Auto-Update: 2023-08-07T18:00:33.387996+00:00

This commit is contained in:
cad-safe-bot 2023-08-07 18:00:36 +00:00
parent dd39b8b158
commit c6ef69cc42
23 changed files with 953 additions and 121 deletions

View File

@ -2,27 +2,89 @@
"id": "CVE-2021-45094",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-20T18:15:11.463",
"lastModified": "2023-07-21T12:52:36.740",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-07T16:09:24.243",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Imprivata Privileged Access Management (formally Xton Privileged Access Management) 2.3.202112051108 allows XSS."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:okta:imprivata_privileged_access_management:2.3.202112051108:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA76AA1-4C12-4915-9F13-8C91F941DFE7"
}
]
}
]
}
],
"references": [
{
"url": "https://aegis9.com.au/blog/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.aegis9.com.au/blog/5/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.imprivata.com/privileged-access-management",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-40609",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-08-02T15:15:09.833",
"lastModified": "2023-08-02T16:55:04.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-07T16:10:23.630",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -46,14 +76,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:sdk:*:*:*:*:java_technology:*:*:*",
"versionEndExcluding": "7.1.5.19",
"matchCriteriaId": "3DB46437-1714-4E42-A63F-CA2415164CE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:sdk:*:*:*:*:java_technology:*:*:*",
"versionStartIncluding": "8.0",
"versionEndExcluding": "8.0.8.5",
"matchCriteriaId": "59973F35-EB35-4E62-A91A-1D6D0E2693EB"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/236069",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7017032",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2022-46484",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-02T15:15:09.973",
"lastModified": "2023-08-02T16:55:04.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-07T16:07:43.303",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Information disclosure in password protected surveys in Data Illusion Survey Software Solutions NGSurvey v2.4.28 and below allows attackers to view the password to access and arbitrarily submit surveys."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ngsurvey:ngsurvey:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.4.28",
"matchCriteriaId": "5B523C38-FA49-4FE3-B3F3-DDB7D01A8B65"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/WodenSec/CVE-2022-46484",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2022-46485",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-02T14:15:10.257",
"lastModified": "2023-08-02T16:55:04.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-07T17:59:03.077",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Data Illusion Survey Software Solutions ngSurvey version 2.4.28 and below is vulnerable to Denial of Service if a survey contains a \"Text Field\", \"Comment Field\" or \"Contact Details\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ngsurvey:ngsurvey:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.4.28",
"matchCriteriaId": "5B523C38-FA49-4FE3-B3F3-DDB7D01A8B65"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/WodenSec/CVE-2022-46485",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23476",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-08-02T15:15:10.050",
"lastModified": "2023-08-02T16:55:04.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-07T16:06:10.930",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -46,14 +76,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:robotic_process_automation:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.0.0",
"versionEndExcluding": "23.0.0",
"matchCriteriaId": "E4FAAA39-F0A2-4DAA-9919-29F8BC7D0427"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:robotic_process_automation_for_cloud_pak:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.0.0",
"versionEndExcluding": "23.0.0",
"matchCriteriaId": "7980F667-DE5A-43B0-8125-BB5EFF3B265F"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/245425",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7017490",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-23757",
"sourceIdentifier": "security@joomla.org",
"published": "2023-08-07T17:15:09.917",
"lastModified": "2023-08-07T17:15:09.917",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability allows SQL Injection."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/ba-gallery/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-23758",
"sourceIdentifier": "security@joomla.org",
"published": "2023-08-07T17:15:10.247",
"lastModified": "2023-08-07T17:15:10.247",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability allows SQL Injection."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/creative-gallery/",
"source": "security@joomla.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25835",
"sourceIdentifier": "psirt@esri.com",
"published": "2023-07-21T00:15:10.343",
"lastModified": "2023-08-03T17:15:11.777",
"lastModified": "2023-08-07T17:15:10.447",
"vulnStatus": "Modified",
"descriptions": [
{
@ -17,20 +17,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",

View File

@ -2,18 +2,18 @@
"id": "CVE-2023-25837",
"sourceIdentifier": "psirt@esri.com",
"published": "2023-07-21T04:15:12.377",
"lastModified": "2023-08-04T17:21:43.527",
"vulnStatus": "Analyzed",
"lastModified": "2023-08-07T17:15:10.777",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "\nThere is a Cross-site Scripting vulnerability\u00a0in Esri Portal Sites in versions 10.8.1 \u2013 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are high.\n\n\n\n"
