Auto-Update: 2023-05-28T06:00:25.327230+00:00

This commit is contained in:
cad-safe-bot 2023-05-28 06:00:28 +00:00
parent 19bd762543
commit d3a0ecb74c
6 changed files with 197 additions and 32 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-32142",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-17T18:15:10.860",
"lastModified": "2023-05-27T04:15:15.363",
"lastModified": "2023-05-28T04:15:10.147",
"vulnStatus": "Modified",
"descriptions": [
{
@ -98,6 +98,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7TEZ7CLRNYYQZJ5NJGZXK6YJU46WH2L/",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5412",
"source": "cve@mitre.org"
},
{
"url": "https://www.libraw.org/",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1729",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-15T22:15:10.350",
"lastModified": "2023-05-27T04:15:24.490",
"lastModified": "2023-05-28T04:15:11.510",
"vulnStatus": "Modified",
"descriptions": [
{
@ -162,6 +162,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5412",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2948",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-28T04:15:12.117",
"lastModified": "2023-05-28T04:15:12.117",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - Generic in GitHub repository openemr/openemr prior to 7.0.1."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/openemr/openemr/commit/af1ecf78d1342519791bda9d3079e88f7d859015",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/2393e4d9-9e9f-455f-bf50-f20f77b0a64d",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2949",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-28T04:15:13.143",
"lastModified": "2023-05-28T04:15:13.143",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.1."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/openemr/openemr/commit/af1ecf78d1342519791bda9d3079e88f7d859015",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/3842486f-38b1-4150-9f78-b81d0ae580c4",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2950",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-28T04:15:14.513",
"lastModified": "2023-05-28T04:15:14.513",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Authorization in GitHub repository openemr/openemr prior to 7.0.1."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/openemr/openemr/commit/abee8d2606c706176818de25eb88a2d08b8f7fa4",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/612d13cf-2ef9-44ea-b8fb-e797948a9a86",
"source": "security@huntr.dev"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-28T04:00:26.807255+00:00
2023-05-28T06:00:25.327230+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-28T03:15:09.480000+00:00
2023-05-28T04:15:14.513000+00:00
```
### Last Data Feed Release
@ -29,44 +29,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
216165
216168
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `3`
* [CVE-2023-2948](CVE-2023/CVE-2023-29xx/CVE-2023-2948.json) (`2023-05-28T04:15:12.117`)
* [CVE-2023-2949](CVE-2023/CVE-2023-29xx/CVE-2023-2949.json) (`2023-05-28T04:15:13.143`)
* [CVE-2023-2950](CVE-2023/CVE-2023-29xx/CVE-2023-2950.json) (`2023-05-28T04:15:14.513`)
### CVEs modified in the last Commit
Recently modified CVEs: `67`
Recently modified CVEs: `2`
* [CVE-2023-32325](CVE-2023/CVE-2023-323xx/CVE-2023-32325.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-32686](CVE-2023/CVE-2023-326xx/CVE-2023-32686.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-32688](CVE-2023/CVE-2023-326xx/CVE-2023-32688.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-33188](CVE-2023/CVE-2023-331xx/CVE-2023-33188.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-33192](CVE-2023/CVE-2023-331xx/CVE-2023-33192.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-33195](CVE-2023/CVE-2023-331xx/CVE-2023-33195.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-26127](CVE-2023/CVE-2023-261xx/CVE-2023-26127.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-26128](CVE-2023/CVE-2023-261xx/CVE-2023-26128.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-26129](CVE-2023/CVE-2023-261xx/CVE-2023-26129.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-33184](CVE-2023/CVE-2023-331xx/CVE-2023-33184.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-2922](CVE-2023/CVE-2023-29xx/CVE-2023-2922.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-2923](CVE-2023/CVE-2023-29xx/CVE-2023-2923.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-2924](CVE-2023/CVE-2023-29xx/CVE-2023-2924.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-2925](CVE-2023/CVE-2023-29xx/CVE-2023-2925.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-2926](CVE-2023/CVE-2023-29xx/CVE-2023-2926.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-2927](CVE-2023/CVE-2023-29xx/CVE-2023-2927.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-2928](CVE-2023/CVE-2023-29xx/CVE-2023-2928.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-32695](CVE-2023/CVE-2023-326xx/CVE-2023-32695.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-2942](CVE-2023/CVE-2023-29xx/CVE-2023-2942.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-2943](CVE-2023/CVE-2023-29xx/CVE-2023-2943.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-2944](CVE-2023/CVE-2023-29xx/CVE-2023-2944.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-2945](CVE-2023/CVE-2023-29xx/CVE-2023-2945.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-2946](CVE-2023/CVE-2023-29xx/CVE-2023-2946.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-2947](CVE-2023/CVE-2023-29xx/CVE-2023-2947.json) (`2023-05-28T02:28:04.970`)
* [CVE-2023-24329](CVE-2023/CVE-2023-243xx/CVE-2023-24329.json) (`2023-05-28T03:15:09.480`)
* [CVE-2021-32142](CVE-2021/CVE-2021-321xx/CVE-2021-32142.json) (`2023-05-28T04:15:10.147`)
* [CVE-2023-1729](CVE-2023/CVE-2023-17xx/CVE-2023-1729.json) (`2023-05-28T04:15:11.510`)
## Download and Usage