diff --git a/CVE-2022/CVE-2022-230xx/CVE-2022-23096.json b/CVE-2022/CVE-2022-230xx/CVE-2022-23096.json index bc5e471e51d..55278c6acd1 100644 --- a/CVE-2022/CVE-2022-230xx/CVE-2022-23096.json +++ b/CVE-2022/CVE-2022-230xx/CVE-2022-23096.json @@ -2,8 +2,8 @@ "id": "CVE-2022-23096", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-28T16:15:07.897", - "lastModified": "2022-09-29T16:01:27.237", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-31T08:15:07.387", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -130,6 +130,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202310-21", + "source": "cve@mitre.org" + }, { "url": "https://www.debian.org/security/2022/dsa-5231", "source": "cve@mitre.org", diff --git a/CVE-2022/CVE-2022-230xx/CVE-2022-23097.json b/CVE-2022/CVE-2022-230xx/CVE-2022-23097.json index 7b5ced12c01..c1bdaa7bf08 100644 --- a/CVE-2022/CVE-2022-230xx/CVE-2022-23097.json +++ b/CVE-2022/CVE-2022-230xx/CVE-2022-23097.json @@ -2,8 +2,8 @@ "id": "CVE-2022-23097", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-28T16:15:07.943", - "lastModified": "2022-09-29T16:01:35.120", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-31T08:15:07.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -130,6 +130,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202310-21", + "source": "cve@mitre.org" + }, { "url": "https://www.debian.org/security/2022/dsa-5231", "source": "cve@mitre.org", diff --git a/CVE-2022/CVE-2022-230xx/CVE-2022-23098.json b/CVE-2022/CVE-2022-230xx/CVE-2022-23098.json index e5148399ab3..f83a0cc0962 100644 --- a/CVE-2022/CVE-2022-230xx/CVE-2022-23098.json +++ b/CVE-2022/CVE-2022-230xx/CVE-2022-23098.json @@ -2,8 +2,8 @@ "id": "CVE-2022-23098", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-28T16:15:07.990", - "lastModified": "2022-09-29T16:01:41.670", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-31T08:15:07.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -130,6 +130,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202310-21", + "source": "cve@mitre.org" + }, { "url": "https://www.debian.org/security/2022/dsa-5231", "source": "cve@mitre.org", diff --git a/CVE-2022/CVE-2022-322xx/CVE-2022-32292.json b/CVE-2022/CVE-2022-322xx/CVE-2022-32292.json index 58ea30458a8..3a54f25a443 100644 --- a/CVE-2022/CVE-2022-322xx/CVE-2022-32292.json +++ b/CVE-2022/CVE-2022-322xx/CVE-2022-32292.json @@ -2,8 +2,8 @@ "id": "CVE-2022-32292", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-03T14:15:08.620", - "lastModified": "2022-09-29T16:01:47.967", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-31T08:15:07.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202310-21", + "source": "cve@mitre.org" + }, { "url": "https://www.debian.org/security/2022/dsa-5231", "source": "cve@mitre.org", diff --git a/CVE-2022/CVE-2022-322xx/CVE-2022-32293.json b/CVE-2022/CVE-2022-322xx/CVE-2022-32293.json index 504e64c83c1..c431a955176 100644 --- a/CVE-2022/CVE-2022-322xx/CVE-2022-32293.json +++ b/CVE-2022/CVE-2022-322xx/CVE-2022-32293.json @@ -2,8 +2,8 @@ "id": "CVE-2022-32293", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-03T14:15:08.667", - "lastModified": "2022-09-29T16:01:52.190", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-31T08:15:07.717", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -110,6 +110,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202310-21", + "source": "cve@mitre.org" + }, { "url": "https://www.debian.org/security/2022/dsa-5231", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36478.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36478.json index bb8405bc23d..9903798085b 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36478.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36478.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36478", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-10T17:15:11.737", - "lastModified": "2023-10-30T22:15:10.153", + "lastModified": "2023-10-31T07:15:09.947", "vulnStatus": "Modified", "descriptions": [ { @@ -188,6 +188,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html", "source": "security-advisories@github.