Auto-Update: 2023-07-31T16:00:27.607746+00:00

This commit is contained in:
cad-safe-bot 2023-07-31 16:00:31 +00:00
parent 278c9ceae5
commit cc7fb091de
36 changed files with 929 additions and 61 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-21662",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:09.900",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in yunyecms 2.0.2 allows remote attackers to run arbitrary SQL commands via XFF."
}
],
"metrics": {},
"references": [
{
"url": "http://note.youdao.com/noteshare?id=5c3b984ee36dfd1da690e0b5963926bc",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-21881",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:09.957",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Request Forgery (CSRF) vulnerability in admin.php in DuxCMS 2.1 allows remote attackers to modtify application data via article/admin/content/add."
}
],
"metrics": {},
"references": [
{
"url": "https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-31651",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:10.027",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) vulnerability in neofarg-cms 0.2.3 allows remoate attacker to run arbitrary code via the copyright field in copyright settings."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/NeoFrag/NeoFrag/issues/92",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-31680",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:10.080",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in yolo 5 allows attackers to execute arbitrary code via crafted yaml file."
}
],
"metrics": {},
"references": [
{
"url": "https://huntr.dev/bounties/1-other-yolov5/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-31681",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:10.130",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in yolo 3 allows attackers to execute arbitrary code via crafted yaml file."
}
],
"metrics": {},
"references": [
{
"url": "https://huntr.dev/bounties/1-other-yolov3/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,23 +2,81 @@
"id": "CVE-2021-39425",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-20T20:15:10.093",
"lastModified": "2023-07-21T12:52:36.740",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-31T15:11:04.167",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SeedDMS v6.0.15 was discovered to contain an open redirect vulnerability. An attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on crafted links."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seeddms:seeddms:6.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "4B5F2138-42C3-4677-AF17-65E89F3A0BE7"
}
]
}
]
}
],
"references": [
{
"url": "https://medium.com/@rohitgautam26/cve-2021-39425-8a336eba34dd",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/11-Client_Side_Testing/04-Testing_for_Client_Side_URL_Redirect",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20593",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-07-24T20:15:10.237",
"lastModified": "2023-07-30T21:15:09.810",
"lastModified": "2023-07-31T15:15:10.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -72,6 +72,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
"source": "psirt@amd.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html",
"source": "psirt@amd.com"
},
{
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008",
"source": "psirt@amd.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25835",
"sourceIdentifier": "psirt@esri.com",
"published": "2023-07-21T00:15:10.343",
"lastModified": "2023-07-21T12:52:32.633",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-31T15:10:35.843",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "psirt@esri.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
@ -46,10 +66,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.8.1",
"versionEndIncluding": "11.1",
"matchCriteriaId": "52CEC629-7368-42D1-9107-AC3937B6DB02"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-enterprise-sites-security-patch-is-now-available/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25837",
"sourceIdentifier": "psirt@esri.com",
"published": "2023-07-21T04:15:12.377",
"lastModified": "2023-07-21T12:52:26.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-31T15:10:15.310",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "psirt@esri.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
@ -46,10 +66,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.8.1",
"versionEndIncluding": "10.9",
"matchCriteriaId": "BDAAE95E-BBD9-4820-9368-B4F82FFAA585"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-enterprise-sites-security-patch-is-now-available/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32478",
"sourceIdentifier": "security_alert@emc.com",
"published": "2023-07-21T06:15:09.910",
"lastModified": "2023-07-21T12:52:26.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-31T15:08:44.263",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:powerstoreos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.0.1",
"matchCriteriaId": "A18C8D10-9C41-4CA7-AC51-FCD6AE9D191B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000215171/dsa-2023-173-dell-powerstore-family-security-update-for-multiple-vulnerabilities",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33534",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:10.223",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in Guanzhou Tozed Kangwei Intelligent Technology ZLTS10G software version S10G_3.11.6 allows attackers to takeover user accounts via sending a crafted POST request to /goform/goform_set_cmd_process."
}
],
"metrics": {},
"references": [
{
"url": "https://rodelllemit.medium.com/cve-2023-33534-account-takeover-through-csrf-vulnerability-461de6f1b696",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3347",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-20T15:15:11.940",
"lastModified": "2023-07-22T03:15:10.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-31T15:15:11.023",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -35,6 +35,14 @@
]
},
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:4325",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:4328",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-3347",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-34635",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:10.273",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Wifi Soft Unibox Administration 3.0 and 3.1 is vulnerable to SQL Injection. The vulnerability occurs because of not validating or sanitizing the user input in the username field of the login page."
