From df5a5de6002431e52e3321753891f5817929dece Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ren=C3=A9=20Helmke?= Date: Thu, 4 May 2023 06:00:27 +0200 Subject: [PATCH] Auto-Update: 2023-05-04T04:00:24.919022+00:00 --- CVE-2022/CVE-2022-477xx/CVE-2022-47757.json | 20 +++++++++++++++ CVE-2023/CVE-2023-254xx/CVE-2023-25438.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-270xx/CVE-2023-27075.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-275xx/CVE-2023-27568.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-298xx/CVE-2023-29842.json | 28 +++++++++++++++++++++ CVE-2023/CVE-2023-300xx/CVE-2023-30077.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-303xx/CVE-2023-30331.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-310xx/CVE-2023-31099.json | 24 ++++++++++++++++++ README.md | 21 ++++++++++------ 9 files changed, 205 insertions(+), 8 deletions(-) create mode 100644 CVE-2022/CVE-2022-477xx/CVE-2022-47757.json create mode 100644 CVE-2023/CVE-2023-254xx/CVE-2023-25438.json create mode 100644 CVE-2023/CVE-2023-270xx/CVE-2023-27075.json create mode 100644 CVE-2023/CVE-2023-275xx/CVE-2023-27568.json create mode 100644 CVE-2023/CVE-2023-298xx/CVE-2023-29842.json create mode 100644 CVE-2023/CVE-2023-300xx/CVE-2023-30077.json create mode 100644 CVE-2023/CVE-2023-303xx/CVE-2023-30331.json create mode 100644 CVE-2023/CVE-2023-310xx/CVE-2023-31099.json diff --git a/CVE-2022/CVE-2022-477xx/CVE-2022-47757.json b/CVE-2022/CVE-2022-477xx/CVE-2022-47757.json new file mode 100644 index 00000000000..35d43e0e464 --- /dev/null +++ b/CVE-2022/CVE-2022-477xx/CVE-2022-47757.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2022-47757", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-04T02:15:09.177", + "lastModified": "2023-05-04T02:15:09.177", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In imo.im 2022.11.1051, a path traversal vulnerability delivered via an unsanitized deeplink can force the application to write a file into the application's data directory. This may allow an attacker to save a shared library under a special directory which the app uses to dynamically load modules. Loading the library can lead to arbitrary code execution." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Ch0pin/security-advisories/security/advisories/GHSA-ghf9-x3c5-3mwj", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25438.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25438.json new file mode 100644 index 00000000000..b1d45bdd47c --- /dev/null +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25438.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-25438", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-04T02:15:18.213", + "lastModified": "2023-05-04T02:15:18.213", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Genomedics MilleGP5 5.9.2, allows remote attackers to execute arbitrary code and gain escalated privileges via modifying specific files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://millegpg.it/", + "source": "cve@mitre.org" + }, + { + "url": "https://packetstormsecurity.com/files/172052/MilleGPG5-5.9.2-Local-Privilege-Escalation.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27075.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27075.json new file mode 100644 index 00000000000..1ffcb4355cf --- /dev/null +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27075.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-27075", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-04T02:15:18.570", + "lastModified": "2023-05-04T02:15:18.570", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting vulnerability (XSS) in the component microbin/src/pasta.rs of Microbin v1.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/szabodanika/microbin/issues/142", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/szabodanika/microbin/pull/143", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27568.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27568.json new file mode 100644 index 00000000000..0315c74cfb2 --- /dev/null +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27568.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-27568", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-04T02:15:19.103", + "lastModified": "2023-05-04T02:15:19.103", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL injection vulnerability inSpryker Commerce OS 0.9 that allows for access to sensitive data via customer/order?orderSearchForm[searchText]=" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.schutzwerk.com/advisories/SCHUTZWERK-SA-2023-001.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.schutzwerk.com/blog/schutzwerk-sa-2023-001/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29842.