitlab.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://www.wireshark.org/security/wnpa-sec-2023-28.html", "url": "https://www.wireshark.org/security/wnpa-sec-2023-28.html",
"source": "cve@gitlab.com" "source": "cve@gitlab.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6239", "id": "CVE-2023-6239",
"sourceIdentifier": "security@m-files.com", "sourceIdentifier": "security@m-files.com",
"published": "2023-11-28T14:15:07.697", "published": "2023-11-28T14:15:07.697",
"lastModified": "2023-11-28T14:15:07.697", "lastModified": "2023-11-28T18:29:23.617",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6253", "id": "CVE-2023-6253",
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
"published": "2023-11-22T12:15:22.963", "published": "2023-11-22T12:15:22.963",
"lastModified": "2023-11-27T22:15:08.440", "lastModified": "2023-11-28T17:15:08.463",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
@ -28,6 +28,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/175956/Fortra-Digital-Guardian-Agent-Uninstaller-Cross-Site-Scripting-UninstallKey-Cached.html",
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
},
{ {
"url": "http://seclists.org/fulldisclosure/2023/Nov/14", "url": "http://seclists.org/fulldisclosure/2023/Nov/14",
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf" "source": "551230f0-3615-47bd-b7cc-93e92e730bbf"

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-11-28T17:00:18.811822+00:00 2023-11-28T19:00:19.440058+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-11-28T16:58:37.430000+00:00 2023-11-28T18:30:16.790000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -29,29 +29,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
231638 231645
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `5` Recently added CVEs: `7`
* [CVE-2022-41678](CVE-2022/CVE-2022-416xx/CVE-2022-41678.json) (`2023-11-28T16:15:06.840`) * [CVE-2023-41264](CVE-2023/CVE-2023-412xx/CVE-2023-41264.json) (`2023-11-28T17:15:07.857`)
* [CVE-2023-49313](CVE-2023/CVE-2023-493xx/CVE-2023-49313.json) (`2023-11-28T15:15:07.710`) * [CVE-2023-42502](CVE-2023/CVE-2023-425xx/CVE-2023-42502.json) (`2023-11-28T17:15:07.907`)
* [CVE-2023-49314](CVE-2023/CVE-2023-493xx/CVE-2023-49314.json) (`2023-11-28T15:15:07.770`) * [CVE-2023-42505](CVE-2023/CVE-2023-425xx/CVE-2023-42505.json) (`2023-11-28T17:15:08.093`)
* [CVE-2023-46589](CVE-2023/CVE-2023-465xx/CVE-2023-46589.json) (`2023-11-28T16:15:06.943`) * [CVE-2023-45286](CVE-2023/CVE-2023-452xx/CVE-2023-45286.json) (`2023-11-28T17:15:08.280`)
* [CVE-2023-49062](CVE-2023/CVE-2023-490xx/CVE-2023-49062.json) (`2023-11-28T16:15:07.023`) * [CVE-2023-48848](CVE-2023/CVE-2023-488xx/CVE-2023-48848.json) (`2023-11-28T17:15:08.417`)
* [CVE-2023-40056](CVE-2023/CVE-2023-400xx/CVE-2023-40056.json) (`2023-11-28T18:15:07.900`)
