mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2023-07-31T16:00:27.607746+00:00
This commit is contained in:
parent
278c9ceae5
commit
cc7fb091de
20
CVE-2020/CVE-2020-216xx/CVE-2020-21662.json
Normal file
20
CVE-2020/CVE-2020-216xx/CVE-2020-21662.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-21662",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:09.900",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in yunyecms 2.0.2 allows remote attackers to run arbitrary SQL commands via XFF."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://note.youdao.com/noteshare?id=5c3b984ee36dfd1da690e0b5963926bc",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-218xx/CVE-2020-21881.json
Normal file
20
CVE-2020/CVE-2020-218xx/CVE-2020-21881.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-21881",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:09.957",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Request Forgery (CSRF) vulnerability in admin.php in DuxCMS 2.1 allows remote attackers to modtify application data via article/admin/content/add."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-316xx/CVE-2021-31651.json
Normal file
20
CVE-2021/CVE-2021-316xx/CVE-2021-31651.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-31651",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:10.027",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting (XSS) vulnerability in neofarg-cms 0.2.3 allows remoate attacker to run arbitrary code via the copyright field in copyright settings."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/NeoFrag/NeoFrag/issues/92",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-316xx/CVE-2021-31680.json
Normal file
20
CVE-2021/CVE-2021-316xx/CVE-2021-31680.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-31680",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:10.080",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in yolo 5 allows attackers to execute arbitrary code via crafted yaml file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/1-other-yolov5/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-316xx/CVE-2021-31681.json
Normal file
20
CVE-2021/CVE-2021-316xx/CVE-2021-31681.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-31681",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:10.130",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in yolo 3 allows attackers to execute arbitrary code via crafted yaml file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/1-other-yolov3/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,81 @@
|
||||
"id": "CVE-2021-39425",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-20T20:15:10.093",
|
||||
"lastModified": "2023-07-21T12:52:36.740",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-31T15:11:04.167",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SeedDMS v6.0.15 was discovered to contain an open redirect vulnerability. An attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on crafted links."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:seeddms:seeddms:6.0.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4B5F2138-42C3-4677-AF17-65E89F3A0BE7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/@rohitgautam26/cve-2021-39425-8a336eba34dd",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/11-Client_Side_Testing/04-Testing_for_Client_Side_URL_Redirect",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20593",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-07-24T20:15:10.237",
|
||||
"lastModified": "2023-07-30T21:15:09.810",
|
||||
"lastModified": "2023-07-31T15:15:10.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -72,6 +72,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
|
||||
"source": "psirt@amd.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html",
|
||||
"source": "psirt@amd.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008",
|
||||
"source": "psirt@amd.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25835",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2023-07-21T00:15:10.343",
|
||||
"lastModified": "2023-07-21T12:52:32.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-31T15:10:35.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -13,8 +13,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
|
||||
@ -46,10 +66,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.8.1",
|
||||
"versionEndIncluding": "11.1",
|
||||
"matchCriteriaId": "52CEC629-7368-42D1-9107-AC3937B6DB02"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-enterprise-sites-security-patch-is-now-available/",
|
||||
"source": "psirt@esri.com"
|
||||