"value": "\nThere is a Cross-site Scripting vulnerability\u00a0in Esri Portal Sites in versions 10.8.1 \u2013 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are high.\u00a0 No security boundary can be crossed scope is unchanged, If an admin account fell victim to this attack Confidentiality, Integrity and Availability are all High.\u00a0\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "psirt@esri.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -33,24 +33,24 @@
"impactScore": 2.7
},
{
"source": "psirt@esri.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-26317",
"sourceIdentifier": "security@xiaomi.com",
"published": "2023-08-02T14:15:10.407",
"lastModified": "2023-08-02T16:55:04.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-07T16:18:22.053",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been discovered in Xiaomi routers that could allow command injection through an external interface. This vulnerability arises from inadequate filtering of responses returned from the external interface. Attackers could exploit this vulnerability by hijacking the ISP or an upper-layer router to gain privileges on the Xiaomi router. Successful exploitation of this flaw could permit remote code execution and complete compromise of the device."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mi:xiaomi_router_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.2",
"matchCriteriaId": "F5410022-F5AD-4ACA-AA62-B59F6B53E6B6"
}
]
}
]
}
],
"references": [
{
"url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=529",
"source": "security@xiaomi.com"
"source": "security@xiaomi.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26450",
"sourceIdentifier": "security@open-xchange.com",
"published": "2023-08-02T13:15:11.160",
"lastModified": "2023-08-03T16:15:11.527",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-07T16:42:30.740",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@open-xchange.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@open-xchange.com",
"type": "Secondary",
@ -46,22 +76,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.10.6",
"matchCriteriaId": "F5BFE39F-1E92-41CA-BF2B-D917F09FC31C"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Aug/8",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0003.json",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26451",
"sourceIdentifier": "security@open-xchange.com",
"published": "2023-08-02T13:15:11.233",
"lastModified": "2023-08-03T16:15:11.613",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-07T17:00:05.820",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security@open-xchange.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-330"
}
]
},
{
"source": "security@open-xchange.com",
"type": "Secondary",
@ -46,22 +76,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.11.0",
"matchCriteriaId": "B1B6931A-ADAF-4EBD-B483-0CF4D816304E"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Aug/8",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0003.json",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2609",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-09T18:15:14.147",
"lastModified": "2023-05-24T05:15:09.897",
"vulnStatus": "Modified",
"lastModified": "2023-08-07T17:11:17.023",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,20 +17,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
"impactScore": 3.6
}
],
"cvssMetricV30": [
@ -58,7 +58,7 @@
},
"weaknesses": [
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -66,6 +66,16 @@
"value": "CWE-476"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
@ -84,6 +94,21 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
}
]
}
]
}
],
"references": [
@ -104,7 +129,11 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2850",
"sourceIdentifier": "report@snyk.io",
"published": "2023-07-25T12:15:10.837",
"lastModified": "2023-07-25T13:00:59.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-07T16:58:57.517",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "report@snyk.io",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
},
{
"source": "report@snyk.io",
"type": "Secondary",
@ -46,18 +76,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nodebb:nodebb:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.8.13",
"matchCriteriaId": "8F25C5F7-B985-40D3-AD78-46E8264A4D7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nodebb:nodebb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.1.3",
"matchCriteriaId": "2E60CBF3-000A-4CFE-AB1F-F1CC25A650DB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/NodeBB/NodeBB/commit/51096ad2345fb1d1380bec0a447113489ef6c359",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/NodeBB/NodeBB/releases/tag/v3.1.3",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/NodeBB/NodeBB/security/advisories/GHSA-4qcv-qf38-5j3j",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31430",
"sourceIdentifier": "sirt@brocade.com",
"published": "2023-08-02T00:15:17.187",
"lastModified": "2023-08-02T13:30:34.587",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-07T17:10:14.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "sirt@brocade.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
},
{
"source": "sirt@brocade.com",
"type": "Secondary",
@ -46,10 +76,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:brocade_fabric_operating_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.1.1c",
"matchCriteriaId": "04156705-D7B0-4819-9877-1896AE211A87"
}
]
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22381",
"source": "sirt@brocade.com"
"source": "sirt@brocade.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-3117",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-30T22:15:10.127",
"lastModified": "2023-08-01T14:15:11.253",
"lastModified": "2023-08-07T17:15:13.050",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CVE RECORD. \u00a0ConsultIDs: CVE-2023-3390. \u00a0Reason: This record is a duplicate of CVE-2023-3390. \u00a0Notes: All CVE users should reference CVE-2023-3390 instead of this record. \u00a0All references and descriptions in this record have been removed to prevent accidental usage."
