Auto-Update: 2023-09-06T18:00:25.238708+00:00

This commit is contained in:
cad-safe-bot 2023-09-06 18:00:28 +00:00
parent dd14720aca
commit ea5508786b
16 changed files with 190 additions and 85 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-36130",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-02T22:15:08.650",
"lastModified": "2023-09-06T01:15:12.423",
"lastModified": "2023-09-06T16:15:07.610",
"vulnStatus": "Modified",
"descriptions": [
{
@ -104,6 +104,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5490",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-36131",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-02T22:15:08.693",
"lastModified": "2023-09-06T01:15:12.877",
"lastModified": "2023-09-06T16:15:07.743",
"vulnStatus": "Modified",
"descriptions": [
{
@ -104,6 +104,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5490",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-36133",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-02T22:15:08.733",
"lastModified": "2023-09-06T01:15:12.950",
"lastModified": "2023-09-06T16:15:07.817",
"vulnStatus": "Modified",
"descriptions": [
{
@ -104,6 +104,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5490",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-36135",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-02T22:15:08.833",
"lastModified": "2023-09-06T01:15:13.023",
"lastModified": "2023-09-06T16:15:07.887",
"vulnStatus": "Modified",
"descriptions": [
{
@ -104,6 +104,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5490",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-30473",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-06T15:15:07.943",
"lastModified": "2023-09-06T01:15:13.093",
"lastModified": "2023-09-06T16:15:07.967",
"vulnStatus": "Modified",
"descriptions": [
{
@ -136,6 +136,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5490",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-30474",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-02T17:15:08.630",
"lastModified": "2023-09-06T01:15:13.203",
"lastModified": "2023-09-06T16:15:08.053",
"vulnStatus": "Modified",
"descriptions": [
{
@ -113,6 +113,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5490",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-30475",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-04T14:15:07.540",
"lastModified": "2023-09-06T01:15:13.293",
"lastModified": "2023-09-06T16:15:08.130",
"vulnStatus": "Modified",
"descriptions": [
{
@ -136,6 +136,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5490",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-36646",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-06T17:15:49.873",
"lastModified": "2023-09-06T17:15:49.873",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Cross Site Scrtpting (XSS) vulnerability in KodExplorer 4.45 allows remote attackers to run arbitrary code via /index.php page."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/kalcaddle/KodExplorer/issues/482",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34038",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:23.000",
"lastModified": "2023-08-30T15:18:57.997",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-06T16:15:08.227",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go"
"value": "** DISPUTED ** Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go. NOTE: the vendor's position is that this is not a vulnerability."
}
],
"metrics": {
@ -77,6 +77,18 @@
"tags": [
"Patch"
]
},
{
"url": "https://github.com/golang/vulndb/issues/2016#issuecomment-1698677762",
"source": "cve@mitre.org"
},
{
"url": "https://go-review.googlesource.com/c/vulndb/+/524456",
"source": "cve@mitre.org"
},
{
"url": "https://go-review.googlesource.com/c/vulndb/+/524456/2/data/excluded/GO-2023-2016.yaml",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47022",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:30.547",
"lastModified": "2023-08-28T18:39:41.703",
"lastModified": "2023-09-06T17:17:25.753",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -17,20 +17,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0667",
"sourceIdentifier": "cve@takeonme.org",
"published": "2023-06-07T03:15:09.117",
"lastModified": "2023-06-13T18:51:26.077",
"lastModified": "2023-09-06T17:18:57.333",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -21,20 +21,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-20250",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2023-09-06T17:15:50.100",
"lastModified": "2023-09-06T17:15:50.100",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device.\r\n\r This vulnerability is due to improper validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary code with root privileges on an affected device. To exploit this vulnerability, the attacker must have valid Administrator credentials on the affected device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-stack-SHYv2f5N",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-34188",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-23T20:15:09.053",
"lastModified": "2023-07-17T18:15:09.837",
"lastModified": "2023-09-06T17:15:50.190",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The HTTP server in Mongoose before 7.10 accepts requests containing negative Content-Length headers."
"value": "The HTTP server in Mongoose before 7.10 accepts requests containing negative Content-Length headers. By sending a single attack payload over TCP, an attacker can cause an infinite loop in which the server continuously reparses that payload, and does not respond to any other requests."
}
],
"metrics": {

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-39615",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-29T17:15:12.527",
"lastModified": "2023-08-31T20:15:34.983",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-06T17:15:50.447",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Xmlsoft Libxml2 v2.11.0 was discovered to contain a global buffer overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file."
"value": "** DISPUTED ** Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input."