"source": "psirt@esri.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25837",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2023-07-21T04:15:12.377",
|
||||
"lastModified": "2023-07-21T12:52:26.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-31T15:10:15.310",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -13,8 +13,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||
@ -46,10 +66,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.8.1",
|
||||
"versionEndIncluding": "10.9",
|
||||
"matchCriteriaId": "BDAAE95E-BBD9-4820-9368-B4F82FFAA585"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-enterprise-sites-security-patch-is-now-available/",
|
||||
"source": "psirt@esri.com"
|
||||
"source": "psirt@esri.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32478",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2023-07-21T06:15:09.910",
|
||||
"lastModified": "2023-07-21T12:52:26.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-31T15:08:44.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:powerstoreos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.5.0.1",
|
||||
"matchCriteriaId": "A18C8D10-9C41-4CA7-AC51-FCD6AE9D191B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000215171/dsa-2023-173-dell-powerstore-family-security-update-for-multiple-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-335xx/CVE-2023-33534.json
Normal file
20
CVE-2023/CVE-2023-335xx/CVE-2023-33534.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-33534",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:10.223",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-Site Request Forgery (CSRF) in Guanzhou Tozed Kangwei Intelligent Technology ZLTS10G software version S10G_3.11.6 allows attackers to takeover user accounts via sending a crafted POST request to /goform/goform_set_cmd_process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://rodelllemit.medium.com/cve-2023-33534-account-takeover-through-csrf-vulnerability-461de6f1b696",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3347",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-20T15:15:11.940",
|
||||
"lastModified": "2023-07-22T03:15:10.167",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-31T15:15:11.023",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -35,6 +35,14 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2023:4325",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2023:4328",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-3347",
|
||||
"source": "secalert@redhat.com"
|
||||
|
24
CVE-2023/CVE-2023-346xx/CVE-2023-34635.json
Normal file
24
CVE-2023/CVE-2023-346xx/CVE-2023-34635.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-34635",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:10.273",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Wifi Soft Unibox Administration 3.0 and 3.1 is vulnerable to SQL Injection. The vulnerability occurs because of not validating or sanitizing the user input in the username field of the login page."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/173669/Wifi-Soft-Unibox-Administration-3.0-3.1-SQL-Injection.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/51610",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-346xx/CVE-2023-34644.json
Normal file
20
CVE-2023/CVE-2023-346xx/CVE-2023-34644.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-34644",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:10.323",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows remote attackers to gain escalated privileges via crafted POST request to /cgi-bin/luci/api/auth."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-348xx/CVE-2023-34842.json
Normal file
24
CVE-2023/CVE-2023-348xx/CVE-2023-34842.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-34842",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:10.373",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Remote Code Execution vulnerability in DedeCMS through 5.7.109 allows remote attackers to run arbitrary code via crafted POST request to /dede/tpl.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://dedecms.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dedecms.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-348xx/CVE-2023-34872.json
Normal file
24
CVE-2023/CVE-2023-348xx/CVE-2023-34872.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-34872",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:10.427",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Outline.cc for Poppler prior to 23.06.0 allows a remote attacker to cause a Denial of Service (DoS) (crash) via a crafted PDF file in OutlineItem::open."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/poppler/poppler/-/commit/591235c8b6c65a2eee88991b9ae73490fd9afdfe",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-357xx/CVE-2023-35791.json