"value": "** REJECT ** Duplicate of CVE-2023-3390."
}
],
"metrics": {},

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-32783",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-07T17:15:11.080",
"lastModified": "2023-08-07T17:15:11.080",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The event analysis component in Zoho ManageEngine ADAudit Plus 7.1.1 allows an attacker to bypass audit detection by creating or renaming user accounts with a \"$\" symbol suffix."
}
],
"metrics": {},
"references": [
{
"url": "https://www.peteslade.com/post/manageengine-adauditplus-cve-2023-32783",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-34476",
"sourceIdentifier": "security@joomla.org",
"published": "2023-08-07T17:15:11.293",
"lastModified": "2023-08-07T17:15:11.293",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability allows SQL Injection."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/proforms-basic/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-34477",
"sourceIdentifier": "security@joomla.org",
"published": "2023-08-07T17:15:11.520",
"lastModified": "2023-08-07T17:15:11.520",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability allows SQL Injection."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/online-virtual-classroom/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-38044",
"sourceIdentifier": "security@joomla.org",
"published": "2023-08-07T17:15:11.737",
"lastModified": "2023-08-07T17:15:11.737",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability allows SQL Injection."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/vulnerable-extensions/resolved/hikashop-versions-from-4-4-1-to-4-7-2-are-affected-sql-injection/",
"source": "security@joomla.org"
},
{
"url": "https://www.hikashop.com/support/documentation/56-hikashop-changelog.html",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-38045",
"sourceIdentifier": "security@joomla.org",
"published": "2023-08-07T17:15:11.930",
"lastModified": "2023-08-07T17:15:11.930",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in advcomsys.com oneVote component for Joomla. It allows XSS Targeting Non-Script Elements."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/admiror-gallery/",
"source": "security@joomla.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38559",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-01T17:15:09.890",
"lastModified": "2023-08-04T17:21:05.113",
"vulnStatus": "Analyzed",
"lastModified": "2023-08-07T16:15:10.327",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -133,6 +133,10 @@
"Mailing List",
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00006.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-07T16:00:26.915008+00:00
2023-08-07T18:00:33.387996+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-07T15:59:57.820000+00:00