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5540", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json index 85a2c728401..84b98e683f3 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json @@ -2,7 +2,7 @@ "id": "CVE-2023-44487", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-10T14:15:10.883", - "lastModified": "2023-10-30T22:15:10.370", + "lastModified": "2023-10-31T07:15:10.257", "vulnStatus": "Undergoing Analysis", "cisaExploitAdd": "2023-10-10", "cisaActionDue": "2023-10-31", @@ -2734,6 +2734,10 @@ "Vendor Advisory" ] }, + { + "url": "https://www.debian.org/security/2023/dsa-5540", + "source": "cve@mitre.org" + }, { "url": "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46210.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46210.json new file mode 100644 index 00000000000..35d7da95a61 --- /dev/null +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46210.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-46210", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-10-31T08:15:07.803", + "lastModified": "2023-10-31T08:15:07.803", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WebCource WC Captcha plugin <=\u00a01.4 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wc-captcha/wordpress-wc-captcha-plugin-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46234.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46234.json index 5963d2479f4..d1d0e6f5ba8 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46234.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46234.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46234", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-26T15:15:09.087", - "lastModified": "2023-10-29T07:15:38.860", + "lastModified": "2023-10-31T07:15:10.883", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -62,6 +62,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00040.html", "source": "security-advisories@github.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5539", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46451.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46451.json new file mode 100644 index 00000000000..02f7b10522e --- /dev/null +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46451.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46451", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-31T07:15:11.020", + "lastModified": "2023-10-31T07:15:11.020", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Best Courier Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in the change username field." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/sajaljat/CVE-2023-46451", + "source": "cve@mitre.org" + }, + { + "url": "https://youtu.be/f8B3_m5YfqI", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3d17f03a332..ec7362a2790 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-10-31T07:00:27.802251+00:00 +2023-10-31T09:00:27.211539+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-10-31T06:15:08.900000+00:00 +2023-10-31T08:15:07.803000+00:00 ``` ### Last Data Feed Release @@ -29,23 +29,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -229316 +229318 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `2` -* [CVE-2023-36263](CVE-2023/CVE-2023-362xx/CVE-2023-36263.json) (`2023-10-31T05:15:58.220`) -* [CVE-2023-43139](CVE-2023/CVE-2023-431xx/CVE-2023-43139.json) (`2023-10-31T05:15:58.353`) -* [CVE-2023-45996](CVE-2023/CVE-2023-459xx/CVE-2023-45996.json) (`2023-10-31T06:15:07.883`) -* [CVE-2023-46361](CVE-2023/CVE-2023-463xx/CVE-2023-46361.json) (`2023-10-31T06:15:08.900`) +* [CVE-2023-46451](CVE-2023/CVE-2023-464xx/CVE-2023-46451.json) (`2023-10-31T07:15:11.020`) +* [CVE-2023-46210](CVE-2023/CVE-2023-462xx/CVE-2023-46210.json) (`2023-10-31T08:15:07.803`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `8` +* [CVE-2022-23096](CVE-2022/CVE-2022-230xx/CVE-2022-23096.json) (`2023-10-31T08:15:07.387`) +* [CVE-2022-23097](CVE-2022/CVE-2022-230xx/CVE-2022-23097.json) (`2023-10-31T08:15:07.503`) +* [CVE-2022-23098](CVE-2022/CVE-2022-230xx/CVE-2022-23098.json) (`2023-10-31T08:15:07.567`) +* [CVE-2022-32292](CVE-2022/CVE-2022-322xx/CVE-2022-32292.json) (`2023-10-31T08:15:07.643`) +* [CVE-2022-32293](CVE-2022/CVE-2022-322xx/CVE-2022-32293.json) (`2023-10-31T08:15:07.717`) +* [CVE-2023-36478](CVE-2023/CVE-2023-364xx/CVE-2023-36478.json) (`2023-10-31T07:15:09.947`) +* [CVE-2023-44487](CVE-2023/CVE-2023-444xx/CVE-2023-44487.json) (`2023-10-31T07:15:10.257`) +* [CVE-2023-46234](CVE-2023/CVE-2023-462xx/CVE-2023-46234.json) (`2023-10-31T07:15:10.883`) ## Download and Usage