Normal file
43
CVE-2023/CVE-2023-357xx/CVE-2023-35791.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-35791",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T15:15:10.327",
|
||||
"lastModified": "2023-07-31T15:31:16.527",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vound Intella Connect 2.6.0.3 has an Open Redirect vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://excellium-services.com/cert-xlm-advisory/CVE-2023-35791",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-357xx/CVE-2023-35792.json
Normal file
43
CVE-2023/CVE-2023-357xx/CVE-2023-35792.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-35792",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T15:15:10.403",
|
||||
"lastModified": "2023-07-31T15:31:16.527",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vound Intella Connect 2.6.0.3 is vulnerable to stored Cross-site Scripting (XSS)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://excellium-services.com/cert-xlm-advisory/CVE-2023-35792",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35861",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T13:15:09.833",
|
||||
"lastModified": "2023-07-31T13:15:09.833",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
24
CVE-2023/CVE-2023-360xx/CVE-2023-36089.json
Normal file
24
CVE-2023/CVE-2023-360xx/CVE-2023-36089.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-36089",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:10.480",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "** UNSUPPORTED WHEN ASSIGNED ** Authentication Bypass vulnerability in D-Link DIR-645 firmware version 1.03 allows remote attackers to gain escalated privileges via function phpcgi_main in cgibin. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/support",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-360xx/CVE-2023-36090.json
Normal file
24
CVE-2023/CVE-2023-360xx/CVE-2023-36090.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-36090",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:10.533",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "** UNSUPPORTED WHEN ASSIGNED ** Authentication Bypass vulnerability in D-Link DIR-885L FW102b01 allows remote attackers to gain escalated privileges via phpcgi. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/support",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-360xx/CVE-2023-36091.json
Normal file
24
CVE-2023/CVE-2023-360xx/CVE-2023-36091.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-36091",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:10.583",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "** UNSUPPORTED WHEN ASSIGNED ** Authentication Bypass vulnerability in D-Link DIR-895 FW102b07 allows remote attackers to gain escalated privileges via via function phpcgi_main in cgibin. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/support",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-360xx/CVE-2023-36092.json
Normal file
24
CVE-2023/CVE-2023-360xx/CVE-2023-36092.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-36092",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:10.633",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "** UNSUPPORTED WHEN ASSIGNED ** Authentication Bypass vulnerability in D-Link DIR-859 FW105b03 allows remote attackers to gain escalated privileges via via phpcgi_main. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/support",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-36884",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-07-11T19:15:09.623",
|
||||
"lastModified": "2023-07-28T18:22:24.783",
|
||||
"lastModified": "2023-07-31T15:33:35.323",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2023-07-17",
|
||||
"cisaActionDue": "2023-08-07",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37647",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T13:15:09.897",
|
||||
"lastModified": "2023-07-31T13:15:09.897",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-31T14:45:51.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
24
CVE-2023/CVE-2023-383xx/CVE-2023-38303.json
Normal file
24
CVE-2023/CVE-2023-383xx/CVE-2023-38303.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-38303",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T15:15:10.487",
|
||||