}
],
"metrics": {

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-4498",
"sourceIdentifier": "cret@cert.org",
"published": "2023-09-06T17:15:50.687",
"lastModified": "2023-09-06T17:15:50.687",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Tenda N300 Wireless N VDSL2 Modem Router allows unauthenticated access to pages that in turn should be accessible to authenticated users only"
}
],
"metrics": {},
"weaknesses": [
{
"source": "cret@cert.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-305"
}
]
}
],
"references": [
{
"url": "https://kb.cert.org/vuls/id/304455",
"source": "cret@cert.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-06T16:00:25.169876+00:00
2023-09-06T18:00:25.238708+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-06T15:52:55.787000+00:00
2023-09-06T17:18:57.333000+00:00
```
### Last Data Feed Release
@ -29,64 +29,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
224387
224390
```
### CVEs added in the last Commit
Recently added CVEs: `20`
Recently added CVEs: `3`
* [CVE-2021-21088](CVE-2021/CVE-2021-210xx/CVE-2021-21088.json) (`2023-09-06T14:15:08.053`)
* [CVE-2021-28644](CVE-2021/CVE-2021-286xx/CVE-2021-28644.json) (`2023-09-06T14:15:08.390`)
* [CVE-2021-35980](CVE-2021/CVE-2021-359xx/CVE-2021-35980.json) (`2023-09-06T14:15:08.593`)
* [CVE-2021-36021](CVE-2021/CVE-2021-360xx/CVE-2021-36021.json) (`2023-09-06T14:15:08.767`)
* [CVE-2021-36023](CVE-2021/CVE-2021-360xx/CVE-2021-36023.json) (`2023-09-06T14:15:08.950`)
* [CVE-2021-36036](CVE-2021/CVE-2021-360xx/CVE-2021-36036.json) (`2023-09-06T14:15:09.110`)
* [CVE-2021-36060](CVE-2021/CVE-2021-360xx/CVE-2021-36060.json) (`2023-09-06T14:15:09.283`)
* [CVE-2021-39859](CVE-2021/CVE-2021-398xx/CVE-2021-39859.json) (`2023-09-06T14:15:09.477`)
* [CVE-2023-32672](CVE-2023/CVE-2023-326xx/CVE-2023-32672.json) (`2023-09-06T14:15:10.297`)
* [CVE-2023-37941](CVE-2023/CVE-2023-379xx/CVE-2023-37941.json) (`2023-09-06T14:15:10.483`)
* [CVE-2023-39265](CVE-2023/CVE-2023-392xx/CVE-2023-39265.json) (`2023-09-06T14:15:10.687`)
* [CVE-2023-3777](CVE-2023/CVE-2023-37xx/CVE-2023-3777.json) (`2023-09-06T14:15:10.860`)
* [CVE-2023-4015](CVE-2023/CVE-2023-40xx/CVE-2023-4015.json) (`2023-09-06T14:15:11.093`)
* [CVE-2023-4206](CVE-2023/CVE-2023-42xx/CVE-2023-4206.json) (`2023-09-06T14:15:11.280`)
* [CVE-2023-4207](CVE-2023/CVE-2023-42xx/CVE-2023-4207.json) (`2023-09-06T14:15:11.453`)
* [CVE-2023-4208](CVE-2023/CVE-2023-42xx/CVE-2023-4208.json) (`2023-09-06T14:15:11.627`)
* [CVE-2023-4244](CVE-2023/CVE-2023-42xx/CVE-2023-4244.json) (`2023-09-06T14:15:11.877`)
* [CVE-2023-4621](CVE-2023/CVE-2023-46xx/CVE-2023-4621.json) (`2023-09-06T14:15:12.033`)
* [CVE-2023-4622](CVE-2023/CVE-2023-46xx/CVE-2023-4622.json) (`2023-09-06T14:15:12.193`)
* [CVE-2023-4623](CVE-2023/CVE-2023-46xx/CVE-2023-4623.json) (`2023-09-06T14:15:12.357`)
* [CVE-2021-36646](CVE-2021/CVE-2021-366xx/CVE-2021-36646.json) (`2023-09-06T17:15:49.873`)
* [CVE-2023-20250](CVE-2023/CVE-2023-202xx/CVE-2023-20250.json) (`2023-09-06T17:15:50.100`)
* [CVE-2023-4498](CVE-2023/CVE-2023-44xx/CVE-2023-4498.json) (`2023-09-06T17:15:50.687`)
### CVEs modified in the last Commit
Recently modified CVEs: `28`
Recently modified CVEs: `12`
* [CVE-2022-45451](CVE-2022/CVE-2022-454xx/CVE-2022-45451.json) (`2023-09-06T15:52:55.787`)
