Auto-Update: 2023-11-01T23:00:23.933054+00:00

This commit is contained in:
cad-safe-bot 2023-11-01 23:00:27 +00:00
parent dc3c57afe3
commit b121c219ad
15 changed files with 236 additions and 58 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41248",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.277",
"lastModified": "2023-10-25T18:17:17.977",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-01T21:08:21.113",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -38,6 +38,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41249",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.333",
"lastModified": "2023-10-25T18:17:18.037",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-01T21:02:39.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -38,6 +38,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-22099",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2023-10-17T22:15:14.893",
"lastModified": "2023-10-23T18:20:27.083",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-01T22:15:08.447",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: Only applicable to 7.0.x platform. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H)."
"value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: Only applicable to 7.0.x platform. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)."
},
{
"lang": "es",
@ -21,20 +21,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 5.3
"impactScore": 6.0
}
]
},

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-39281",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-01T22:15:08.547",
"lastModified": "2023-11-01T22:15:08.547",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stack buffer overflow vulnerability discovered in AsfSecureBootDxe in Insyde InsydeH2O with kernel 5.0 through 5.5 allows attackers to run arbitrary code execution during the DXE phase."
}
],
"metrics": {},
"references": [
{
"url": "https://www.insyde.com/security-pledge",
"source": "cve@mitre.org"
},
{
"url": "https://www.insyde.com/security-pledge/SA-2023054",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-44025",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-01T22:15:08.597",
"lastModified": "2023-11-01T22:15:08.597",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in addify Addifyfreegifts v.1.0.2 and before allows a remote attacker to execute arbitrary code via a crafted script to the getrulebyid function in the AddifyfreegiftsModel.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2023/10/31/addifyfreegifts.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-45201",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-11-01T22:15:08.643",
"lastModified": "2023-11-01T22:15:08.643",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities.\u00a0The 'q' parameter of the admin.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/uchida",
"source": "help@fluidattacks.com"
},
{
"url": "https://projectworlds.in/",
"source": "help@fluidattacks.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-46428",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-01T21:15:08.733",
"lastModified": "2023-11-01T21:15:08.733",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in HadSky v7.12.10 allows attackers to execute arbitrary code via a crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/fenglon/CVE/blob/main/analyse.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2023-46448",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-01T22:15:08.730",
"lastModified": "2023-11-01T22:15:08.730",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Reflected Cross-Site Scripting (XSS) vulnerability in dmpop Mejiro Commit Versions Prior To 3096393 allows attackers to run arbitrary code via crafted string in metadata of uploaded images."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://blog.0xzon.dev/2023-10-15-Mejiro-Reflected-XSS-Via-Remote-File-Inclusion-CVE-2023-46448/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/dmpop/mejiro/commit/309639339f5816408865902befe8c90cb6862537",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-47094",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-01T00:15:09.380",
"lastModified": "2023-11-01T12:51:21.720",
"lastModified": "2023-11-01T22:15:08.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Virtualmin 7.7. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Account Plans tab of System Settings via the Plan Name field. Whenever the module is accessed, the XSS payload is executed."
"value": "A Stored Cross-Site Scripting (XSS) vulnerability in the Account Plans tab of System Settings in Virtualmin 7.7 allows remote attackers to inject arbitrary web script or HTML via the Plan name field while editing Account plan details."
}
],
"metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-47095",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-01T00:15:09.423",
"lastModified": "2023-11-01T12:51:21.720",
"lastModified": "2023-11-01T22:15:08.847",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Virtualmin 7.7. The Custom Fields feature of Edit Virtual Server under System Customization allows XSS."
"value": "A Stored Cross-Site Scripting (XSS) vulnerability in the Custom fields of Edit Virtual Server under System Customization in Virtualmin 7.7 allows remote attackers to inject arbitrary web script or HTML via the Batch Label field while details of Virtual Server."
}
],
"metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-47096",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-01T00:15:09.467",
"lastModified": "2023-11-01T12:51:21.720",
"lastModified": "2023-11-01T22:15:08.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Virtualmin 7.7. The Cloudmin Services Client under System Settings allows XSS."
"value": "A Reflected Cross-Site Scripting (XSS) vulnerability in the Cloudmin Services Client under System Setting in Virtualmin 7.7 allows remote attackers to inject arbitrary web script or HTML via the Cloudmin services master field."
