diff --git a/CVE-2022/CVE-2022-421xx/CVE-2022-42175.json b/CVE-2022/CVE-2022-421xx/CVE-2022-42175.json new file mode 100644 index 00000000000..e50e96b39b0 --- /dev/null +++ b/CVE-2022/CVE-2022-421xx/CVE-2022-42175.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2022-42175", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-07-05T03:15:09.080", + "lastModified": "2023-07-05T03:15:09.080", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insecure Direct Object Reference vulnerability in WHMCS module SolusVM 1 4.1.2 allows an attacker to change the password and hostname of other customer servers without authorization." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://soluslabs.com", + "source": "cve@mitre.org" + }, + { + "url": "http://solusvm.com", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/mr404ntf/9c8728ee8f35d9744feec3828df1085d", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33201.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33201.json new file mode 100644 index 00000000000..f2d5218b58d --- /dev/null +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33201.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-33201", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-07-05T03:15:09.197", + "lastModified": "2023-07-05T03:15:09.197", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bouncycastle.org", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/bcgit/bc-java/commit/e8c409a8389c815ea3fda5e8b94c92fdfe583bcc", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33733.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33733.json index c25caa0d9f8..60fec6b9b0c 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33733.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33733.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33733", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-05T16:15:09.550", - "lastModified": "2023-06-30T03:15:09.353", + "lastModified": "2023-07-05T03:15:09.263", "vulnStatus": "Modified", "descriptions": [ { @@ -73,6 +73,10 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36WOY22ECJCPOXHVTNCHEWOQLL7JSWP4/", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ALE727IRACYBTTOFIFG57RS4OA2SHIJ/", "source": "cve@mitre.org" diff --git a/README.md b/README.md index 758147dfb6c..09c978bfbb0 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-07-04T18:00:50.352017+00:00 +2023-07-05T04:00:26.166740+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-07-04T17:15:10.850000+00:00 +2023-07-05T03:15:09.263000+00:00 ``` ### Last Data Feed Release @@ -23,34 +23,28 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2023-07-04T00:00:13.544234+00:00 +2023-07-05T00:00:13.566749+00:00 ``` ### Total Number of included CVEs ```plain -219153 +219155 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `2` -* [CVE-2023-3505](CVE-2023/CVE-2023-35xx/CVE-2023-3505.json) (`2023-07-04T16:15:09.620`) -* [CVE-2023-3506](CVE-2023/CVE-2023-35xx/CVE-2023-3506.json) (`2023-07-04T16:15:09.707`) -* [CVE-2023-31999](CVE-2023/CVE-2023-319xx/CVE-2023-31999.json) (`2023-07-04T17:15:10.657`) +* [CVE-2022-42175](CVE-2022/CVE-2022-421xx/CVE-2022-42175.json) (`2023-07-05T03:15:09.080`) +* [CVE-2023-33201](CVE-2023/CVE-2023-332xx/CVE-2023-33201.json) (`2023-07-05T03:15:09.197`) ### CVEs modified in the last Commit -Recently modified CVEs: `6` +Recently modified CVEs: `1` -* [CVE-2022-4297](CVE-2022/CVE-2022-42xx/CVE-2022-4297.json) (`2023-07-04T17:15:09.283`) -* [CVE-2023-21670](CVE-2023/CVE-2023-216xx/CVE-2023-21670.json) (`2023-07-04T17:15:09.397`) -* [CVE-2023-24078](CVE-2023/CVE-2023-240xx/CVE-2023-24078.json) (`2023-07-04T17:15:10.567`) -* [CVE-2023-36346](CVE-2023/CVE-2023-363xx/CVE-2023-36346.json) (`2023-07-04T17:15:10.710`) -* [CVE-2023-36348](CVE-2023/CVE-2023-363xx/CVE-2023-36348.json) (`2023-07-04T17:15:10.790`) -* [CVE-2023-36355](CVE-2023/CVE-2023-363xx/CVE-2023-36355.json) (`2023-07-04T17:15:10.850`) +* [CVE-2023-33733](CVE-2023/CVE-2023-337xx/CVE-2023-33733.json) (`2023-07-05T03:15:09.263`) ## Download and Usage