Auto-Update: 2023-10-17T06:00:26.115785+00:00

This commit is contained in:
cad-safe-bot 2023-10-17 06:00:29 +00:00
parent f6e88dce66
commit b72a94ef27
19 changed files with 427 additions and 35 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-28651",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-27T12:15:08.197",
"lastModified": "2023-10-11T12:15:09.843",
"vulnStatus": "Modified",
"lastModified": "2023-10-17T05:15:49.187",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-28652",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-27T12:15:08.230",
"lastModified": "2023-10-11T12:15:09.960",
"vulnStatus": "Modified",
"lastModified": "2023-10-17T05:15:49.470",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -142,6 +142,10 @@
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-28662",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-27T12:15:08.263",
"lastModified": "2023-10-11T12:15:10.060",
"vulnStatus": "Modified",
"lastModified": "2023-10-17T05:15:49.577",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -137,6 +137,10 @@
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-31806",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-27T13:15:08.270",
"lastModified": "2023-10-11T12:15:10.147",
"vulnStatus": "Modified",
"lastModified": "2023-10-17T05:15:49.683",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -156,6 +156,10 @@
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-31807",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-08T20:15:09.057",
"lastModified": "2023-10-11T12:15:10.237",
"vulnStatus": "Modified",
"lastModified": "2023-10-17T05:15:49.790",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -252,6 +252,10 @@
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-31808",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-27T14:15:07.500",
"lastModified": "2023-10-11T12:15:10.333",
"vulnStatus": "Modified",
"lastModified": "2023-10-17T05:15:49.943",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -156,6 +156,10 @@
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-33620",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-28T12:15:07.697",
"lastModified": "2023-10-11T12:15:10.413",
"vulnStatus": "Modified",
"lastModified": "2023-10-17T05:15:50.050",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -156,6 +156,10 @@
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
"source": "cve@mitre.org"

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34207",
"sourceIdentifier": "ART@zuso.ai",
"published": "2023-10-17T04:15:11.937",
"lastModified": "2023-10-17T04:15:11.937",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted upload of file with dangerous type vulnerability in create template function in EasyUse MailHunter Ultimate 2023 and earlier allows remote authenticated users to perform arbitrary system commands with \u2018NT Authority\\SYSTEM\u2018 privilege via a crafted ZIP archive."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ART@zuso.ai",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "ART@zuso.ai",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://zuso.ai/Advisory/ZA-2023-04",
"source": "ART@zuso.ai"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34208",
"sourceIdentifier": "ART@zuso.ai",
"published": "2023-10-17T04:15:12.077",
"lastModified": "2023-10-17T04:15:12.077",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Path Traversal in create template function in EasyUse MailHunter Ultimate 2023 and earlier allow remote authenticated users to extract files into arbitrary directories via a crafted ZIP archive."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ART@zuso.ai",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ART@zuso.ai",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://zuso.ai/Advisory/ZA-2023-05",
"source": "ART@zuso.ai"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34209",
"sourceIdentifier": "ART@zuso.ai",
"published": "2023-10-17T05:15:50.207",
"lastModified": "2023-10-17T05:15:50.207",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere in create template function in EasyUse MailHunter Ultimate 2023 and earlier allow remote authenticated users to obtain the absolute path via unencrypted VIEWSTATE parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ART@zuso.ai",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ART@zuso.ai",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-497"
}
]
}
],
"references": [
{
"url": "https://zuso.ai/Advisory/ZA-2023-06",
"source": "ART@zuso.ai"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34210",
"sourceIdentifier": "ART@zuso.ai",
"published": "2023-10-17T05:15:50.300",
"lastModified": "2023-10-17T05:15:50.300",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection in create customer group function in EasyUse MailHunter Ultimate 2023 and earlier allow remote authenticated users to execute arbitrary SQL commands via the ctl00$ContentPlaceHolder1$txtCustSQL parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ART@zuso.ai",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ART@zuso.ai",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://zuso.ai/Advisory/ZA-2023-07",
"source": "ART@zuso.ai"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38039",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-09-15T04:15:10.127",
"lastModified": "2023-10-13T22:15:10.100",
"lastModified": "2023-10-17T05:15:50.377",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
@ -85,6 +85,10 @@
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/17",
"source": "support@hackerone.com"
},
{
"url": "https://hackerone.com/reports/2072338",
"source": "support@hackerone.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-42824",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-10-04T19:15:10.490",
"lastModified": "2023-10-10T23:15:10.847",
"lastModified": "2023-10-17T05:15:50.497",
"vulnStatus": "Modified",
"cisaExploitAdd": "2023-10-05",
"cisaActionDue": "2023-10-26",
@ -15,7 +15,7 @@
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en iOS 17.0.3 y iPadOS 17.0.3. Un atacante local podr\u00eda aumentar sus privilegios. Apple tiene conocimiento de un informe que indica que este problema puede haber sido explotado activamente en versiones de iOS anteriores a iOS 16.6."
