From c8b4b256ae97a8dd88eeca5cb84f9024dac16b32 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 28 Jun 2023 10:00:44 +0000 Subject: [PATCH] Auto-Update: 2023-06-28T10:00:40.613967+00:00 --- CVE-2023/CVE-2023-30xx/CVE-2023-3034.json | 59 +++++++++++++++++++++++ README.md | 36 +++----------- 2 files changed, 65 insertions(+), 30 deletions(-) create mode 100644 CVE-2023/CVE-2023-30xx/CVE-2023-3034.json diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3034.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3034.json new file mode 100644 index 00000000000..503b8367a22 --- /dev/null +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3034.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-3034", + "sourceIdentifier": "vulnerability@ncsc.ch", + "published": "2023-06-28T09:15:09.677", + "lastModified": "2023-06-28T09:15:09.677", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Reflected XSS affects the \u2018mode\u2019 parameter in the /admin functionality of the web application in versions <=2.0.44" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://igs.bkg.bund.de/ntrip/bkgcaster", + "source": "vulnerability@ncsc.ch" + }, + { + "url": "https://igs.bkg.bund.de/root_ftp/NTRIP/software/NTRIPCASTER_CHANGELOG", + "source": "vulnerability@ncsc.ch" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index fcf915675bd..25e1dafd6b0 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-28T08:00:36.229282+00:00 +2023-06-28T10:00:40.613967+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-28T07:25:40.307000+00:00 +2023-06-28T09:15:09.677000+00:00 ``` ### Last Data Feed Release @@ -29,44 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -218708 +218709 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `1` +* [CVE-2023-3034](CVE-2023/CVE-2023-30xx/CVE-2023-3034.json) (`2023-06-28T09:15:09.677`) ### CVEs modified in the last Commit -Recently modified CVEs: `41` +Recently modified CVEs: `0` -* [CVE-2023-28778](CVE-2023/CVE-2023-287xx/CVE-2023-28778.json) (`2023-06-28T07:15:23.860`) -* [CVE-2023-28784](CVE-2023/CVE-2023-287xx/CVE-2023-28784.json) (`2023-06-28T07:16:11.527`) -* [CVE-2023-35917](CVE-2023/CVE-2023-359xx/CVE-2023-35917.json) (`2023-06-28T07:16:55.887`) -* [CVE-2023-35918](CVE-2023/CVE-2023-359xx/CVE-2023-35918.json) (`2023-06-28T07:17:03.563`) -* [CVE-2023-28418](CVE-2023/CVE-2023-284xx/CVE-2023-28418.json) (`2023-06-28T07:17:45.580`) -* [CVE-2023-32239](CVE-2023/CVE-2023-322xx/CVE-2023-32239.json) (`2023-06-28T07:18:19.947`) -* [CVE-2023-32960](CVE-2023/CVE-2023-329xx/CVE-2023-32960.json) (`2023-06-28T07:19:11.510`) -* [CVE-2023-33997](CVE-2023/CVE-2023-339xx/CVE-2023-33997.json) (`2023-06-28T07:21:19.443`) -* [CVE-2023-34006](CVE-2023/CVE-2023-340xx/CVE-2023-34006.json) (`2023-06-28T07:21:30.410`) -* [CVE-2023-34368](CVE-2023/CVE-2023-343xx/CVE-2023-34368.json) (`2023-06-28T07:21:41.953`) -* [CVE-2023-34028](CVE-2023/CVE-2023-340xx/CVE-2023-34028.json) (`2023-06-28T07:21:57.463`) -* [CVE-2023-34170](CVE-2023/CVE-2023-341xx/CVE-2023-34170.json) (`2023-06-28T07:22:07.830`) -* [CVE-2023-36093](CVE-2023/CVE-2023-360xx/CVE-2023-36093.json) (`2023-06-28T07:22:21.237`) -* [CVE-2023-36097](CVE-2023/CVE-2023-360xx/CVE-2023-36097.json) (`2023-06-28T07:22:39.250`) -* [CVE-2023-2611](CVE-2023/CVE-2023-26xx/CVE-2023-2611.json) (`2023-06-28T07:22:51.667`) -* [CVE-2023-3256](CVE-2023/CVE-2023-32xx/CVE-2023-3256.json) (`2023-06-28T07:23:02.007`) -* [CVE-2023-3381](CVE-2023/CVE-2023-33xx/CVE-2023-3381.json) (`2023-06-28T07:23:42.907`) -* [CVE-2023-3382](CVE-2023/CVE-2023-33xx/CVE-2023-3382.json) (`2023-06-28T07:24:08.697`) -* [CVE-2023-3383](CVE-2023/CVE-2023-33xx/CVE-2023-3383.json) (`2023-06-28T07:24:15.353`) -* [CVE-2023-34021](CVE-2023/CVE-2023-340xx/CVE-2023-34021.json) (`2023-06-28T07:24:29.103`) -* [CVE-2023-35048](CVE-2023/CVE-2023-350xx/CVE-2023-35048.json) (`2023-06-28T07:24:45.533`) -* [CVE-2023-27427](CVE-2023/CVE-2023-274xx/CVE-2023-27427.json) (`2023-06-28T07:25:17.500`) -* [CVE-2023-28751](CVE-2023/CVE-2023-287xx/CVE-2023-28751.json) (`2023-06-28T07:25:21.983`) -* [CVE-2023-29100](CVE-2023/CVE-2023-291xx/CVE-2023-29100.json) (`2023-06-28T07:25:31.310`) -* [CVE-2023-32580](CVE-2023/CVE-2023-325xx/CVE-2023-32580.json) (`2023-06-28T07:25:40.307`) ## Download and Usage