Auto-Update: 2023-09-12T23:55:26.197747+00:00

This commit is contained in:
cad-safe-bot 2023-09-12 23:55:29 +00:00
parent 1ec092b70b
commit deca1ceba2
6 changed files with 122 additions and 49 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47637",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-12T22:15:07.900",
"lastModified": "2023-09-12T22:15:07.900",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The installer in XAMPP through 8.1.12 allows local users to write to the C:\\xampp directory. Common use cases execute files under C:\\xampp with administrative privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://shinnai.altervista.org/exploits/DVRT-2023-0001_CVE-2022-47637.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-39073",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-12T22:15:08.047",
"lastModified": "2023-09-12T22:15:08.047",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in SNMP Web Pro v.1.1 allows a remote attacker to execute arbitrary code and obtain senstive information via a crafted request."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/ph4nt0mbyt3/9456312e867c10de8f808250ec0b12d3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-41423",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-12T22:15:08.107",
"lastModified": "2023-09-12T22:15:08.107",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in WP Githuber MD plugin v.1.16.2 allows a remote attacker to execute arbitrary code via a crafted payload to the new article function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/terrylinooo/githuber-md/issues/316",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-42471",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-11T08:15:07.703",
"lastModified": "2023-09-11T12:41:46.007",
"lastModified": "2023-09-12T22:15:08.183",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -12,6 +12,10 @@
],
"metrics": {},
"references": [
{
"url": "https://github.com/actuator/cve/blob/main/CVE-2023-42471",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/actuator/wave.ai.browser/blob/main/CWE-94.md",
"source": "cve@mitre.org"

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2023-4813",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-12T22:15:08.277",
"lastModified": "2023-09-12T22:15:08.277",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4813",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237798",
"source": "secalert@redhat.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-12T22:00:25.280743+00:00
2023-09-12T23:55:26.197747+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-12T21:15:09.073000+00:00
2023-09-12T22:15:08.277000+00:00
```
### Last Data Feed Release
@ -29,62 +29,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
224835
224839
```
### CVEs added in the last Commit
Recently added CVEs: `22`
Recently added CVEs: `4`
* [CVE-2023-21520](CVE-2023/CVE-2023-215xx/CVE-2023-21520.json) (`2023-09-12T20:15:07.633`)
* [CVE-2023-21523](CVE-2023/CVE-2023-215xx/CVE-2023-21523.json) (`2023-09-12T20:15:08.010`)
* [CVE-2023-39201](CVE-2023/CVE-2023-392xx/CVE-2023-39201.json) (`2023-09-12T20:15:08.207`)
* [CVE-2023-39208](CVE-2023/CVE-2023-392xx/CVE-2023-39208.json) (`2023-09-12T20:15:09.007`)
* [CVE-2023-39215](CVE-2023/CVE-2023-392xx/CVE-2023-39215.json) (`2023-09-12T20:15:09.203`)
* [CVE-2023-3710](CVE-2023/CVE-2023-37xx/CVE-2023-3710.json) (`2023-09-12T20:15:09.387`)
* [CVE-2023-3711](CVE-2023/CVE-2023-37xx/CVE-2023-3711.json) (`2023-09-12T20:15:09.593`)
* [CVE-2023-3712](CVE-2023/CVE-2023-37xx/CVE-2023-3712.json) (`2023-09-12T20:15:09.787`)
* [CVE-2023-41331](CVE-2023/CVE-2023-413xx/CVE-2023-41331.json) (`2023-09-12T20:15:09.980`)