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en iOS 17.0.3 y iPadOS 17.0.3, iOS 16.7.1 y iPadOS 16.7.1. Un atacante local podr\u00eda aumentar sus privilegios. Apple tiene conocimiento de un informe que indica que este problema puede haber sido explotado activamente en versiones de iOS anteriores a iOS 16.6."
}
],
"metrics": {
@ -79,6 +79,10 @@
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/16",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213961",
"source": "product-security@apple.com",

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-45357",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-17T05:15:50.583",
"lastModified": "2023-10-17T05:15:50.583",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Archer Platform 6.x before 6.13 P2 HF2 (6.13.0.2.2) contains a sensitive information disclosure vulnerability. An authenticated attacker could potentially obtain access to sensitive information via a popup warning message. 6.14 (6.14.0) is also a fixed release."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-45358",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-17T05:15:50.657",
"lastModified": "2023-10-17T05:15:50.657",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Archer Platform 6.x before 6.13 P2 HF2 (6.13.0.2.2) contains a stored cross-site scripting (XSS) vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.14 (6.14.0) is also a fixed release."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.7
}
]
},
"references": [
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-45375",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-17T05:15:50.733",
"lastModified": "2023-10-17T05:15:50.733",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the module \"PireosPay\" (pireospay) before version 1.7.10 from 01generator.com for PrestaShop, a guest can perform SQL injection via `PireosPayValidationModuleFrontController::postProcess().`"
}
],
"metrics": {},
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2023/10/12/pireospay.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-45386",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-17T05:15:50.787",
"lastModified": "2023-10-17T05:15:50.787",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the module extratabspro before version 2.2.8 from MyPresta.eu for PrestaShop, a guest can perform SQL injection via `extratabspro::searchcategory()`, `extratabspro::searchproduct()` and `extratabspro::searchmanufacturer().'"
}
],
"metrics": {},
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2023/10/12/extratabspro.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5217",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-28T16:15:10.980",
"lastModified": "2023-10-09T16:15:10.960",
"lastModified": "2023-10-17T05:15:50.840",
"vulnStatus": "Modified",
"cisaExploitAdd": "2023-10-02",
"cisaActionDue": "2023-10-23",
@ -113,6 +113,10 @@
"url": "http://seclists.org/fulldisclosure/2023/Oct/12",
"source": "chrome-cve-admin@google.com"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/16",
"source": "chrome-cve-admin@google.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/28/5",
"source": "chrome-cve-admin@google.com",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-10-17T04:00:25.167719+00:00
