mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2023-04-28T10:00:24.523332+00:00
This commit is contained in:
parent
8f055fd304
commit
ec42e5f9b4
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-2331",
|
||||
"sourceIdentifier": "security@42gears.com",
|
||||
"published": "2023-04-27T12:15:09.070",
|
||||
"lastModified": "2023-04-27T12:15:09.070",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T08:15:08.680",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unquoted Search Path or Element vulnerability in 42Gears Surelock Windows SureLock Service (NixService.Exe) on Windows allows Privilege Escalation, Local Execution of Code.This issue affects Surelock Windows : 2.40.0.\n\n"
|
||||
"value": "Unquoted service Path or Element vulnerability in 42Gears Surelock Windows SureLock Service (NixService.Exe) on Windows application will allows to insert arbitrary code into the service.\nThis issue affects Surelock Windows : from 2.3.12 through 2.40.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
59
CVE-2023/CVE-2023-23xx/CVE-2023-2361.json
Normal file
59
CVE-2023/CVE-2023-23xx/CVE-2023-2361.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-2361",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-04-28T08:15:09.340",
|
||||
"lastModified": "2023-04-28T08:15:09.340",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/commit/6970649f5d3790a1db9ef4324bece0d4cb95366a",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/24d91b83-c3df-48f5-a713-9def733f2de7",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
25
README.md
25
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-04-28T06:00:24.868187+00:00
|
||||
2023-04-28T10:00:24.523332+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-04-28T05:15:25.767000+00:00
|
||||
2023-04-28T08:15:09.340000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,34 +29,21 @@ Download and Changelog: [Click](releases/latest)
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
213715
|
||||
213716
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
|
||||
* [CVE-2023-28882](CVE-2023/CVE-2023-288xx/CVE-2023-28882.json) (`2023-04-28T04:15:38.017`)
|
||||
* [CVE-2023-2361](CVE-2023/CVE-2023-23xx/CVE-2023-2361.json) (`2023-04-28T08:15:09.340`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `14`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
* [CVE-2022-28346](CVE-2022/CVE-2022-283xx/CVE-2022-28346.json) (`2023-04-28T05:15:24.417`)
|
||||
* [CVE-2022-28347](CVE-2022/CVE-2022-283xx/CVE-2022-28347.json) (`2023-04-28T05:15:24.957`)
|
||||
* [CVE-2022-34265](CVE-2022/CVE-2022-342xx/CVE-2022-34265.json) (`2023-04-28T05:15:25.037`)
|
||||
* [CVE-2022-36359](CVE-2022/CVE-2022-363xx/CVE-2022-36359.json) (`2023-04-28T05:15:25.107`)
|
||||
* [CVE-2022-41323](CVE-2022/CVE-2022-413xx/CVE-2022-41323.json) (`2023-04-28T05:15:25.190`)
|
||||
* [CVE-2022-42335](CVE-2022/CVE-2022-423xx/CVE-2022-42335.json) (`2023-04-28T05:15:25.267`)
|
||||
* [CVE-2023-1801](CVE-2023/CVE-2023-18xx/CVE-2023-1801.json) (`2023-04-28T04:15:36.940`)
|
||||
* [CVE-2023-23969](CVE-2023/CVE-2023-239xx/CVE-2023-23969.json) (`2023-04-28T05:15:25.430`)
|
||||
* [CVE-2023-24580](CVE-2023/CVE-2023-245xx/CVE-2023-24580.json) (`2023-04-28T05:15:25.503`)
|
||||
* [CVE-2023-25652](CVE-2023/CVE-2023-256xx/CVE-2023-25652.json) (`2023-04-28T05:15:25.583`)
|
||||
* [CVE-2023-25815](CVE-2023/CVE-2023-258xx/CVE-2023-25815.json) (`2023-04-28T05:15:25.677`)
|
||||
* [CVE-2023-29007](CVE-2023/CVE-2023-290xx/CVE-2023-29007.json) (`2023-04-28T05:15:25.767`)
|
||||
* [CVE-2023-29197](CVE-2023/CVE-2023-291xx/CVE-2023-29197.json) (`2023-04-28T04:15:38.123`)
|
||||
* [CVE-2023-29530](CVE-2023/CVE-2023-295xx/CVE-2023-29530.json) (`2023-04-28T04:15:38.377`)
|
||||
* [CVE-2023-2331](CVE-2023/CVE-2023-23xx/CVE-2023-2331.json) (`2023-04-28T08:15:08.680`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user