Auto-Update: 2023-04-28T10:00:24.523332+00:00

This commit is contained in:
René Helmke 2023-04-28 12:00:27 +02:00
parent 8f055fd304
commit ec42e5f9b4
3 changed files with 68 additions and 22 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-2331",
"sourceIdentifier": "security@42gears.com",
"published": "2023-04-27T12:15:09.070",
"lastModified": "2023-04-27T12:15:09.070",
"vulnStatus": "Received",
"lastModified": "2023-04-28T08:15:08.680",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unquoted Search Path or Element vulnerability in 42Gears Surelock Windows SureLock Service (NixService.Exe) on Windows allows Privilege Escalation, Local Execution of Code.This issue affects Surelock Windows : 2.40.0.\n\n"
"value": "Unquoted service Path or Element vulnerability in 42Gears Surelock Windows SureLock Service (NixService.Exe) on Windows application will allows to insert arbitrary code into the service.\nThis issue affects Surelock Windows : from 2.3.12 through 2.40.0.\n\n"
}
],
"metrics": {

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2361",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-04-28T08:15:09.340",
"lastModified": "2023-04-28T08:15:09.340",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/pimcore/pimcore/commit/6970649f5d3790a1db9ef4324bece0d4cb95366a",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/24d91b83-c3df-48f5-a713-9def733f2de7",
"source": "security@huntr.dev"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-04-28T06:00:24.868187+00:00
2023-04-28T10:00:24.523332+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-04-28T05:15:25.767000+00:00
2023-04-28T08:15:09.340000+00:00
```
### Last Data Feed Release
@ -29,34 +29,21 @@ Download and Changelog: [Click](releases/latest)
### Total Number of included CVEs
```plain
213715
213716
```
### CVEs added in the last Commit
Recently added CVEs: `1`
* [CVE-2023-28882](CVE-2023/CVE-2023-288xx/CVE-2023-28882.json) (`2023-04-28T04:15:38.017`)
* [CVE-2023-2361](CVE-2023/CVE-2023-23xx/CVE-2023-2361.json) (`2023-04-28T08:15:09.340`)
### CVEs modified in the last Commit
Recently modified CVEs: `14`
Recently modified CVEs: `1`
* [CVE-2022-28346](CVE-2022/CVE-2022-283xx/CVE-2022-28346.json) (`2023-04-28T05:15:24.417`)
* [CVE-2022-28347](CVE-2022/CVE-2022-283xx/CVE-2022-28347.json) (`2023-04-28T05:15:24.957`)
* [CVE-2022-34265](CVE-2022/CVE-2022-342xx/CVE-2022-34265.json) (`2023-04-28T05:15:25.037`)
* [CVE-2022-36359](CVE-2022/CVE-2022-363xx/CVE-2022-36359.json) (`2023-04-28T05:15:25.107`)
* [CVE-2022-41323](CVE-2022/CVE-2022-413xx/CVE-2022-41323.json) (`2023-04-28T05:15:25.190`)
* [CVE-2022-42335](CVE-2022/CVE-2022-423xx/CVE-2022-42335.json) (`2023-04-28T05:15:25.267`)
* [CVE-2023-1801](CVE-2023/CVE-2023-18xx/CVE-2023-1801.json) (`2023-04-28T04:15:36.940`)
* [CVE-2023-23969](CVE-2023/CVE-2023-239xx/CVE-2023-23969.json) (`2023-04-28T05:15:25.430`)
* [CVE-2023-24580](CVE-2023/CVE-2023-245xx/CVE-2023-24580.json) (`2023-04-28T05:15:25.503`)
* [CVE-2023-25652](CVE-2023/CVE-2023-256xx/CVE-2023-25652.json) (`2023-04-28T05:15:25.583`)
* [CVE-2023-25815](CVE-2023/CVE-2023-258xx/CVE-2023-25815.json) (`2023-04-28T05:15:25.677`)
* [CVE-2023-29007](CVE-2023/CVE-2023-290xx/CVE-2023-29007.json) (`2023-04-28T05:15:25.767`)
* [CVE-2023-29197](CVE-2023/CVE-2023-291xx/CVE-2023-29197.json) (`2023-04-28T04:15:38.123`)
* [CVE-2023-29530](CVE-2023/CVE-2023-295xx/CVE-2023-29530.json) (`2023-04-28T04:15:38.377`)
* [CVE-2023-2331](CVE-2023/CVE-2023-23xx/CVE-2023-2331.json) (`2023-04-28T08:15:08.680`)
## Download and Usage