"lastModified": "2023-07-31T15:31:16.527",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Webmin 2.021. One can exploit a stored Cross-Site Scripting (XSS) attack to achieve Remote Command Execution (RCE) through the Users and Group's real name parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38303",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://webmin.com/tags/webmin-changelog/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-383xx/CVE-2023-38304.json
Normal file
24
CVE-2023/CVE-2023-383xx/CVE-2023-38304.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-38304",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T15:15:10.547",
|
||||
"lastModified": "2023-07-31T15:31:16.527",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Users and Groups functionality, allowing an attacker to store a malicious payload in the Group Name field when creating a new group."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38304",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://webmin.com/tags/webmin-changelog/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-383xx/CVE-2023-38305.json
Normal file
24
CVE-2023/CVE-2023-383xx/CVE-2023-38305.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-38305",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T15:15:10.607",
|
||||
"lastModified": "2023-07-31T15:31:16.527",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Webmin 2.021. The download functionality allows an attacker to exploit a Cross-Site Scripting (XSS) vulnerability. By providing a crafted download path containing a malicious payload, an attacker can inject arbitrary code, which is then executed within the context of the victim's browser when the download link is accessed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38305",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://webmin.com/tags/webmin-changelog/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-383xx/CVE-2023-38306.json
Normal file
24
CVE-2023/CVE-2023-383xx/CVE-2023-38306.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-38306",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T15:15:10.663",
|
||||
"lastModified": "2023-07-31T15:31:16.527",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Webmin 2.021. A Cross-site Scripting (XSS) Bypass vulnerability was discovered in the file upload functionality. Normally, the application restricts the upload of certain file types such as .svg, .php, etc., and displays an error message if a prohibited file type is detected. However, by following certain steps, an attacker can bypass these restrictions and inject malicious code."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38306",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://webmin.com/tags/webmin-changelog/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-383xx/CVE-2023-38307.json
Normal file
24
CVE-2023/CVE-2023-383xx/CVE-2023-38307.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-38307",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T15:15:10.723",
|
||||
"lastModified": "2023-07-31T15:31:16.527",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Users and Groups functionality. The vulnerability occurs when an authenticated user adds a new user and inserts an XSS payload into the user's real name."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38307",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://webmin.com/tags/webmin-changelog/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-383xx/CVE-2023-38308.json
Normal file
24
CVE-2023/CVE-2023-383xx/CVE-2023-38308.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-38308",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T15:15:10.787",
|
||||
"lastModified": "2023-07-31T15:31:16.527",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Webmin 2.021. A Cross-Site Scripting (XSS) vulnerability was discovered in the HTTP Tunnel functionality when handling third-party domain URLs. By providing a crafted URL from a third-party domain, an attacker can inject malicious code. leading to the execution of arbitrary JavaScript code within the context of the victim's browser."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38308",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://webmin.com/tags/webmin-changelog/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-383xx/CVE-2023-38309.json
Normal file
24
CVE-2023/CVE-2023-383xx/CVE-2023-38309.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-38309",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T15:15:10.847",
|
||||
