diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20187.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20187.json new file mode 100644 index 00000000000..a5e7a471ebe --- /dev/null +++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20187.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2017-20187", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-11-05T21:15:09.190", + "lastModified": "2023-11-05T21:15:09.190", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Magnesium-PHP up to 0.3.0. It has been classified as problematic. Affected is the function formatEmailString of the file src/Magnesium/Message/Base.php. The manipulation of the argument email/name leads to injection. Upgrading to version 0.3.1 is able to address this issue. The patch is identified as 500d340e1f6421007413cc08a8383475221c2604. It is recommended to upgrade the affected component. VDB-244482 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 2.7 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 5.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/floriangaerber/Magnesium-PHP/commit/500d340e1f6421007413cc08a8383475221c2604", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/floriangaerber/Magnesium-PHP/releases/tag/v0.3.1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.244482", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.244482", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25092.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25092.json new file mode 100644 index 00000000000..88886f3825b --- /dev/null +++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25092.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2018-25092", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-11-05T21:15:09.357", + "lastModified": "2023-11-05T21:15:09.357", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Vaerys-Dawn DiscordSailv2 up to 2.10.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Command Mention Handler. The manipulation leads to improper access controls. Upgrading to version 2.10.3 is able to address this issue. The patch is named cc12e0be82a5d05d9f359ed8e56088f4f8b8eb69. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-244483." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.2 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Vaerys-Dawn/DiscordSailv2/commit/cc12e0be82a5d05d9f359ed8e56088f4f8b8eb69", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Vaerys-Dawn/DiscordSailv2/releases/tag/2.10.3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.244483", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.244483", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1073.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1073.json index 6c42e74d44e..08c7560b8a8 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1073.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1073.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1073", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-27T21:15:10.287", - "lastModified": "2023-05-03T14:15:19.060", + "lastModified": "2023-11-05T22:15:07.947", "vulnStatus": "Modified", "descriptions": [ { @@ -114,6 +114,14 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2023/11/05/2", + "source": "secalert@redhat.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/11/05/3", + "source": "secalert@redhat.com" + }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173403", "source": "secalert@redhat.com", @@ -137,6 +145,13 @@ { "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html", "source": "secalert@redhat.com" + }, + { + "url": "https://www.openwall.com/lists/osssecurity/2023/01/17/3", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1074.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1074.json index 3cd5356a57b..fd6e66fe7aa 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1074.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1074.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1074", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-27T21:15:10.330", - "lastModified": "2023-05-03T14:15:19.413", + "lastModified": "2023-11-05T22:15:08.067", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,10 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2023/11/05/4", + "source": "secalert@redhat.com" + }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173430", "source": "secalert@redhat.com", diff --git a/README.md b/README.md index cf9c9054b9e..106804eeeef 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-05T21:00:19.193004+00:00 +2023-11-05T23:00:20.268296+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-05T19:15:08.907000+00:00 +2023-11-05T22:15:08.067000+00:00 ``` ### Last Data Feed Release @@ -29,21 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -229790 +229792 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `2` +* [CVE-2017-20187](CVE-2017/CVE-2017-201xx/CVE-2017-20187.json) (`2023-11-05T21:15:09.190`) +* [CVE-2018-25092](CVE-2018/CVE-2018-250xx/CVE-2018-25092.json) (`2023-11-05T21:15:09.357`) ### CVEs modified in the last Commit Recently modified CVEs: `2` -* [CVE-2023-1078](CVE-2023/CVE-2023-10xx/CVE-2023-1078.json) (`2023-11-05T19:15:08.747`) -* [CVE-2023-25012](CVE-2023/CVE-2023-250xx/CVE-2023-25012.json) (`2023-11-05T19:15:08.907`) +* [CVE-2023-1073](CVE-2023/CVE-2023-10xx/CVE-2023-1073.json) (`2023-11-05T22:15:07.947`) +* [CVE-2023-1074](CVE-2023/CVE-2023-10xx/CVE-2023-1074.json) (`2023-11-05T22:15:08.067`) ## Download and Usage