diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3477.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3477.json new file mode 100644 index 00000000000..f384549e21f --- /dev/null +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3477.json @@ -0,0 +1,84 @@ +{ + "id": "CVE-2023-3477", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-06-30T08:15:21.417", + "lastModified": "2023-06-30T08:15:21.417", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in RocketSoft Rocket LMS 1.7. It has been declared as problematic. This vulnerability affects unknown code of the file /contact/store of the component Contact Form. The manipulation of the argument name/subject/message leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-232756." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.232756", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.232756", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 55ca3e6f3d9..4f900ba9eee 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-30T08:00:30.066039+00:00 +2023-06-30T10:00:25.456133+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-30T07:58:35.530000+00:00 +2023-06-30T08:15:21.417000+00:00 ``` ### Last Data Feed Release @@ -29,49 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -218939 +218940 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `1` -* [CVE-2023-28387](CVE-2023/CVE-2023-283xx/CVE-2023-28387.json) (`2023-06-30T07:15:08.720`) -* [CVE-2023-3473](CVE-2023/CVE-2023-34xx/CVE-2023-3473.json) (`2023-06-30T07:15:08.813`) -* [CVE-2023-3474](CVE-2023/CVE-2023-34xx/CVE-2023-3474.json) (`2023-06-30T07:15:08.927`) -* [CVE-2023-3475](CVE-2023/CVE-2023-34xx/CVE-2023-3475.json) (`2023-06-30T07:15:09.030`) -* [CVE-2023-3476](CVE-2023/CVE-2023-34xx/CVE-2023-3476.json) (`2023-06-30T07:15:09.130`) +* [CVE-2023-3477](CVE-2023/CVE-2023-34xx/CVE-2023-3477.json) (`2023-06-30T08:15:21.417`) ### CVEs modified in the last Commit -Recently modified CVEs: `53` +Recently modified CVEs: `0` -* [CVE-2023-35157](CVE-2023/CVE-2023-351xx/CVE-2023-35157.json) (`2023-06-30T07:15:41.237`) -* [CVE-2023-35156](CVE-2023/CVE-2023-351xx/CVE-2023-35156.json) (`2023-06-30T07:16:12.873`) -* [CVE-2023-32415](CVE-2023/CVE-2023-324xx/CVE-2023-32415.json) (`2023-06-30T07:16:27.650`) -* [CVE-2023-32402](CVE-2023/CVE-2023-324xx/CVE-2023-32402.json) (`2023-06-30T07:16:39.517`) -* [CVE-2023-32400](CVE-2023/CVE-2023-324xx/CVE-2023-32400.json) (`2023-06-30T07:28:07.453`) -* [CVE-2023-35151](CVE-2023/CVE-2023-351xx/CVE-2023-35151.json) (`2023-06-30T07:28:34.187`) -* [CVE-2023-35150](CVE-2023/CVE-2023-351xx/CVE-2023-35150.json) (`2023-06-30T07:29:19.510`) -* [CVE-2023-1724](CVE-2023/CVE-2023-17xx/CVE-2023-1724.json) (`2023-06-30T07:31:30.543`) -* [CVE-2023-1722](CVE-2023/CVE-2023-17xx/CVE-2023-1722.json) (`2023-06-30T07:31:54.523`) -* [CVE-2023-3197](CVE-2023/CVE-2023-31xx/CVE-2023-3197.json) (`2023-06-30T07:32:05.493`) -* [CVE-2023-32435](CVE-2023/CVE-2023-324xx/CVE-2023-32435.json) (`2023-06-30T07:32:59.527`) -* [CVE-2023-32439](CVE-2023/CVE-2023-324xx/CVE-2023-32439.json) (`2023-06-30T07:33:18.347`) -* [CVE-2023-3393](CVE-2023/CVE-2023-33xx/CVE-2023-3393.json) (`2023-06-30T07:33:35.807`) -* [CVE-2023-3394](CVE-2023/CVE-2023-33xx/CVE-2023-3394.json) (`2023-06-30T07:34:53.880`) -* [CVE-2023-1721](CVE-2023/CVE-2023-17xx/CVE-2023-1721.json) (`2023-06-30T07:35:18.113`) -* [CVE-2023-3387](CVE-2023/CVE-2023-33xx/CVE-2023-3387.json) (`2023-06-30T07:35:30.027`) -* [CVE-2023-3388](CVE-2023/CVE-2023-33xx/CVE-2023-3388.json) (`2023-06-30T07:35:50.417`) -* [CVE-2023-32434](CVE-2023/CVE-2023-324xx/CVE-2023-32434.json) (`2023-06-30T07:36:30.980`) -* [CVE-2023-32419](CVE-2023/CVE-2023-324xx/CVE-2023-32419.json) (`2023-06-30T07:36:47.020`) -* [CVE-2023-32417](CVE-2023/CVE-2023-324xx/CVE-2023-32417.json) (`2023-06-30T07:36:58.417`) -* [CVE-2023-32390](CVE-2023/CVE-2023-323xx/CVE-2023-32390.json) (`2023-06-30T07:37:19.040`) -* [CVE-2023-35813](CVE-2023/CVE-2023-358xx/CVE-2023-35813.json) (`2023-06-30T07:38:07.763`) -* [CVE-2023-32754](CVE-2023/CVE-2023-327xx/CVE-2023-32754.json) (`2023-06-30T07:38:14.497`) -* [CVE-2023-3305](CVE-2023/CVE-2023-33xx/CVE-2023-3305.json) (`2023-06-30T07:38:52.063`) -* [CVE-2023-36284](CVE-2023/CVE-2023-362xx/CVE-2023-36284.json) (`2023-06-30T07:58:35.530`) ## Download and Usage