mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2023-05-02T06:00:23.783014+00:00
This commit is contained in:
parent
d90903b18d
commit
c7b8e2c5af
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-28005",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-05-06T15:15:08.787",
|
||||
"lastModified": "2022-05-18T14:06:50.950",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-02T04:15:46.873",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the 3CX Phone System Management Console prior to version 18 Update 3 FINAL. An unauthenticated attacker could abuse improperly secured access to arbitrary files on the server, leading to cleartext credential disclosure. Afterwards, the authenticated attacker is able to upload a file that overwrites a 3CX service binary, leading to Remote Code Execution as NT AUTHORITY\\SYSTEM on Windows installations. Versions prior to version 18, Hotfix 1 Build 18.0.3.461 March 2022, are prone to an additional unauthenticated file system access to C:\\Windows\\System32."
|
||||
"value": "An issue was discovered in the 3CX Phone System Management Console prior to version 18 Update 3 FINAL. An unauthenticated attacker could abuse improperly secured access to arbitrary files on the server (via /Electron/download directory traversal in conjunction with a path component that uses backslash characters), leading to cleartext credential disclosure. Afterwards, the authenticated attacker is able to upload a file that overwrites a 3CX service binary, leading to Remote Code Execution as NT AUTHORITY\\SYSTEM on Windows installations. NOTE: this issue exists because of an incomplete fix for CVE-2022-48482."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -94,6 +94,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.3cx.com/blog/change-log/phone-system-change-log/",
|
||||
"source": "cve@mitre.org",
|
||||
|
24
CVE-2022/CVE-2022-484xx/CVE-2022-48482.json
Normal file
24
CVE-2022/CVE-2022-484xx/CVE-2022-48482.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2022-48482",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T05:15:27.407",
|
||||
"lastModified": "2023-05-02T05:15:27.407",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "3CX before 18 Update 2 Security Hotfix build 18.0.2.315 on Windows allows unauthenticated remote attackers to read certain files via /Electron/download directory traversal. Files may have credentials, full backups, call recordings, and chat logs."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.3cx.com/blog/change-log/phone-system-change-log/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2022/CVE-2022-484xx/CVE-2022-48483.json
Normal file
24
CVE-2022/CVE-2022-484xx/CVE-2022-48483.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2022-48483",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T05:15:28.057",
|
||||
"lastModified": "2023-05-02T05:15:28.057",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "3CX before 18 Hotfix 1 build 18.0.3.461 on Windows allows unauthenticated remote attackers to read %WINDIR%\\system32 files via /Electron/download directory traversal in conjunction with a path component that has a drive letter and uses backslash characters. NOTE: this issue exists because of an incomplete fix for CVE-2022-28005."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.3cx.com/blog/change-log/phone-system-change-log/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-22xx/CVE-2023-2247.json
Normal file
20
CVE-2023/CVE-2023-22xx/CVE-2023-2247.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-2247",
|
||||
"sourceIdentifier": "security@octopus.com",
|
||||
"published": "2023-05-02T05:15:28.113",
|
||||
"lastModified": "2023-05-02T05:15:28.113",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In affected versions of Octopus Deploy it is possible to unmask variable secrets using the variable preview function"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisories.octopus.com/post/2023/sa2023-07/",
|
||||
"source": "security@octopus.com"
|
||||
}
|
||||
]
|
||||
}
|
24
README.md
24
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-05-02T04:00:24.870613+00:00
|
||||
2023-05-02T06:00:23.783014+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-05-02T03:15:08.717000+00:00
|
||||
2023-05-02T05:15:28.113000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,29 +29,23 @@ Download and Changelog: [Click](releases/latest)
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
213878
|
||||
213881
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* [CVE-2013-10026](CVE-2013/CVE-2013-100xx/CVE-2013-10026.json) (`2023-05-02T02:15:27.267`)
|
||||
* [CVE-2014-125100](CVE-2014/CVE-2014-1251xx/CVE-2014-125100.json) (`2023-05-02T02:15:27.423`)
|
||||
* [CVE-2022-48482](CVE-2022/CVE-2022-484xx/CVE-2022-48482.json) (`2023-05-02T05:15:27.407`)
|
||||
* [CVE-2022-48483](CVE-2022/CVE-2022-484xx/CVE-2022-48483.json) (`2023-05-02T05:15:28.057`)
|
||||
* [CVE-2023-2247](CVE-2023/CVE-2023-22xx/CVE-2023-2247.json) (`2023-05-02T05:15:28.113`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `8`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
* [CVE-2023-2004](CVE-2023/CVE-2023-20xx/CVE-2023-2004.json) (`2023-05-02T03:15:08.203`)
|
||||
* [CVE-2023-2033](CVE-2023/CVE-2023-20xx/CVE-2023-2033.json) (`2023-05-02T03:15:08.350`)
|
||||
* [CVE-2023-2133](CVE-2023/CVE-2023-21xx/CVE-2023-2133.json) (`2023-05-02T03:15:08.423`)
|
||||
* [CVE-2023-2134](CVE-2023/CVE-2023-21xx/CVE-2023-2134.json) (`2023-05-02T03:15:08.497`)
|
||||
* [CVE-2023-2135](CVE-2023/CVE-2023-21xx/CVE-2023-2135.json) (`2023-05-02T03:15:08.573`)
|
||||
* [CVE-2023-2136](CVE-2023/CVE-2023-21xx/CVE-2023-2136.json) (`2023-05-02T03:15:08.647`)
|
||||
* [CVE-2023-2137](CVE-2023/CVE-2023-21xx/CVE-2023-2137.json) (`2023-05-02T03:15:08.717`)
|
||||
* [CVE-2023-27495](CVE-2023/CVE-2023-274xx/CVE-2023-27495.json) (`2023-05-02T02:07:27.720`)
|
||||
* [CVE-2022-28005](CVE-2022/CVE-2022-280xx/CVE-2022-28005.json) (`2023-05-02T04:15:46.873`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user