* [CVE-2023-36811](CVE-2023/CVE-2023-368xx/CVE-2023-36811.json) (`2023-09-06T14:23:51.630`)
* [CVE-2023-41738](CVE-2023/CVE-2023-417xx/CVE-2023-41738.json) (`2023-09-06T14:34:02.057`)
* [CVE-2023-40182](CVE-2023/CVE-2023-401xx/CVE-2023-40182.json) (`2023-09-06T14:56:27.160`)
* [CVE-2023-41739](CVE-2023/CVE-2023-417xx/CVE-2023-41739.json) (`2023-09-06T14:59:20.667`)
* [CVE-2023-1114](CVE-2023/CVE-2023-11xx/CVE-2023-1114.json) (`2023-09-06T15:15:16.077`)
* [CVE-2023-1863](CVE-2023/CVE-2023-18xx/CVE-2023-1863.json) (`2023-09-06T15:15:16.230`)
* [CVE-2023-41930](CVE-2023/CVE-2023-419xx/CVE-2023-41930.json) (`2023-09-06T15:15:16.380`)
* [CVE-2023-41931](CVE-2023/CVE-2023-419xx/CVE-2023-41931.json) (`2023-09-06T15:15:16.447`)
* [CVE-2023-41932](CVE-2023/CVE-2023-419xx/CVE-2023-41932.json) (`2023-09-06T15:15:16.507`)
* [CVE-2023-41933](CVE-2023/CVE-2023-419xx/CVE-2023-41933.json) (`2023-09-06T15:15:16.583`)
* [CVE-2023-41934](CVE-2023/CVE-2023-419xx/CVE-2023-41934.json) (`2023-09-06T15:15:16.770`)
* [CVE-2023-41935](CVE-2023/CVE-2023-419xx/CVE-2023-41935.json) (`2023-09-06T15:15:17.883`)
* [CVE-2023-41936](CVE-2023/CVE-2023-419xx/CVE-2023-41936.json) (`2023-09-06T15:15:18.673`)
* [CVE-2023-41937](CVE-2023/CVE-2023-419xx/CVE-2023-41937.json) (`2023-09-06T15:15:19.627`)
* [CVE-2023-41938](CVE-2023/CVE-2023-419xx/CVE-2023-41938.json) (`2023-09-06T15:15:21.187`)
* [CVE-2023-41939](CVE-2023/CVE-2023-419xx/CVE-2023-41939.json) (`2023-09-06T15:15:21.257`)
* [CVE-2023-41940](CVE-2023/CVE-2023-419xx/CVE-2023-41940.json) (`2023-09-06T15:15:21.327`)
* [CVE-2023-41941](CVE-2023/CVE-2023-419xx/CVE-2023-41941.json) (`2023-09-06T15:15:21.383`)
* [CVE-2023-41942](CVE-2023/CVE-2023-419xx/CVE-2023-41942.json) (`2023-09-06T15:15:21.443`)
* [CVE-2023-41943](CVE-2023/CVE-2023-419xx/CVE-2023-41943.json) (`2023-09-06T15:15:21.503`)
* [CVE-2023-41944](CVE-2023/CVE-2023-419xx/CVE-2023-41944.json) (`2023-09-06T15:15:21.570`)
* [CVE-2023-41945](CVE-2023/CVE-2023-419xx/CVE-2023-41945.json) (`2023-09-06T15:15:21.640`)
* [CVE-2023-41946](CVE-2023/CVE-2023-419xx/CVE-2023-41946.json) (`2023-09-06T15:15:21.697`)
* [CVE-2023-41947](CVE-2023/CVE-2023-419xx/CVE-2023-41947.json) (`2023-09-06T15:15:21.753`)
* [CVE-2020-36130](CVE-2020/CVE-2020-361xx/CVE-2020-36130.json) (`2023-09-06T16:15:07.610`)
* [CVE-2020-36131](CVE-2020/CVE-2020-361xx/CVE-2020-36131.json) (`2023-09-06T16:15:07.743`)
* [CVE-2020-36133](CVE-2020/CVE-2020-361xx/CVE-2020-36133.json) (`2023-09-06T16:15:07.817`)
* [CVE-2020-36135](CVE-2020/CVE-2020-361xx/CVE-2020-36135.json) (`2023-09-06T16:15:07.887`)
* [CVE-2021-30473](CVE-2021/CVE-2021-304xx/CVE-2021-30473.json) (`2023-09-06T16:15:07.967`)
* [CVE-2021-30474](CVE-2021/CVE-2021-304xx/CVE-2021-30474.json) (`2023-09-06T16:15:08.053`)
* [CVE-2021-30475](CVE-2021/CVE-2021-304xx/CVE-2021-30475.json) (`2023-09-06T16:15:08.130`)
* [CVE-2022-34038](CVE-2022/CVE-2022-340xx/CVE-2022-34038.json) (`2023-09-06T16:15:08.227`)
* [CVE-2022-47022](CVE-2022/CVE-2022-470xx/CVE-2022-47022.json) (`2023-09-06T17:17:25.753`)
* [CVE-2023-34188](CVE-2023/CVE-2023-341xx/CVE-2023-34188.json) (`2023-09-06T17:15:50.190`)
* [CVE-2023-39615](CVE-2023/CVE-2023-396xx/CVE-2023-39615.json) (`2023-09-06T17:15:50.447`)
* [CVE-2023-0667](CVE-2023/CVE-2023-06xx/CVE-2023-0667.json) (`2023-09-06T17:18:57.333`)
## Download and Usage