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29842.json new file mode 100644 index 00000000000..9cc134072c6 --- /dev/null +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29842.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-29842", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-04T03:15:09.600", + "lastModified": "2023-05-04T03:15:09.600", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "ChirchCRm 4.5.4 endpoint /EditEventTypes.php is vulnerable to Blind SQL Injection (Time-based) via the EN_tyid POST parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ChurchCRM/CRM", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/arvandy/CVE/blob/main/CVE-2023-29842/CVE-2023-29842.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/arvandy/CVE/blob/main/CVE-2023-29842/CVE-2023-29842.py", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30077.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30077.json new file mode 100644 index 00000000000..19ce15849ed --- /dev/null +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30077.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-30077", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-04T03:15:20.930", + "lastModified": "2023-05-04T03:15:20.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Judging Management System v1.0 by oretnom23 was discovered to vulnerable to SQL injection via /php-jms/review_result.php?mainevent_id=, mainevent_id." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Dzero57/cve_report/blob/main/judging-management-system/SQLi-1.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.github.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-303xx/CVE-2023-30331.json b/CVE-2023/CVE-2023-303xx/CVE-2023-30331.json new file mode 100644 index 00000000000..13f77aedb91 --- /dev/null +++ b/CVE-2023/CVE-2023-303xx/CVE-2023-30331.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-30331", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-04T03:15:21.267", + "lastModified": "2023-05-04T03:15:21.267", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in the render function of beetl v3.15.0 allows attackers to execute server-side template injection (SSTI) via a crafted payload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/xiandafu/beetl/issues/I6RUIP", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/luelueking/Beetl-3.15.0-vuln-poc", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31099.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31099.json new file mode 100644 index 00000000000..57ce545fdde --- /dev/null +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31099.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-31099", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-04T02:15:19.437", + "lastModified": "2023-05-04T02:15:19.437", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://manageengine.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2023-31099.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index eb4817170b2..85c35b322d7 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-04T02:00:25.093955+00:00 +2023-05-04T04:00:24.919022+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-04T00:15:17.153000+00:00 +2023-05-04T03:15:21.267000+00:00 ``` ### Last Data Feed Release @@ -29,22 +29,27 @@ Download and Changelog: [Click](releases/latest) ### Total Number of included CVEs ```plain -214033 +214041 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `8` +* [CVE-2022-47757](CVE-2022/CVE-2022-477xx/CVE-2022-47757.json) (`2023-05-04T02:15:09.177`) +* [CVE-2023-25438](CVE-2023/CVE-2023-254xx/CVE-2023-25438.json) (`2023-05-04T02:15:18.213`) +* [CVE-2023-27075](CVE-2023/CVE-2023-270xx/CVE-2023-27075.json) (`2023-05-04T02:15:18.570`) +* [CVE-2023-27568](CVE-2023/CVE-2023-275xx/CVE-2023-27568.json) (`2023-05-04T02:15:19.103`) +* [CVE-2023-29842](CVE-2023/CVE-2023-298xx/CVE-2023-29842.json) (`2023-05-04T03:15:09.600`) +* [CVE-2023-30077](CVE-2023/CVE-2023-300xx/CVE-2023-30077.json) (`2023-05-04T03:15:20.930`) +* [CVE-2023-30331](CVE-2023/CVE-2023-303xx/CVE-2023-30331.json) (`2023-05-04T03:15:21.267`) +* [CVE-2023-31099](CVE-2023/CVE-2023-310xx/CVE-2023-31099.json) (`2023-05-04T02:15:19.437`) ### CVEs modified in the last Commit -Recently modified CVEs: `3` +Recently modified CVEs: `0` -* [CVE-2023-31484](CVE-2023/CVE-2023-314xx/CVE-2023-31484.json) (`2023-05-04T00:15:10.567`) -* [CVE-2023-31485](CVE-2023/CVE-2023-314xx/CVE-2023-31485.json) (`2023-05-04T00:15:17.013`) -* [CVE-2023-31486](CVE-2023/CVE-2023-314xx/CVE-2023-31486.json) (`2023-05-04T00:15:17.153`) ## Download and Usage