"lastModified": "2023-07-31T15:31:16.527",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Webmin 2.021. A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the package search functionality. The vulnerability allows an attacker to inject a malicious payload in the \"Search for Package\" field, which gets reflected back in the application's response, leading to the execution of arbitrary JavaScript code within the context of the victim's browser."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38309",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://webmin.com/tags/webmin-changelog/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-383xx/CVE-2023-38310.json
Normal file
24
CVE-2023/CVE-2023-383xx/CVE-2023-38310.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-38310",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T15:15:10.907",
|
||||
"lastModified": "2023-07-31T15:31:16.527",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the configuration settings of the system logs functionality. The vulnerability allows an attacker to store an XSS payload in the configuration settings of specific log files. This results in the execution of that payload whenever the affected log files are accessed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38310",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://webmin.com/tags/webmin-changelog/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-383xx/CVE-2023-38311.json
Normal file
24
CVE-2023/CVE-2023-383xx/CVE-2023-38311.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-38311",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T15:15:10.963",
|
||||
"lastModified": "2023-07-31T15:31:16.527",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the System Logs Viewer functionality. The vulnerability allows an attacker to store a malicious payload in the configuration field, triggering the execution of the payload when saving the configuration or when accessing the System Logs Viewer page."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38311",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://webmin.com/tags/webmin-changelog/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3815",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-21T05:15:15.597",
|
||||
"lastModified": "2023-07-21T12:52:26.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-31T15:09:38.633",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
@ -71,18 +93,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ruoyi:ruoyi:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.7.7",
|
||||
"matchCriteriaId": "68216474-4758-4B9D-8BCA-AFBC22678D80"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/y_project/RuoYi/issues/I7IL85",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.235118",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.235118",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
72
README.md
72
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-07-31T14:00:31.857113+00:00
|
||||
2023-07-31T16:00:27.607746+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-07-31T13:15:09.897000+00:00
|
||||
2023-07-31T15:33:35.323000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,46 +29,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
221304
|
||||
221329
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `25`
|
||||
|
||||
* [CVE-2023-35861](CVE-2023/CVE-2023-358xx/CVE-2023-35861.json) (`2023-07-31T13:15:09.833`)
|
||||
* [CVE-2023-37647](CVE-2023/CVE-2023-376xx/CVE-2023-37647.json) (`2023-07-31T13:15:09.897`)
|
||||
* [CVE-2020-21662](CVE-2020/CVE-2020-216xx/CVE-2020-21662.json) (`2023-07-31T14:15:09.900`)
|
||||
* [CVE-2020-21881](CVE-2020/CVE-2020-218xx/CVE-2020-21881.json) (`2023-07-31T14:15:09.957`)
|
||||
* [CVE-2021-31651](CVE-2021/CVE-2021-316xx/CVE-2021-31651.json) (`2023-07-31T14:15:10.027`)
|
||||
* [CVE-2021-31680](CVE-2021/CVE-2021-316xx/CVE-2021-31680.json) (`2023-07-31T14:15:10.080`)
|
||||
* [CVE-2021-31681](CVE-2021/CVE-2021-316xx/CVE-2021-31681.json) (`2023-07-31T14:15:10.130`)
|
||||
* [CVE-2023-33534](CVE-2023/CVE-2023-335xx/CVE-2023-33534.json) (`2023-07-31T14:15:10.223`)
|
||||
* [CVE-2023-34635](CVE-2023/CVE-2023-346xx/CVE-2023-34635.json) (`2023-07-31T14:15:10.273`)
|
||||
* [CVE-2023-34644](CVE-2023/CVE-2023-346xx/CVE-2023-34644.json) (`2023-07-31T14:15:10.323`)
|
||||
* [CVE-2023-34842](CVE-2023/CVE-2023-348xx/CVE-2023-34842.json) (`2023-07-31T14:15:10.373`)
|
||||
* [CVE-2023-34872](CVE-2023/CVE-2023-348xx/CVE-2023-34872.json) (`2023-07-31T14:15:10.427`)
|
||||
* [CVE-2023-36089](CVE-2023/CVE-2023-360xx/CVE-2023-36089.json) (`2023-07-31T14:15:10.480`)
|
||||
* [CVE-2023-36090](CVE-2023/CVE-2023-360xx/CVE-2023-36090.json) (`2023-07-31T14:15:10.533`)
|
||||
* [CVE-2023-36091](CVE-2023/CVE-2023-360xx/CVE-2023-36091.json) (`2023-07-31T14:15:10.583`)
|
||||
* [CVE-2023-36092](CVE-2023/CVE-2023-360xx/CVE-2023-36092.json) (`2023-07-31T14:15:10.633`)
|
||||