}
],
"metrics": {},
"references": [
{
"url": "http://packetstormsecurity.com/files/173669/Wifi-Soft-Unibox-Administration-3.0-3.1-SQL-Injection.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/51610",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-34644",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:10.323",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows remote attackers to gain escalated privileges via crafted POST request to /cgi-bin/luci/api/auth."
}
],
"metrics": {},
"references": [
{
"url": "https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-34842",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:10.373",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Remote Code Execution vulnerability in DedeCMS through 5.7.109 allows remote attackers to run arbitrary code via crafted POST request to /dede/tpl.php."
}
],
"metrics": {},
"references": [
{
"url": "http://dedecms.com",
"source": "cve@mitre.org"
},
{
"url": "https://www.dedecms.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-34872",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:10.427",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Outline.cc for Poppler prior to 23.06.0 allows a remote attacker to cause a Denial of Service (DoS) (crash) via a crafted PDF file in OutlineItem::open."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.freedesktop.org/poppler/poppler/-/commit/591235c8b6c65a2eee88991b9ae73490fd9afdfe",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-35791",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T15:15:10.327",
"lastModified": "2023-07-31T15:31:16.527",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Vound Intella Connect 2.6.0.3 has an Open Redirect vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://excellium-services.com/cert-xlm-advisory/CVE-2023-35791",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-35792",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T15:15:10.403",
"lastModified": "2023-07-31T15:31:16.527",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Vound Intella Connect 2.6.0.3 is vulnerable to stored Cross-site Scripting (XSS)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://excellium-services.com/cert-xlm-advisory/CVE-2023-35792",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35861",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T13:15:09.833",
"lastModified": "2023-07-31T13:15:09.833",
"vulnStatus": "Received",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-36089",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:10.480",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** Authentication Bypass vulnerability in D-Link DIR-645 firmware version 1.03 allows remote attackers to gain escalated privileges via function phpcgi_main in cgibin. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {},
"references": [
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/support",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-36090",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:10.533",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** Authentication Bypass vulnerability in D-Link DIR-885L FW102b01 allows remote attackers to gain escalated privileges via phpcgi. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {},
"references": [
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/support",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-36091",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:10.583",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** Authentication Bypass vulnerability in D-Link DIR-895 FW102b07 allows remote attackers to gain escalated privileges via via function phpcgi_main in cgibin. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {},
"references": [
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/support",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-36092",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:10.633",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** Authentication Bypass vulnerability in D-Link DIR-859 FW105b03 allows remote attackers to gain escalated privileges via via phpcgi_main. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {},
"references": [