}
],
"metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-47097",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-01T00:15:09.507",
"lastModified": "2023-11-01T12:51:21.720",
"lastModified": "2023-11-01T22:15:08.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Virtualmin 7.7. The Server Templates feature under System Settings allows XSS."
"value": "A Stored Cross-Site Scripting (XSS) vulnerability in the Server Template under System Setting in Virtualmin 7.7 allows remote attackers to inject arbitrary web script or HTML via the Template name field while creating server templates."
}
],
"metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-47098",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-01T00:15:09.547",
"lastModified": "2023-11-01T12:51:21.720",
"lastModified": "2023-11-01T22:15:08.997",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Virtualmin 7.7. A Stored Cross-Site Scripting (XSS) vulnerability exists in the Create Extra Administrator tab via the \"Real name or description\" field."
"value": "A Stored Cross-Site Scripting (XSS) vulnerability in the Manage Extra Admins under Administration Options in Virtualmin 7.7 allows remote attackers to inject arbitrary web script or HTML via the real name or description field."
}
],
"metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-47099",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-01T00:15:09.583",
"lastModified": "2023-11-01T12:51:21.720",
"lastModified": "2023-11-01T22:15:09.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Virtualmin 7.7. The Create Virtual Server functionality allows XSS attacks against anyone who accesses the Virtual Server Summary tab."
"value": "A Stored Cross-Site Scripting (XSS) vulnerability in the Create Virtual Server in Virtualmin 7.7 allows remote attackers to inject arbitrary web script or HTML via Description field while creating the Virtual server."
}
],
"metrics": {},

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-01T21:00:18.437221+00:00
2023-11-01T23:00:23.933054+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-01T20:58:58.857000+00:00
2023-11-01T22:15:09.053000+00:00
```
### Last Data Feed Release
@ -29,49 +29,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
229551
229556
```
### CVEs added in the last Commit
Recently added CVEs: `5`
* [CVE-2023-46482](CVE-2023/CVE-2023-464xx/CVE-2023-46482.json) (`2023-11-01T19:15:45.393`)
* [CVE-2023-1192](CVE-2023/CVE-2023-11xx/CVE-2023-1192.json) (`2023-11-01T20:15:08.597`)
* [CVE-2023-1193](CVE-2023/CVE-2023-11xx/CVE-2023-1193.json) (`2023-11-01T20:15:08.663`)
* [CVE-2023-3397](CVE-2023/CVE-2023-33xx/CVE-2023-3397.json) (`2023-11-01T20:15:08.737`)
* [CVE-2023-46724](CVE-2023/CVE-2023-467xx/CVE-2023-46724.json) (`2023-11-01T20:15:08.800`)
* [CVE-2023-46428](CVE-2023/CVE-2023-464xx/CVE-2023-46428.json) (`2023-11-01T21:15:08.733`)
* [CVE-2023-39281](CVE-2023/CVE-2023-392xx/CVE-2023-39281.json) (`2023-11-01T22:15:08.547`)
* [CVE-2023-44025](CVE-2023/CVE-2023-440xx/CVE-2023-44025.json) (`2023-11-01T22:15:08.597`)
* [CVE-2023-45201](CVE-2023/CVE-2023-452xx/CVE-2023-45201.json) (`2023-11-01T22:15:08.643`)
* [CVE-2023-46448](CVE-2023/CVE-2023-464xx/CVE-2023-46448.json) (`2023-11-01T22:15:08.730`)
