diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json index db1508fe799..4193a447f74 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4211", "sourceIdentifier": "arm-security@arm.com", "published": "2023-10-01T18:15:09.927", - "lastModified": "2023-10-01T18:15:09.927", - "vulnStatus": "Received", + "lastModified": "2023-10-02T00:44:36.450", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5322.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5322.json index cf39f9b1174..9eb83c45156 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5322.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5322.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5322", "sourceIdentifier": "cna@vuldb.com", "published": "2023-10-01T05:15:09.933", - "lastModified": "2023-10-01T05:15:09.933", - "vulnStatus": "Received", + "lastModified": "2023-10-02T00:44:36.450", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5324.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5324.json index 938d20a6da6..2142daa101a 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5324.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5324.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5324", "sourceIdentifier": "cna@vuldb.com", "published": "2023-10-01T21:15:42.693", - "lastModified": "2023-10-01T21:15:42.693", - "vulnStatus": "Received", + "lastModified": "2023-10-02T00:44:36.450", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5326.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5326.json index 0703f2e4ee8..251cdb1d3c2 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5326.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5326.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5326", "sourceIdentifier": "cna@vuldb.com", "published": "2023-10-01T23:15:08.387", - "lastModified": "2023-10-01T23:15:08.387", - "vulnStatus": "Received", + "lastModified": "2023-10-02T00:44:36.450", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5327.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5327.json index 4b086eccbf8..d274fd1c8bc 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5327.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5327.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5327", "sourceIdentifier": "cna@vuldb.com", "published": "2023-10-01T23:15:08.487", - "lastModified": "2023-10-01T23:15:08.487", - "vulnStatus": "Received", + "lastModified": "2023-10-02T00:44:36.450", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5328.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5328.json new file mode 100644 index 00000000000..d69b4595fdc --- /dev/null +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5328.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-5328", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-10-02T00:15:10.017", + "lastModified": "2023-10-02T00:44:36.450", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in SATO CL4NX-J Plus 1.13.2-u455_r2. This affects an unknown part of the component Cookie Handler. The manipulation with the input auth=user,level1,settings; web=true leads to improper authentication. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-241029 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.5, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus%20cookie/README.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.241029", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.241029", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5329.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5329.json new file mode 100644 index 00000000000..0613fe63f23 --- /dev/null +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5329.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-5329", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-10-02T00:15:10.100", + "lastModified": "2023-10-02T00:44:36.450", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in Field Logic DataCube4 up to 20231001. This vulnerability affects unknown code of the file /api/ of the component Web API. The manipulation leads to improper authentication. The exploit has been disclosed to the public and may be used. VDB-241030 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.5, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/Field%20Logic/Field%20Logic%20DataCube4%20Web%20API%20Improper%20Authentication.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.241030", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.241030", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 270744a3826..41e3c35f100 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-10-01T23:55:25.025646+00:00 +2023-10-02T02:00:24.918092+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-10-01T23:15:08.487000+00:00 +2023-10-02T00:44:36.450000+00:00 ``` ### Last Data Feed Release @@ -23,29 +23,32 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2023-10-01T00:00:13.540334+00:00 +2023-10-02T00:00:13.536483+00:00 ``` ### Total Number of included CVEs ```plain -226700 +226702 ``` ### CVEs added in the last Commit Recently added CVEs: `2` -* [CVE-2023-5326](CVE-2023/CVE-2023-53xx/CVE-2023-5326.json) (`2023-10-01T23:15:08.387`) -* [CVE-2023-5327](CVE-2023/CVE-2023-53xx/CVE-2023-5327.json) (`2023-10-01T23:15:08.487`) +* [CVE-2023-5328](CVE-2023/CVE-2023-53xx/CVE-2023-5328.json) (`2023-10-02T00:15:10.017`) +* [CVE-2023-5329](CVE-2023/CVE-2023-53xx/CVE-2023-5329.json) (`2023-10-02T00:15:10.100`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `5` -* [CVE-2023-44488](CVE-2023/CVE-2023-444xx/CVE-2023-44488.json) (`2023-10-01T22:15:09.967`) -* [CVE-2023-5217](CVE-2023/CVE-2023-52xx/CVE-2023-5217.json) (`2023-10-01T22:15:10.030`) +* [CVE-2023-5322](CVE-2023/CVE-2023-53xx/CVE-2023-5322.json) (`2023-10-02T00:44:36.450`) +* [CVE-2023-4211](CVE-2023/CVE-2023-42xx/CVE-2023-4211.json) (`2023-10-02T00:44:36.450`) +* [CVE-2023-5324](CVE-2023/CVE-2023-53xx/CVE-2023-5324.json) (`2023-10-02T00:44:36.450`) +* [CVE-2023-5326](CVE-2023/CVE-2023-53xx/CVE-2023-5326.json) (`2023-10-02T00:44:36.450`) +* [CVE-2023-5327](CVE-2023/CVE-2023-53xx/CVE-2023-5327.json) (`2023-10-02T00:44:36.450`) ## Download and Usage