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/support",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-36884",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T19:15:09.623",
"lastModified": "2023-07-28T18:22:24.783",
"lastModified": "2023-07-31T15:33:35.323",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2023-07-17",
"cisaActionDue": "2023-08-07",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37647",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T13:15:09.897",
"lastModified": "2023-07-31T13:15:09.897",
"vulnStatus": "Received",
"lastModified": "2023-07-31T14:45:51.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-38303",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T15:15:10.487",
"lastModified": "2023-07-31T15:31:16.527",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Webmin 2.021. One can exploit a stored Cross-Site Scripting (XSS) attack to achieve Remote Command Execution (RCE) through the Users and Group's real name parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38303",
"source": "cve@mitre.org"
},
{
"url": "https://webmin.com/tags/webmin-changelog/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-38304",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T15:15:10.547",
"lastModified": "2023-07-31T15:31:16.527",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Users and Groups functionality, allowing an attacker to store a malicious payload in the Group Name field when creating a new group."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38304",
"source": "cve@mitre.org"
},
{
"url": "https://webmin.com/tags/webmin-changelog/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-38305",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T15:15:10.607",
"lastModified": "2023-07-31T15:31:16.527",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Webmin 2.021. The download functionality allows an attacker to exploit a Cross-Site Scripting (XSS) vulnerability. By providing a crafted download path containing a malicious payload, an attacker can inject arbitrary code, which is then executed within the context of the victim's browser when the download link is accessed."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38305",
"source": "cve@mitre.org"
},
{
"url": "https://webmin.com/tags/webmin-changelog/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-38306",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T15:15:10.663",
"lastModified": "2023-07-31T15:31:16.527",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Webmin 2.021. A Cross-site Scripting (XSS) Bypass vulnerability was discovered in the file upload functionality. Normally, the application restricts the upload of certain file types such as .svg, .php, etc., and displays an error message if a prohibited file type is detected. However, by following certain steps, an attacker can bypass these restrictions and inject malicious code."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38306",
"source": "cve@mitre.org"
},
{
"url": "https://webmin.com/tags/webmin-changelog/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-38307",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T15:15:10.723",
"lastModified": "2023-07-31T15:31:16.527",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Users and Groups functionality. The vulnerability occurs when an authenticated user adds a new user and inserts an XSS payload into the user's real name."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38307",
"source": "cve@mitre.org"
},
{
"url": "https://webmin.com/tags/webmin-changelog/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-38308",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T15:15:10.787",
"lastModified": "2023-07-31T15:31:16.527",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Webmin 2.021. A Cross-Site Scripting (XSS) vulnerability was discovered in the HTTP Tunnel functionality when handling third-party domain URLs. By providing a crafted URL from a third-party domain, an attacker can inject malicious code. leading to the execution of arbitrary JavaScript code within the context of the victim's browser."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38308",
"source": "cve@mitre.org"
},
{
"url": "https://webmin.com/tags/webmin-changelog/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-38309",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T15:15:10.847",