2023-08-07T17:59:03.077000+00:00
```
### Last Data Feed Release
@ -29,54 +29,41 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
221809
221816
```
### CVEs added in the last Commit
Recently added CVEs: `15`
Recently added CVEs: `7`
* [CVE-2021-24916](CVE-2021/CVE-2021-249xx/CVE-2021-24916.json) (`2023-08-07T15:15:10.447`)
* [CVE-2022-38795](CVE-2022/CVE-2022-387xx/CVE-2022-38795.json) (`2023-08-07T14:15:10.883`)
* [CVE-2023-36220](CVE-2023/CVE-2023-362xx/CVE-2023-36220.json) (`2023-08-07T14:15:11.233`)
* [CVE-2023-4147](CVE-2023/CVE-2023-41xx/CVE-2023-4147.json) (`2023-08-07T14:15:11.633`)
* [CVE-2023-4194](CVE-2023/CVE-2023-41xx/CVE-2023-4194.json) (`2023-08-07T14:15:11.743`)
* [CVE-2023-4205](CVE-2023/CVE-2023-42xx/CVE-2023-4205.json) (`2023-08-07T14:15:11.837`)
* [CVE-2023-0604](CVE-2023/CVE-2023-06xx/CVE-2023-0604.json) (`2023-08-07T15:15:10.797`)
* [CVE-2023-27373](CVE-2023/CVE-2023-273xx/CVE-2023-27373.json) (`2023-08-07T15:15:10.893`)
* [CVE-2023-2843](CVE-2023/CVE-2023-28xx/CVE-2023-2843.json) (`2023-08-07T15:15:10.977`)
* [CVE-2023-3365](CVE-2023/CVE-2023-33xx/CVE-2023-3365.json) (`2023-08-07T15:15:11.193`)
* [CVE-2023-3492](CVE-2023/CVE-2023-34xx/CVE-2023-3492.json) (`2023-08-07T15:15:11.280`)
* [CVE-2023-3524](CVE-2023/CVE-2023-35xx/CVE-2023-3524.json) (`2023-08-07T15:15:11.367`)
* [CVE-2023-3575](CVE-2023/CVE-2023-35xx/CVE-2023-3575.json) (`2023-08-07T15:15:11.460`)
* [CVE-2023-3650](CVE-2023/CVE-2023-36xx/CVE-2023-3650.json) (`2023-08-07T15:15:11.547`)
* [CVE-2023-3671](CVE-2023/CVE-2023-36xx/CVE-2023-3671.json) (`2023-08-07T15:15:11.633`)
* [CVE-2023-23757](CVE-2023/CVE-2023-237xx/CVE-2023-23757.json) (`2023-08-07T17:15:09.917`)
* [CVE-2023-23758](CVE-2023/CVE-2023-237xx/CVE-2023-23758.json) (`2023-08-07T17:15:10.247`)
* [CVE-2023-32783](CVE-2023/CVE-2023-327xx/CVE-2023-32783.json) (`2023-08-07T17:15:11.080`)
* [CVE-2023-34476](CVE-2023/CVE-2023-344xx/CVE-2023-34476.json) (`2023-08-07T17:15:11.293`)
* [CVE-2023-34477](CVE-2023/CVE-2023-344xx/CVE-2023-34477.json) (`2023-08-07T17:15:11.520`)
* [CVE-2023-38044](CVE-2023/CVE-2023-380xx/CVE-2023-38044.json) (`2023-08-07T17:15:11.737`)
* [CVE-2023-38045](CVE-2023/CVE-2023-380xx/CVE-2023-38045.json) (`2023-08-07T17:15:11.930`)
### CVEs modified in the last Commit
Recently modified CVEs: `20`
Recently modified CVEs: `15`
* [CVE-2023-30146](CVE-2023/CVE-2023-301xx/CVE-2023-30146.json) (`2023-08-07T14:15:11.147`)
* [CVE-2023-4052](CVE-2023/CVE-2023-40xx/CVE-2023-4052.json) (`2023-08-07T14:15:11.350`)
* [CVE-2023-4057](CVE-2023/CVE-2023-40xx/CVE-2023-4057.json) (`2023-08-07T14:15:11.547`)
* [CVE-2023-4045](CVE-2023/CVE-2023-40xx/CVE-2023-4045.json) (`2023-08-07T14:16:47.613`)
* [CVE-2023-4046](CVE-2023/CVE-2023-40xx/CVE-2023-4046.json) (`2023-08-07T14:23:52.447`)