* [CVE-2023-4918](CVE-2023/CVE-2023-49xx/CVE-2023-4918.json) (`2023-09-12T20:15:10.390`)
* [CVE-2023-4921](CVE-2023/CVE-2023-49xx/CVE-2023-4921.json) (`2023-09-12T20:15:10.573`)
* [CVE-2023-41885](CVE-2023/CVE-2023-418xx/CVE-2023-41885.json) (`2023-09-12T21:15:08.163`)
* [CVE-2023-4900](CVE-2023/CVE-2023-49xx/CVE-2023-4900.json) (`2023-09-12T21:15:08.537`)
* [CVE-2023-4901](CVE-2023/CVE-2023-49xx/CVE-2023-4901.json) (`2023-09-12T21:15:08.603`)
* [CVE-2023-4902](CVE-2023/CVE-2023-49xx/CVE-2023-4902.json) (`2023-09-12T21:15:08.657`)
* [CVE-2023-4903](CVE-2023/CVE-2023-49xx/CVE-2023-4903.json) (`2023-09-12T21:15:08.717`)
* [CVE-2023-4904](CVE-2023/CVE-2023-49xx/CVE-2023-4904.json) (`2023-09-12T21:15:08.777`)
* [CVE-2023-4905](CVE-2023/CVE-2023-49xx/CVE-2023-4905.json) (`2023-09-12T21:15:08.837`)
* [CVE-2023-4906](CVE-2023/CVE-2023-49xx/CVE-2023-4906.json) (`2023-09-12T21:15:08.893`)
* [CVE-2023-4907](CVE-2023/CVE-2023-49xx/CVE-2023-4907.json) (`2023-09-12T21:15:08.950`)
* [CVE-2023-4908](CVE-2023/CVE-2023-49xx/CVE-2023-4908.json) (`2023-09-12T21:15:09.010`)
* [CVE-2023-4909](CVE-2023/CVE-2023-49xx/CVE-2023-4909.json) (`2023-09-12T21:15:09.073`)
* [CVE-2022-47637](CVE-2022/CVE-2022-476xx/CVE-2022-47637.json) (`2023-09-12T22:15:07.900`)
* [CVE-2023-39073](CVE-2023/CVE-2023-390xx/CVE-2023-39073.json) (`2023-09-12T22:15:08.047`)
* [CVE-2023-41423](CVE-2023/CVE-2023-414xx/CVE-2023-41423.json) (`2023-09-12T22:15:08.107`)
* [CVE-2023-4813](CVE-2023/CVE-2023-48xx/CVE-2023-4813.json) (`2023-09-12T22:15:08.277`)
### CVEs modified in the last Commit
Recently modified CVEs: `21`
Recently modified CVEs: `1`
* [CVE-2021-27715](CVE-2021/CVE-2021-277xx/CVE-2021-27715.json) (`2023-09-12T20:19:26.247`)
* [CVE-2022-22405](CVE-2022/CVE-2022-224xx/CVE-2022-22405.json) (`2023-09-12T20:26:14.320`)
* [CVE-2022-22401](CVE-2022/CVE-2022-224xx/CVE-2022-22401.json) (`2023-09-12T21:05:27.433`)
* [CVE-2023-41646](CVE-2023/CVE-2023-416xx/CVE-2023-41646.json) (`2023-09-12T20:02:24.610`)
* [CVE-2023-39240](CVE-2023/CVE-2023-392xx/CVE-2023-39240.json) (`2023-09-12T20:09:22.577`)
* [CVE-2023-21522](CVE-2023/CVE-2023-215xx/CVE-2023-21522.json) (`2023-09-12T20:15:07.853`)
* [CVE-2023-42470](CVE-2023/CVE-2023-424xx/CVE-2023-42470.json) (`2023-09-12T20:15:10.200`)
* [CVE-2023-24965](CVE-2023/CVE-2023-249xx/CVE-2023-24965.json) (`2023-09-12T20:28:03.347`)
* [CVE-2023-30995](CVE-2023/CVE-2023-309xx/CVE-2023-30995.json) (`2023-09-12T20:31:35.640`)
* [CVE-2023-41330](CVE-2023/CVE-2023-413xx/CVE-2023-41330.json) (`2023-09-12T20:42:58.853`)
* [CVE-2023-41327](CVE-2023/CVE-2023-413xx/CVE-2023-41327.json) (`2023-09-12T20:43:26.803`)
* [CVE-2023-41329](CVE-2023/CVE-2023-413xx/CVE-2023-41329.json) (`2023-09-12T20:45:24.907`)
* [CVE-2023-38031](CVE-2023/CVE-2023-380xx/CVE-2023-38031.json) (`2023-09-12T20:45:43.417`)
* [CVE-2023-38032](CVE-2023/CVE-2023-380xx/CVE-2023-38032.json) (`2023-09-12T20:46:03.037`)
* [CVE-2023-38033](CVE-2023/CVE-2023-380xx/CVE-2023-38033.json) (`2023-09-12T20:46:11.303`)
* [CVE-2023-39236](CVE-2023/CVE-2023-392xx/CVE-2023-39236.json) (`2023-09-12T20:46:29.193`)
* [CVE-2023-39237](CVE-2023/CVE-2023-392xx/CVE-2023-39237.json) (`2023-09-12T20:46:41.957`)
* [CVE-2023-39238](CVE-2023/CVE-2023-392xx/CVE-2023-39238.json) (`2023-09-12T20:47:01.077`)
* [CVE-2023-39239](CVE-2023/CVE-2023-392xx/CVE-2023-39239.json) (`2023-09-12T20:47:18.443`)
* [CVE-2023-36736](CVE-2023/CVE-2023-367xx/CVE-2023-36736.json) (`2023-09-12T21:15:07.703`)
* [CVE-2023-38155](CVE-2023/CVE-2023-381xx/CVE-2023-38155.json) (`2023-09-12T21:15:08.040`)
* [CVE-2023-42471](CVE-2023/CVE-2023-424xx/CVE-2023-42471.json) (`2023-09-12T22:15:08.183`)
## Download and Usage