* [CVE-2023-42504](CVE-2023/CVE-2023-425xx/CVE-2023-42504.json) (`2023-11-28T18:15:08.353`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `5` Recently modified CVEs: `40`
* [CVE-2023-46604](CVE-2023/CVE-2023-466xx/CVE-2023-46604.json) (`2023-11-28T15:15:07.597`) * [CVE-2023-6174](CVE-2023/CVE-2023-61xx/CVE-2023-6174.json) (`2023-11-28T17:27:06.313`)
* [CVE-2023-6329](CVE-2023/CVE-2023-63xx/CVE-2023-6329.json) (`2023-11-28T16:15:07.077`) * [CVE-2023-20592](CVE-2023/CVE-2023-205xx/CVE-2023-20592.json) (`2023-11-28T18:04:11.733`)
* [CVE-2023-25080](CVE-2023/CVE-2023-250xx/CVE-2023-25080.json) (`2023-11-28T16:56:08.080`) * [CVE-2023-20571](CVE-2023/CVE-2023-205xx/CVE-2023-20571.json) (`2023-11-28T18:05:25.177`)
* [CVE-2023-25075](CVE-2023/CVE-2023-250xx/CVE-2023-25075.json) (`2023-11-28T16:56:44.577`) * [CVE-2023-20565](CVE-2023/CVE-2023-205xx/CVE-2023-20565.json) (`2023-11-28T18:06:51.780`)
* [CVE-2023-24592](CVE-2023/CVE-2023-245xx/CVE-2023-24592.json) (`2023-11-28T16:58:37.430`) * [CVE-2023-20563](CVE-2023/CVE-2023-205xx/CVE-2023-20563.json) (`2023-11-28T18:07:30.753`)
* [CVE-2023-44374](CVE-2023/CVE-2023-443xx/CVE-2023-44374.json) (`2023-11-28T18:09:06.883`)
* [CVE-2023-44373](CVE-2023/CVE-2023-443xx/CVE-2023-44373.json) (`2023-11-28T18:10:16.467`)
* [CVE-2023-44322](CVE-2023/CVE-2023-443xx/CVE-2023-44322.json) (`2023-11-28T18:13:11.883`)
* [CVE-2023-39417](CVE-2023/CVE-2023-394xx/CVE-2023-39417.json) (`2023-11-28T18:15:07.600`)
* [CVE-2023-3812](CVE-2023/CVE-2023-38xx/CVE-2023-3812.json) (`2023-11-28T18:15:07.760`)
* [CVE-2023-42753](CVE-2023/CVE-2023-427xx/CVE-2023-42753.json) (`2023-11-28T18:15:08.790`)
* [CVE-2023-46402](CVE-2023/CVE-2023-464xx/CVE-2023-46402.json) (`2023-11-28T18:15:08.910`)
* [CVE-2023-4732](CVE-2023/CVE-2023-47xx/CVE-2023-4732.json) (`2023-11-28T18:15:09.030`)
* [CVE-2023-5178](CVE-2023/CVE-2023-51xx/CVE-2023-5178.json) (`2023-11-28T18:15:09.157`)
* [CVE-2023-5367](CVE-2023/CVE-2023-53xx/CVE-2023-5367.json) (`2023-11-28T18:15:09.293`)
* [CVE-2023-44321](CVE-2023/CVE-2023-443xx/CVE-2023-44321.json) (`2023-11-28T18:28:00.897`)
* [CVE-2023-44320](CVE-2023/CVE-2023-443xx/CVE-2023-44320.json) (`2023-11-28T18:28:20.223`)
* [CVE-2023-44319](CVE-2023/CVE-2023-443xx/CVE-2023-44319.json) (`2023-11-28T18:28:57.850`)
* [CVE-2023-44318](CVE-2023/CVE-2023-443xx/CVE-2023-44318.json) (`2023-11-28T18:29:11.187`)
* [CVE-2023-6239](CVE-2023/CVE-2023-62xx/CVE-2023-6239.json) (`2023-11-28T18:29:23.617`)
* [CVE-2023-49313](CVE-2023/CVE-2023-493xx/CVE-2023-49313.json) (`2023-11-28T18:29:23.617`)
* [CVE-2023-49314](CVE-2023/CVE-2023-493xx/CVE-2023-49314.json) (`2023-11-28T18:29:23.617`)
* [CVE-2023-46589](CVE-2023/CVE-2023-465xx/CVE-2023-46589.json) (`2023-11-28T18:29:23.617`)
* [CVE-2023-49062](CVE-2023/CVE-2023-490xx/CVE-2023-49062.json) (`2023-11-28T18:29:23.617`)
* [CVE-2023-22329](CVE-2023/CVE-2023-223xx/CVE-2023-22329.json) (`2023-11-28T18:30:16.790`)
## Download and Usage ## Download and Usage