* [CVE-2023-4047](CVE-2023/CVE-2023-40xx/CVE-2023-4047.json) (`2023-08-07T14:26:37.237`)
* [CVE-2023-4049](CVE-2023/CVE-2023-40xx/CVE-2023-4049.json) (`2023-08-07T14:37:41.713`)
* [CVE-2023-4050](CVE-2023/CVE-2023-40xx/CVE-2023-4050.json) (`2023-08-07T14:44:58.690`)
* [CVE-2023-4054](CVE-2023/CVE-2023-40xx/CVE-2023-4054.json) (`2023-08-07T14:51:09.667`)
* [CVE-2023-4055](CVE-2023/CVE-2023-40xx/CVE-2023-4055.json) (`2023-08-07T14:58:58.993`)
* [CVE-2023-31431](CVE-2023/CVE-2023-314xx/CVE-2023-31431.json) (`2023-08-07T15:01:09.530`)
* [CVE-2023-31928](CVE-2023/CVE-2023-319xx/CVE-2023-31928.json) (`2023-08-07T15:03:59.797`)
* [CVE-2023-36480](CVE-2023/CVE-2023-364xx/CVE-2023-36480.json) (`2023-08-07T15:15:11.070`)
* [CVE-2023-3107](CVE-2023/CVE-2023-31xx/CVE-2023-3107.json) (`2023-08-07T15:24:41.907`)
* [CVE-2023-31926](CVE-2023/CVE-2023-319xx/CVE-2023-31926.json) (`2023-08-07T15:26:49.177`)
* [CVE-2023-31927](CVE-2023/CVE-2023-319xx/CVE-2023-31927.json) (`2023-08-07T15:31:38.703`)
* [CVE-2023-38392](CVE-2023/CVE-2023-383xx/CVE-2023-38392.json) (`2023-08-07T15:41:35.637`)
* [CVE-2023-3896](CVE-2023/CVE-2023-38xx/CVE-2023-3896.json) (`2023-08-07T15:41:35.637`)
* [CVE-2023-26448](CVE-2023/CVE-2023-264xx/CVE-2023-26448.json) (`2023-08-07T15:43:37.967`)
* [CVE-2023-26449](CVE-2023/CVE-2023-264xx/CVE-2023-26449.json) (`2023-08-07T15:59:57.820`)
* [CVE-2021-45094](CVE-2021/CVE-2021-450xx/CVE-2021-45094.json) (`2023-08-07T16:09:24.243`)
* [CVE-2022-46484](CVE-2022/CVE-2022-464xx/CVE-2022-46484.json) (`2023-08-07T16:07:43.303`)
* [CVE-2022-40609](CVE-2022/CVE-2022-406xx/CVE-2022-40609.json) (`2023-08-07T16:10:23.630`)
* [CVE-2022-46485](CVE-2022/CVE-2022-464xx/CVE-2022-46485.json) (`2023-08-07T17:59:03.077`)
* [CVE-2023-23476](CVE-2023/CVE-2023-234xx/CVE-2023-23476.json) (`2023-08-07T16:06:10.930`)
* [CVE-2023-38559](CVE-2023/CVE-2023-385xx/CVE-2023-38559.json) (`2023-08-07T16:15:10.327`)
* [CVE-2023-26317](CVE-2023/CVE-2023-263xx/CVE-2023-26317.json) (`2023-08-07T16:18:22.053`)
* [CVE-2023-26450](CVE-2023/CVE-2023-264xx/CVE-2023-26450.json) (`2023-08-07T16:42:30.740`)
* [CVE-2023-2850](CVE-2023/CVE-2023-28xx/CVE-2023-2850.json) (`2023-08-07T16:58:57.517`)
* [CVE-2023-26451](CVE-2023/CVE-2023-264xx/CVE-2023-26451.json) (`2023-08-07T17:00:05.820`)
* [CVE-2023-31430](CVE-2023/CVE-2023-314xx/CVE-2023-31430.json) (`2023-08-07T17:10:14.237`)
* [CVE-2023-2609](CVE-2023/CVE-2023-26xx/CVE-2023-2609.json) (`2023-08-07T17:11:17.023`)
* [CVE-2023-25835](CVE-2023/CVE-2023-258xx/CVE-2023-25835.json) (`2023-08-07T17:15:10.447`)
* [CVE-2023-25837](CVE-2023/CVE-2023-258xx/CVE-2023-25837.json) (`2023-08-07T17:15:10.777`)
* [CVE-2023-3117](CVE-2023/CVE-2023-31xx/CVE-2023-3117.json) (`2023-08-07T17:15:13.050`)
## Download and Usage