### CVEs modified in the last Commit
Recently modified CVEs: `79`
Recently modified CVEs: `9`
* [CVE-2022-41254](CVE-2022/CVE-2022-412xx/CVE-2022-41254.json) (`2023-11-01T20:58:52.380`)
* [CVE-2022-41255](CVE-2022/CVE-2022-412xx/CVE-2022-41255.json) (`2023-11-01T20:58:58.857`)
* [CVE-2023-4692](CVE-2023/CVE-2023-46xx/CVE-2023-4692.json) (`2023-11-01T19:03:42.027`)
* [CVE-2023-46660](CVE-2023/CVE-2023-466xx/CVE-2023-46660.json) (`2023-11-01T19:04:04.637`)
* [CVE-2023-46659](CVE-2023/CVE-2023-466xx/CVE-2023-46659.json) (`2023-11-01T19:04:21.493`)
* [CVE-2023-5472](CVE-2023/CVE-2023-54xx/CVE-2023-5472.json) (`2023-11-01T19:04:53.977`)
* [CVE-2023-46152](CVE-2023/CVE-2023-461xx/CVE-2023-46152.json) (`2023-11-01T19:10:56.083`)
* [CVE-2023-5723](CVE-2023/CVE-2023-57xx/CVE-2023-5723.json) (`2023-11-01T19:14:35.080`)
* [CVE-2023-46347](CVE-2023/CVE-2023-463xx/CVE-2023-46347.json) (`2023-11-01T19:18:47.667`)
* [CVE-2023-5722](CVE-2023/CVE-2023-57xx/CVE-2023-5722.json) (`2023-11-01T19:24:13.513`)
* [CVE-2023-5721](CVE-2023/CVE-2023-57xx/CVE-2023-5721.json) (`2023-11-01T19:24:31.713`)
* [CVE-2023-5731](CVE-2023/CVE-2023-57xx/CVE-2023-5731.json) (`2023-11-01T19:27:41.383`)
* [CVE-2023-5732](CVE-2023/CVE-2023-57xx/CVE-2023-5732.json) (`2023-11-01T19:28:03.360`)
* [CVE-2023-5729](CVE-2023/CVE-2023-57xx/CVE-2023-5729.json) (`2023-11-01T19:53:53.417`)
* [CVE-2023-5730](CVE-2023/CVE-2023-57xx/CVE-2023-5730.json) (`2023-11-01T19:54:34.180`)
* [CVE-2023-46369](CVE-2023/CVE-2023-463xx/CVE-2023-46369.json) (`2023-11-01T20:03:48.360`)
* [CVE-2023-46370](CVE-2023/CVE-2023-463xx/CVE-2023-46370.json) (`2023-11-01T20:05:45.640`)
* [CVE-2023-46371](CVE-2023/CVE-2023-463xx/CVE-2023-46371.json) (`2023-11-01T20:08:56.603`)
* [CVE-2023-46373](CVE-2023/CVE-2023-463xx/CVE-2023-46373.json) (`2023-11-01T20:09:41.260`)
* [CVE-2023-46518](CVE-2023/CVE-2023-465xx/CVE-2023-46518.json) (`2023-11-01T20:15:22.357`)
* [CVE-2023-46540](CVE-2023/CVE-2023-465xx/CVE-2023-46540.json) (`2023-11-01T20:18:44.327`)
* [CVE-2023-5758](CVE-2023/CVE-2023-57xx/CVE-2023-5758.json) (`2023-11-01T20:21:27.567`)
* [CVE-2023-46544](CVE-2023/CVE-2023-465xx/CVE-2023-46544.json) (`2023-11-01T20:28:38.340`)
* [CVE-2023-46543](CVE-2023/CVE-2023-465xx/CVE-2023-46543.json) (`2023-11-01T20:35:20.917`)
* [CVE-2023-5568](CVE-2023/CVE-2023-55xx/CVE-2023-5568.json) (`2023-11-01T20:44:27.143`)
* [CVE-2022-41249](CVE-2022/CVE-2022-412xx/CVE-2022-41249.json) (`2023-11-01T21:02:39.747`)
* [CVE-2022-41248](CVE-2022/CVE-2022-412xx/CVE-2022-41248.json) (`2023-11-01T21:08:21.113`)
* [CVE-2023-22099](CVE-2023/CVE-2023-220xx/CVE-2023-22099.json) (`2023-11-01T22:15:08.447`)
* [CVE-2023-47094](CVE-2023/CVE-2023-470xx/CVE-2023-47094.json) (`2023-11-01T22:15:08.793`)
* [CVE-2023-47095](CVE-2023/CVE-2023-470xx/CVE-2023-47095.json) (`2023-11-01T22:15:08.847`)
* [CVE-2023-47096](CVE-2023/CVE-2023-470xx/CVE-2023-47096.json) (`2023-11-01T22:15:08.897`)
* [CVE-2023-47097](CVE-2023/CVE-2023-470xx/CVE-2023-47097.json) (`2023-11-01T22:15:08.943`)
* [CVE-2023-47098](CVE-2023/CVE-2023-470xx/CVE-2023-47098.json) (`2023-11-01T22:15:08.997`)
* [CVE-2023-47099](CVE-2023/CVE-2023-470xx/CVE-2023-47099.json) (`2023-11-01T22:15:09.053`)
## Download and Usage