2023-10-17T06:00:26.115785+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-10-17T03:15:09.703000+00:00
2023-10-17T05:15:50.840000+00:00
```
### Last Data Feed Release
@ -29,31 +29,37 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
228007
228015
```
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `8`
* [CVE-2021-20581](CVE-2021/CVE-2021-205xx/CVE-2021-20581.json) (`2023-10-17T02:15:09.813`)
* [CVE-2021-29913](CVE-2021/CVE-2021-299xx/CVE-2021-29913.json) (`2023-10-17T02:15:09.910`)
* [CVE-2021-38859](CVE-2021/CVE-2021-388xx/CVE-2021-38859.json) (`2023-10-17T02:15:10.000`)
* [CVE-2022-22375](CVE-2022/CVE-2022-223xx/CVE-2022-22375.json) (`2023-10-17T02:15:10.090`)
* [CVE-2022-22380](CVE-2022/CVE-2022-223xx/CVE-2022-22380.json) (`2023-10-17T02:15:10.177`)
* [CVE-2022-22385](CVE-2022/CVE-2022-223xx/CVE-2022-22385.json) (`2023-10-17T02:15:10.257`)
* [CVE-2022-22386](CVE-2022/CVE-2022-223xx/CVE-2022-22386.json) (`2023-10-17T02:15:10.340`)
* [CVE-2022-43889](CVE-2022/CVE-2022-438xx/CVE-2022-43889.json) (`2023-10-17T02:15:10.427`)
* [CVE-2022-43893](CVE-2022/CVE-2022-438xx/CVE-2022-43893.json) (`2023-10-17T02:15:10.507`)
* [CVE-2022-43891](CVE-2022/CVE-2022-438xx/CVE-2022-43891.json) (`2023-10-17T03:15:09.520`)
* [CVE-2022-43892](CVE-2022/CVE-2022-438xx/CVE-2022-43892.json) (`2023-10-17T03:15:09.603`)
* [CVE-2023-34207](CVE-2023/CVE-2023-342xx/CVE-2023-34207.json) (`2023-10-17T04:15:11.937`)
* [CVE-2023-34208](CVE-2023/CVE-2023-342xx/CVE-2023-34208.json) (`2023-10-17T04:15:12.077`)
* [CVE-2023-34209](CVE-2023/CVE-2023-342xx/CVE-2023-34209.json) (`2023-10-17T05:15:50.207`)
* [CVE-2023-34210](CVE-2023/CVE-2023-342xx/CVE-2023-34210.json) (`2023-10-17T05:15:50.300`)
* [CVE-2023-45357](CVE-2023/CVE-2023-453xx/CVE-2023-45357.json) (`2023-10-17T05:15:50.583`)
* [CVE-2023-45358](CVE-2023/CVE-2023-453xx/CVE-2023-45358.json) (`2023-10-17T05:15:50.657`)
* [CVE-2023-45375](CVE-2023/CVE-2023-453xx/CVE-2023-45375.json) (`2023-10-17T05:15:50.733`)
* [CVE-2023-45386](CVE-2023/CVE-2023-453xx/CVE-2023-45386.json) (`2023-10-17T05:15:50.787`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `10`
* [CVE-2023-45133](CVE-2023/CVE-2023-451xx/CVE-2023-45133.json) (`2023-10-17T03:15:09.703`)
* [CVE-2021-28651](CVE-2021/CVE-2021-286xx/CVE-2021-28651.json) (`2023-10-17T05:15:49.187`)
* [CVE-2021-28652](CVE-2021/CVE-2021-286xx/CVE-2021-28652.json) (`2023-10-17T05:15:49.470`)
* [CVE-2021-28662](CVE-2021/CVE-2021-286xx/CVE-2021-28662.json) (`2023-10-17T05:15:49.577`)
* [CVE-2021-31806](CVE-2021/CVE-2021-318xx/CVE-2021-31806.json) (`2023-10-17T05:15:49.683`)
* [CVE-2021-31807](CVE-2021/CVE-2021-318xx/CVE-2021-31807.json) (`2023-10-17T05:15:49.790`)
* [CVE-2021-31808](CVE-2021/CVE-2021-318xx/CVE-2021-31808.json) (`2023-10-17T05:15:49.943`)
* [CVE-2021-33620](CVE-2021/CVE-2021-336xx/CVE-2021-33620.json) (`2023-10-17T05:15:50.050`)
* [CVE-2023-38039](CVE-2023/CVE-2023-380xx/CVE-2023-38039.json) (`2023-10-17T05:15:50.377`)
* [CVE-2023-42824](CVE-2023/CVE-2023-428xx/CVE-2023-42824.json) (`2023-10-17T05:15:50.497`)
* [CVE-2023-5217](CVE-2023/CVE-2023-52xx/CVE-2023-5217.json) (`2023-10-17T05:15:50.840`)
## Download and Usage