"lastModified": "2023-07-31T15:31:16.527",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Webmin 2.021. A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the package search functionality. The vulnerability allows an attacker to inject a malicious payload in the \"Search for Package\" field, which gets reflected back in the application's response, leading to the execution of arbitrary JavaScript code within the context of the victim's browser."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38309",
"source": "cve@mitre.org"
},
{
"url": "https://webmin.com/tags/webmin-changelog/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-38310",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T15:15:10.907",
"lastModified": "2023-07-31T15:31:16.527",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the configuration settings of the system logs functionality. The vulnerability allows an attacker to store an XSS payload in the configuration settings of specific log files. This results in the execution of that payload whenever the affected log files are accessed."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38310",
"source": "cve@mitre.org"
},
{
"url": "https://webmin.com/tags/webmin-changelog/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-38311",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T15:15:10.963",
"lastModified": "2023-07-31T15:31:16.527",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the System Logs Viewer functionality. The vulnerability allows an attacker to store a malicious payload in the configuration field, triggering the execution of the payload when saving the configuration or when accessing the System Logs Viewer page."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38311",
"source": "cve@mitre.org"
},
{
"url": "https://webmin.com/tags/webmin-changelog/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3815",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-21T05:15:15.597",
"lastModified": "2023-07-21T12:52:26.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-31T15:09:38.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruoyi:ruoyi:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.7.7",
"matchCriteriaId": "68216474-4758-4B9D-8BCA-AFBC22678D80"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/y_project/RuoYi/issues/I7IL85",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.235118",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.235118",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-07-31T14:00:31.857113+00:00
2023-07-31T16:00:27.607746+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-07-31T13:15:09.897000+00:00
2023-07-31T15:33:35.323000+00:00
```
### Last Data Feed Release
@ -29,46 +29,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
221304
221329
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `25`
* [CVE-2023-35861](CVE-2023/CVE-2023-358xx/CVE-2023-35861.json) (`2023-07-31T13:15:09.833`)
* [CVE-2023-37647](CVE-2023/CVE-2023-376xx/CVE-2023-37647.json) (`2023-07-31T13:15:09.897`)
* [CVE-2020-21662](CVE-2020/CVE-2020-216xx/CVE-2020-21662.json) (`2023-07-31T14:15:09.900`)
* [CVE-2020-21881](CVE-2020/CVE-2020-218xx/CVE-2020-21881.json) (`2023-07-31T14:15:09.957`)
* [CVE-2021-31651](CVE-2021/CVE-2021-316xx/CVE-2021-31651.json) (`2023-07-31T14:15:10.027`)
* [CVE-2021-31680](CVE-2021/CVE-2021-316xx/CVE-2021-31680.json) (`2023-07-31T14:15:10.080`)
* [CVE-2021-31681](CVE-2021/CVE-2021-316xx/CVE-2021-31681.json) (`2023-07-31T14:15:10.130`)
* [CVE-2023-33534](CVE-2023/CVE-2023-335xx/CVE-2023-33534.json) (`2023-07-31T14:15:10.223`)
* [CVE-2023-34635](CVE-2023/CVE-2023-346xx/CVE-2023-34635.json) (`2023-07-31T14:15:10.273`)
* [CVE-2023-34644](CVE-2023/CVE-2023-346xx/CVE-2023-34644.json) (`2023-07-31T14:15:10.323`)
* [CVE-2023-34842](CVE-2023/CVE-2023-348xx/CVE-2023-34842.json) (`2023-07-31T14:15:10.373`)
* [CVE-2023-34872](CVE-2023/CVE-2023-348xx/CVE-2023-34872.json) (`2023-07-31T14:15:10.427`)
* [CVE-2023-36089](CVE-2023/CVE-2023-360xx/CVE-2023-36089.json) (`2023-07-31T14:15:10.480`)
* [CVE-2023-36090](CVE-2023/CVE-2023-360xx/CVE-2023-36090.json) (`2023-07-31T14:15:10.533`)
* [CVE-2023-36091](CVE-2023/CVE-2023-360xx/CVE-2023-36091.json) (`2023-07-31T14:15:10.583`)
* [CVE-2023-36092](CVE-2023/CVE-2023-360xx/CVE-2023-36092.json) (`2023-07-31T14:15:10.633`)