* [CVE-2023-35791](CVE-2023/CVE-2023-357xx/CVE-2023-35791.json) (`2023-07-31T15:15:10.327`)
|
||||
* [CVE-2023-35792](CVE-2023/CVE-2023-357xx/CVE-2023-35792.json) (`2023-07-31T15:15:10.403`)
|
||||
* [CVE-2023-38303](CVE-2023/CVE-2023-383xx/CVE-2023-38303.json) (`2023-07-31T15:15:10.487`)
|
||||
* [CVE-2023-38304](CVE-2023/CVE-2023-383xx/CVE-2023-38304.json) (`2023-07-31T15:15:10.547`)
|
||||
* [CVE-2023-38305](CVE-2023/CVE-2023-383xx/CVE-2023-38305.json) (`2023-07-31T15:15:10.607`)
|
||||
* [CVE-2023-38306](CVE-2023/CVE-2023-383xx/CVE-2023-38306.json) (`2023-07-31T15:15:10.663`)
|
||||
* [CVE-2023-38307](CVE-2023/CVE-2023-383xx/CVE-2023-38307.json) (`2023-07-31T15:15:10.723`)
|
||||
* [CVE-2023-38308](CVE-2023/CVE-2023-383xx/CVE-2023-38308.json) (`2023-07-31T15:15:10.787`)
|
||||
* [CVE-2023-38309](CVE-2023/CVE-2023-383xx/CVE-2023-38309.json) (`2023-07-31T15:15:10.847`)
|
||||
* [CVE-2023-38310](CVE-2023/CVE-2023-383xx/CVE-2023-38310.json) (`2023-07-31T15:15:10.907`)
|
||||
* [CVE-2023-38311](CVE-2023/CVE-2023-383xx/CVE-2023-38311.json) (`2023-07-31T15:15:10.963`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `71`
|
||||
Recently modified CVEs: `10`
|
||||
|
||||
* [CVE-2023-3130](CVE-2023/CVE-2023-31xx/CVE-2023-3130.json) (`2023-07-31T12:54:46.757`)
|
||||
* [CVE-2023-3134](CVE-2023/CVE-2023-31xx/CVE-2023-3134.json) (`2023-07-31T12:54:46.757`)
|
||||
* [CVE-2023-3292](CVE-2023/CVE-2023-32xx/CVE-2023-3292.json) (`2023-07-31T12:54:46.757`)
|
||||
* [CVE-2023-3345](CVE-2023/CVE-2023-33xx/CVE-2023-3345.json) (`2023-07-31T12:54:46.757`)
|
||||
* [CVE-2023-3507](CVE-2023/CVE-2023-35xx/CVE-2023-3507.json) (`2023-07-31T12:54:46.757`)
|
||||
* [CVE-2023-3508](CVE-2023/CVE-2023-35xx/CVE-2023-3508.json) (`2023-07-31T12:54:46.757`)
|
||||
* [CVE-2023-2311](CVE-2023/CVE-2023-23xx/CVE-2023-2311.json) (`2023-07-31T12:54:52.103`)
|
||||
* [CVE-2023-2313](CVE-2023/CVE-2023-23xx/CVE-2023-2313.json) (`2023-07-31T12:54:52.103`)
|
||||
* [CVE-2023-2314](CVE-2023/CVE-2023-23xx/CVE-2023-2314.json) (`2023-07-31T12:54:52.103`)
|
||||
* [CVE-2023-36542](CVE-2023/CVE-2023-365xx/CVE-2023-36542.json) (`2023-07-31T12:54:52.103`)
|
||||
* [CVE-2023-32225](CVE-2023/CVE-2023-322xx/CVE-2023-32225.json) (`2023-07-31T12:54:52.103`)
|
||||
* [CVE-2023-32226](CVE-2023/CVE-2023-322xx/CVE-2023-32226.json) (`2023-07-31T12:54:52.103`)
|
||||
* [CVE-2023-32227](CVE-2023/CVE-2023-322xx/CVE-2023-32227.json) (`2023-07-31T12:54:52.103`)
|
||||
* [CVE-2023-37213](CVE-2023/CVE-2023-372xx/CVE-2023-37213.json) (`2023-07-31T12:54:52.103`)
|
||||
* [CVE-2023-37214](CVE-2023/CVE-2023-372xx/CVE-2023-37214.json) (`2023-07-31T12:54:52.103`)
|
||||
* [CVE-2023-37215](CVE-2023/CVE-2023-372xx/CVE-2023-37215.json) (`2023-07-31T12:54:52.103`)
|
||||
* [CVE-2023-37216](CVE-2023/CVE-2023-372xx/CVE-2023-37216.json) (`2023-07-31T12:54:52.103`)
|
||||
* [CVE-2023-37217](CVE-2023/CVE-2023-372xx/CVE-2023-37217.json) (`2023-07-31T12:54:52.103`)
|
||||
* [CVE-2023-37218](CVE-2023/CVE-2023-372xx/CVE-2023-37218.json) (`2023-07-31T12:54:52.103`)
|
||||
* [CVE-2023-37219](CVE-2023/CVE-2023-372xx/CVE-2023-37219.json) (`2023-07-31T12:54:52.103`)
|
||||
* [CVE-2023-38988](CVE-2023/CVE-2023-389xx/CVE-2023-38988.json) (`2023-07-31T12:55:03.903`)
|
||||
* [CVE-2023-3598](CVE-2023/CVE-2023-35xx/CVE-2023-3598.json) (`2023-07-31T12:55:03.903`)
|
||||
* [CVE-2023-37266](CVE-2023/CVE-2023-372xx/CVE-2023-37266.json) (`2023-07-31T13:05:29.030`)
|
||||
* [CVE-2023-37265](CVE-2023/CVE-2023-372xx/CVE-2023-37265.json) (`2023-07-31T13:05:33.253`)
|
||||
* [CVE-2023-36675](CVE-2023/CVE-2023-366xx/CVE-2023-36675.json) (`2023-07-31T13:05:52.580`)
|
||||
* [CVE-2021-39425](CVE-2021/CVE-2021-394xx/CVE-2021-39425.json) (`2023-07-31T15:11:04.167`)
|
||||
* [CVE-2023-35861](CVE-2023/CVE-2023-358xx/CVE-2023-35861.json) (`2023-07-31T14:45:51.850`)
|
||||
* [CVE-2023-37647](CVE-2023/CVE-2023-376xx/CVE-2023-37647.json) (`2023-07-31T14:45:51.850`)
|
||||
* [CVE-2023-32478](CVE-2023/CVE-2023-324xx/CVE-2023-32478.json) (`2023-07-31T15:08:44.263`)
|
||||
* [CVE-2023-3815](CVE-2023/CVE-2023-38xx/CVE-2023-3815.json) (`2023-07-31T15:09:38.633`)
|
||||
* [CVE-2023-25837](CVE-2023/CVE-2023-258xx/CVE-2023-25837.json) (`2023-07-31T15:10:15.310`)
|
||||
* [CVE-2023-25835](CVE-2023/CVE-2023-258xx/CVE-2023-25835.json) (`2023-07-31T15:10:35.843`)
|
||||
* [CVE-2023-20593](CVE-2023/CVE-2023-205xx/CVE-2023-20593.json) (`2023-07-31T15:15:10.230`)
|
||||
* [CVE-2023-3347](CVE-2023/CVE-2023-33xx/CVE-2023-3347.json) (`2023-07-31T15:15:11.023`)
|
||||
* [CVE-2023-36884](CVE-2023/CVE-2023-368xx/CVE-2023-36884.json) (`2023-07-31T15:33:35.323`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user