diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0041.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0041.json index 78bbb724042..e3ce3cfcaf5 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0041.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0041.json @@ -2,12 +2,12 @@ "id": "CVE-2023-0041", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-06-05T01:15:45.810", - "lastModified": "2023-06-05T01:15:45.810", + "lastModified": "2023-06-05T03:15:09.207", "vulnStatus": "Received", "descriptions": [ { "lang": "en", - "value": "[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]" + "value": "IBM Security Guardium 11.5 could allow a user to take over another user's session due to insufficient session expiration. IBM X-Force ID: 243657." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34407.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34407.json new file mode 100644 index 00000000000..eae59c99a70 --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34407.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-34407", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-05T02:15:09.407", + "lastModified": "2023-06-05T02:15:09.407", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "OfflinePlayerService.exe in Harbinger Offline Player 4.0.6.0.2 allows directory traversal as LocalSystem via ..\\ in a URL." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://cybir.com/2023/cve/proof-of-concept-checkpoint-learning-harbinger-systems-offline-player-multiple-poc-for-cl-4-0-6-0-2-lfi-excessive-rights/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34408.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34408.json new file mode 100644 index 00000000000..f117a6542f8 --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34408.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-34408", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-05T02:15:09.537", + "lastModified": "2023-06-05T02:15:09.537", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "DokuWiki before 2023-04-04a allows XSS via RSS titles." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/dokuwiki/dokuwiki/compare/release-2023-04-04...release-2023-04-04a", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/dokuwiki/dokuwiki/pull/3967", + "source": "cve@mitre.org" + }, + { + "url": "https://huntr.dev/bounties/c6119106-1a5c-464c-94dd-ee7c5d0bece0/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.github.com/splitbrain/dokuwiki/commit/53df38b0e4465894a67a5890f74a6f5f82e827de", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34410.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34410.json new file mode 100644 index 00000000000..5b90a6d225f --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34410.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-34410", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-05T03:15:09.390", + "lastModified": "2023-06-05T03:15:09.390", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://codereview.qt-project.org/c/qt/qtbase/+/477560", + "source": "cve@mitre.org" + }, + { + "url": "https://codereview.qt-project.org/c/qt/qtbase/+/480002", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 7aa1faa08a0..51de21c9681 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-05T02:00:28.109325+00:00 +2023-06-05T04:00:24.493001+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-05T01:15:45.960000+00:00 +2023-06-05T03:15:09.390000+00:00 ``` ### Last Data Feed Release @@ -29,25 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -216828 +216831 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `3` -* [CVE-2014-125105](CVE-2014/CVE-2014-1251xx/CVE-2014-125105.json) (`2023-06-05T01:15:45.637`) -* [CVE-2023-22862](CVE-2023/CVE-2023-228xx/CVE-2023-22862.json) (`2023-06-05T00:15:09.703`) -* [CVE-2023-27285](CVE-2023/CVE-2023-272xx/CVE-2023-27285.json) (`2023-06-05T00:15:09.920`) -* [CVE-2023-0041](CVE-2023/CVE-2023-00xx/CVE-2023-0041.json) (`2023-06-05T01:15:45.810`) -* [CVE-2023-27861](CVE-2023/CVE-2023-278xx/CVE-2023-27861.json) (`2023-06-05T01:15:45.890`) -* [CVE-2023-32334](CVE-2023/CVE-2023-323xx/CVE-2023-32334.json) (`2023-06-05T01:15:45.960`) +* [CVE-2023-34407](CVE-2023/CVE-2023-344xx/CVE-2023-34407.json) (`2023-06-05T02:15:09.407`) +* [CVE-2023-34408](CVE-2023/CVE-2023-344xx/CVE-2023-34408.json) (`2023-06-05T02:15:09.537`) +* [CVE-2023-34410](CVE-2023/CVE-2023-344xx/CVE-2023-34410.json) (`2023-06-05T03:15:09.390`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +* [CVE-2023-0041](CVE-2023/CVE-2023-00xx/CVE-2023-0041.json) (`2023-06-05T03:15:09.207`) ## Download and Usage