* [CVE-2023-35791](CVE-2023/CVE-2023-357xx/CVE-2023-35791.json) (`2023-07-31T15:15:10.327`)
* [CVE-2023-35792](CVE-2023/CVE-2023-357xx/CVE-2023-35792.json) (`2023-07-31T15:15:10.403`)
* [CVE-2023-38303](CVE-2023/CVE-2023-383xx/CVE-2023-38303.json) (`2023-07-31T15:15:10.487`)
* [CVE-2023-38304](CVE-2023/CVE-2023-383xx/CVE-2023-38304.json) (`2023-07-31T15:15:10.547`)
* [CVE-2023-38305](CVE-2023/CVE-2023-383xx/CVE-2023-38305.json) (`2023-07-31T15:15:10.607`)
* [CVE-2023-38306](CVE-2023/CVE-2023-383xx/CVE-2023-38306.json) (`2023-07-31T15:15:10.663`)
* [CVE-2023-38307](CVE-2023/CVE-2023-383xx/CVE-2023-38307.json) (`2023-07-31T15:15:10.723`)
* [CVE-2023-38308](CVE-2023/CVE-2023-383xx/CVE-2023-38308.json) (`2023-07-31T15:15:10.787`)
* [CVE-2023-38309](CVE-2023/CVE-2023-383xx/CVE-2023-38309.json) (`2023-07-31T15:15:10.847`)
* [CVE-2023-38310](CVE-2023/CVE-2023-383xx/CVE-2023-38310.json) (`2023-07-31T15:15:10.907`)
* [CVE-2023-38311](CVE-2023/CVE-2023-383xx/CVE-2023-38311.json) (`2023-07-31T15:15:10.963`)
### CVEs modified in the last Commit
Recently modified CVEs: `71`
Recently modified CVEs: `10`
* [CVE-2023-3130](CVE-2023/CVE-2023-31xx/CVE-2023-3130.json) (`2023-07-31T12:54:46.757`)
* [CVE-2023-3134](CVE-2023/CVE-2023-31xx/CVE-2023-3134.json) (`2023-07-31T12:54:46.757`)
* [CVE-2023-3292](CVE-2023/CVE-2023-32xx/CVE-2023-3292.json) (`2023-07-31T12:54:46.757`)
* [CVE-2023-3345](CVE-2023/CVE-2023-33xx/CVE-2023-3345.json) (`2023-07-31T12:54:46.757`)
* [CVE-2023-3507](CVE-2023/CVE-2023-35xx/CVE-2023-3507.json) (`2023-07-31T12:54:46.757`)
* [CVE-2023-3508](CVE-2023/CVE-2023-35xx/CVE-2023-3508.json) (`2023-07-31T12:54:46.757`)
* [CVE-2023-2311](CVE-2023/CVE-2023-23xx/CVE-2023-2311.json) (`2023-07-31T12:54:52.103`)
* [CVE-2023-2313](CVE-2023/CVE-2023-23xx/CVE-2023-2313.json) (`2023-07-31T12:54:52.103`)
* [CVE-2023-2314](CVE-2023/CVE-2023-23xx/CVE-2023-2314.json) (`2023-07-31T12:54:52.103`)
* [CVE-2023-36542](CVE-2023/CVE-2023-365xx/CVE-2023-36542.json) (`2023-07-31T12:54:52.103`)
* [CVE-2023-32225](CVE-2023/CVE-2023-322xx/CVE-2023-32225.json) (`2023-07-31T12:54:52.103`)
* [CVE-2023-32226](CVE-2023/CVE-2023-322xx/CVE-2023-32226.json) (`2023-07-31T12:54:52.103`)
* [CVE-2023-32227](CVE-2023/CVE-2023-322xx/CVE-2023-32227.json) (`2023-07-31T12:54:52.103`)
* [CVE-2023-37213](CVE-2023/CVE-2023-372xx/CVE-2023-37213.json) (`2023-07-31T12:54:52.103`)
* [CVE-2023-37214](CVE-2023/CVE-2023-372xx/CVE-2023-37214.json) (`2023-07-31T12:54:52.103`)
* [CVE-2023-37215](CVE-2023/CVE-2023-372xx/CVE-2023-37215.json) (`2023-07-31T12:54:52.103`)
* [CVE-2023-37216](CVE-2023/CVE-2023-372xx/CVE-2023-37216.json) (`2023-07-31T12:54:52.103`)
* [CVE-2023-37217](CVE-2023/CVE-2023-372xx/CVE-2023-37217.json) (`2023-07-31T12:54:52.103`)
* [CVE-2023-37218](CVE-2023/CVE-2023-372xx/CVE-2023-37218.json) (`2023-07-31T12:54:52.103`)
* [CVE-2023-37219](CVE-2023/CVE-2023-372xx/CVE-2023-37219.json) (`2023-07-31T12:54:52.103`)
* [CVE-2023-38988](CVE-2023/CVE-2023-389xx/CVE-2023-38988.json) (`2023-07-31T12:55:03.903`)
* [CVE-2023-3598](CVE-2023/CVE-2023-35xx/CVE-2023-3598.json) (`2023-07-31T12:55:03.903`)
* [CVE-2023-37266](CVE-2023/CVE-2023-372xx/CVE-2023-37266.json) (`2023-07-31T13:05:29.030`)
* [CVE-2023-37265](CVE-2023/CVE-2023-372xx/CVE-2023-37265.json) (`2023-07-31T13:05:33.253`)
* [CVE-2023-36675](CVE-2023/CVE-2023-366xx/CVE-2023-36675.json) (`2023-07-31T13:05:52.580`)
* [CVE-2021-39425](CVE-2021/CVE-2021-394xx/CVE-2021-39425.json) (`2023-07-31T15:11:04.167`)
* [CVE-2023-35861](CVE-2023/CVE-2023-358xx/CVE-2023-35861.json) (`2023-07-31T14:45:51.850`)
* [CVE-2023-37647](CVE-2023/CVE-2023-376xx/CVE-2023-37647.json) (`2023-07-31T14:45:51.850`)
* [CVE-2023-32478](CVE-2023/CVE-2023-324xx/CVE-2023-32478.json) (`2023-07-31T15:08:44.263`)
* [CVE-2023-3815](CVE-2023/CVE-2023-38xx/CVE-2023-3815.json) (`2023-07-31T15:09:38.633`)
* [CVE-2023-25837](CVE-2023/CVE-2023-258xx/CVE-2023-25837.json) (`2023-07-31T15:10:15.310`)
* [CVE-2023-25835](CVE-2023/CVE-2023-258xx/CVE-2023-25835.json) (`2023-07-31T15:10:35.843`)
* [CVE-2023-20593](CVE-2023/CVE-2023-205xx/CVE-2023-20593.json) (`2023-07-31T15:15:10.230`)
* [CVE-2023-3347](CVE-2023/CVE-2023-33xx/CVE-2023-3347.json) (`2023-07-31T15:15:11.023`)
* [CVE-2023-36884](CVE-2023/CVE-2023-368xx/CVE-2023-36884.json) (`2023-07-31T15:33:35.323`)
## Download and Usage