Auto-Update: 2023-06-05T04:00:24.493001+00:00

This commit is contained in:
cad-safe-bot 2023-06-05 04:00:27 +00:00
parent 6529950ecc
commit d01af4c2fa
5 changed files with 87 additions and 13 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-0041", "id": "CVE-2023-0041",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-06-05T01:15:45.810", "published": "2023-06-05T01:15:45.810",
"lastModified": "2023-06-05T01:15:45.810", "lastModified": "2023-06-05T03:15:09.207",
"vulnStatus": "Received", "vulnStatus": "Received",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]" "value": "IBM Security Guardium 11.5 could allow a user to take over another user's session due to insufficient session expiration. IBM X-Force ID: 243657."
} }
], ],
"metrics": { "metrics": {

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-34407",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-05T02:15:09.407",
"lastModified": "2023-06-05T02:15:09.407",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "OfflinePlayerService.exe in Harbinger Offline Player 4.0.6.0.2 allows directory traversal as LocalSystem via ..\\ in a URL."
}
],
"metrics": {},
"references": [
{
"url": "https://cybir.com/2023/cve/proof-of-concept-checkpoint-learning-harbinger-systems-offline-player-multiple-poc-for-cl-4-0-6-0-2-lfi-excessive-rights/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-34408",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-05T02:15:09.537",
"lastModified": "2023-06-05T02:15:09.537",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "DokuWiki before 2023-04-04a allows XSS via RSS titles."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/dokuwiki/dokuwiki/compare/release-2023-04-04...release-2023-04-04a",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/dokuwiki/dokuwiki/pull/3967",
"source": "cve@mitre.org"
},
{
"url": "https://huntr.dev/bounties/c6119106-1a5c-464c-94dd-ee7c5d0bece0/",
"source": "cve@mitre.org"
},
{
"url": "https://www.github.com/splitbrain/dokuwiki/commit/53df38b0e4465894a67a5890f74a6f5f82e827de",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-34410",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-05T03:15:09.390",
"lastModified": "2023-06-05T03:15:09.390",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate."
}
],
"metrics": {},
"references": [
{
"url": "https://codereview.qt-project.org/c/qt/qtbase/+/477560",
"source": "cve@mitre.org"
},
{
"url": "https://codereview.qt-project.org/c/qt/qtbase/+/480002",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-06-05T02:00:28.109325+00:00 2023-06-05T04:00:24.493001+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-06-05T01:15:45.960000+00:00 2023-06-05T03:15:09.390000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -29,25 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
216828 216831
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `6` Recently added CVEs: `3`
* [CVE-2014-125105](CVE-2014/CVE-2014-1251xx/CVE-2014-125105.json) (`2023-06-05T01:15:45.637`) * [CVE-2023-34407](CVE-2023/CVE-2023-344xx/CVE-2023-34407.json) (`2023-06-05T02:15:09.407`)
* [CVE-2023-22862](CVE-2023/CVE-2023-228xx/CVE-2023-22862.json) (`2023-06-05T00:15:09.703`) * [CVE-2023-34408](CVE-2023/CVE-2023-344xx/CVE-2023-34408.json) (`2023-06-05T02:15:09.537`)
* [CVE-2023-27285](CVE-2023/CVE-2023-272xx/CVE-2023-27285.json) (`2023-06-05T00:15:09.920`) * [CVE-2023-34410](CVE-2023/CVE-2023-344xx/CVE-2023-34410.json) (`2023-06-05T03:15:09.390`)
* [CVE-2023-0041](CVE-2023/CVE-2023-00xx/CVE-2023-0041.json) (`2023-06-05T01:15:45.810`)
* [CVE-2023-27861](CVE-2023/CVE-2023-278xx/CVE-2023-27861.json) (`2023-06-05T01:15:45.890`)
* [CVE-2023-32334](CVE-2023/CVE-2023-323xx/CVE-2023-32334.json) (`2023-06-05T01:15:45.960`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `1`
* [CVE-2023-0041](CVE-2023/CVE-2023-00xx/CVE-2023-0041.json) (`2023-06-05T03:15:09.207`)
## Download and Usage ## Download and Usage