diff --git a/CVE-2021/CVE-2021-321xx/CVE-2021-32142.json b/CVE-2021/CVE-2021-321xx/CVE-2021-32142.json index fe91f589971..a5c56675303 100644 --- a/CVE-2021/CVE-2021-321xx/CVE-2021-32142.json +++ b/CVE-2021/CVE-2021-321xx/CVE-2021-32142.json @@ -2,7 +2,7 @@ "id": "CVE-2021-32142", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T18:15:10.860", - "lastModified": "2023-05-27T04:15:15.363", + "lastModified": "2023-05-28T04:15:10.147", "vulnStatus": "Modified", "descriptions": [ { @@ -98,6 +98,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7TEZ7CLRNYYQZJ5NJGZXK6YJU46WH2L/", "source": "cve@mitre.org" }, + { + "url": "https://www.debian.org/security/2023/dsa-5412", + "source": "cve@mitre.org" + }, { "url": "https://www.libraw.org/", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1729.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1729.json index fa814ad35b5..c16b9e54611 100644 --- a/CVE-2023/CVE-2023-17xx/CVE-2023-1729.json +++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1729.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1729", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-15T22:15:10.350", - "lastModified": "2023-05-27T04:15:24.490", + "lastModified": "2023-05-28T04:15:11.510", "vulnStatus": "Modified", "descriptions": [ { @@ -162,6 +162,10 @@ "Mailing List", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5412", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2948.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2948.json new file mode 100644 index 00000000000..98072d490e3 --- /dev/null +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2948.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-2948", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-28T04:15:12.117", + "lastModified": "2023-05-28T04:15:12.117", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-site Scripting (XSS) - Generic in GitHub repository openemr/openemr prior to 7.0.1." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/openemr/openemr/commit/af1ecf78d1342519791bda9d3079e88f7d859015", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/2393e4d9-9e9f-455f-bf50-f20f77b0a64d", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2949.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2949.json new file mode 100644 index 00000000000..accc40843ce --- /dev/null +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2949.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-2949", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-28T04:15:13.143", + "lastModified": "2023-05-28T04:15:13.143", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.1." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/openemr/openemr/commit/af1ecf78d1342519791bda9d3079e88f7d859015", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/3842486f-38b1-4150-9f78-b81d0ae580c4", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2950.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2950.json new file mode 100644 index 00000000000..25f8bf82b09 --- /dev/null +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2950.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-2950", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-28T04:15:14.513", + "lastModified": "2023-05-28T04:15:14.513", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Authorization in GitHub repository openemr/openemr prior to 7.0.1." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/openemr/openemr/commit/abee8d2606c706176818de25eb88a2d08b8f7fa4", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/612d13cf-2ef9-44ea-b8fb-e797948a9a86", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0e1fc2dda78..9e9f79380a1 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-28T04:00:26.807255+00:00 +2023-05-28T06:00:25.327230+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-28T03:15:09.480000+00:00 +2023-05-28T04:15:14.513000+00:00 ``` ### Last Data Feed Release @@ -29,44 +29,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -216165 +216168 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `3` +* [CVE-2023-2948](CVE-2023/CVE-2023-29xx/CVE-2023-2948.json) (`2023-05-28T04:15:12.117`) +* [CVE-2023-2949](CVE-2023/CVE-2023-29xx/CVE-2023-2949.json) (`2023-05-28T04:15:13.143`) +* [CVE-2023-2950](CVE-2023/CVE-2023-29xx/CVE-2023-2950.json) (`2023-05-28T04:15:14.513`) ### CVEs modified in the last Commit -Recently modified CVEs: `67` +Recently modified CVEs: `2` -* [CVE-2023-32325](CVE-2023/CVE-2023-323xx/CVE-2023-32325.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-32686](CVE-2023/CVE-2023-326xx/CVE-2023-32686.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-32688](CVE-2023/CVE-2023-326xx/CVE-2023-32688.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-33188](CVE-2023/CVE-2023-331xx/CVE-2023-33188.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-33192](CVE-2023/CVE-2023-331xx/CVE-2023-33192.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-33195](CVE-2023/CVE-2023-331xx/CVE-2023-33195.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-26127](CVE-2023/CVE-2023-261xx/CVE-2023-26127.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-26128](CVE-2023/CVE-2023-261xx/CVE-2023-26128.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-26129](CVE-2023/CVE-2023-261xx/CVE-2023-26129.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-33184](CVE-2023/CVE-2023-331xx/CVE-2023-33184.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-2922](CVE-2023/CVE-2023-29xx/CVE-2023-2922.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-2923](CVE-2023/CVE-2023-29xx/CVE-2023-2923.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-2924](CVE-2023/CVE-2023-29xx/CVE-2023-2924.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-2925](CVE-2023/CVE-2023-29xx/CVE-2023-2925.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-2926](CVE-2023/CVE-2023-29xx/CVE-2023-2926.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-2927](CVE-2023/CVE-2023-29xx/CVE-2023-2927.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-2928](CVE-2023/CVE-2023-29xx/CVE-2023-2928.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-32695](CVE-2023/CVE-2023-326xx/CVE-2023-32695.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-2942](CVE-2023/CVE-2023-29xx/CVE-2023-2942.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-2943](CVE-2023/CVE-2023-29xx/CVE-2023-2943.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-2944](CVE-2023/CVE-2023-29xx/CVE-2023-2944.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-2945](CVE-2023/CVE-2023-29xx/CVE-2023-2945.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-2946](CVE-2023/CVE-2023-29xx/CVE-2023-2946.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-2947](CVE-2023/CVE-2023-29xx/CVE-2023-2947.json) (`2023-05-28T02:28:04.970`) -* [CVE-2023-24329](CVE-2023/CVE-2023-243xx/CVE-2023-24329.json) (`2023-05-28T03:15:09.480`) +* [CVE-2021-32142](CVE-2021/CVE-2021-321xx/CVE-2021-32142.json) (`2023-05-28T04:15:10.147`) +* [CVE-2023-1729](CVE-2023/CVE-2023-17xx/CVE-2023-1729.json) (`2023-05-28T04:15:11.510`) ## Download and Usage