From fbc5bfd6a893b3ef4601772c3f5c40ada5b78c00 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 16 Feb 2024 05:00:28 +0000 Subject: [PATCH] Auto-Update: 2024-02-16T05:00:24.361140+00:00 --- CVE-2023/CVE-2023-64xx/CVE-2023-6451.json | 55 +++++++++++++++++++++++ README.md | 31 +++---------- 2 files changed, 61 insertions(+), 25 deletions(-) create mode 100644 CVE-2023/CVE-2023-64xx/CVE-2023-6451.json diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6451.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6451.json new file mode 100644 index 00000000000..a72325830c2 --- /dev/null +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6451.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-6451", + "sourceIdentifier": "vdp@themissinglink.com.au", + "published": "2024-02-16T04:15:08.090", + "lastModified": "2024-02-16T04:15:08.090", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Publicly known cryptographic machine key in AlayaCare's Procura Portal before 9.0.1.2 allows attackers to forge their own authentication cookies and bypass the application's authentication mechanisms.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "vdp@themissinglink.com.au", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "vdp@themissinglink.com.au", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1394" + } + ] + } + ], + "references": [ + { + "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-6451", + "source": "vdp@themissinglink.com.au" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 366f59766b8..73dbab3dbc4 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-16T03:00:25.249802+00:00 +2024-02-16T05:00:24.361140+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-16T02:15:51.443000+00:00 +2024-02-16T04:15:08.090000+00:00 ``` ### Last Data Feed Release @@ -29,39 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -238734 +238735 ``` ### CVEs added in the last Commit -Recently added CVEs: `18` +Recently added CVEs: `1` -* [CVE-2023-40093](CVE-2023/CVE-2023-400xx/CVE-2023-40093.json) (`2024-02-16T02:15:49.963`) -* [CVE-2023-40122](CVE-2023/CVE-2023-401xx/CVE-2023-40122.json) (`2024-02-16T02:15:50.513`) -* [CVE-2024-0014](CVE-2024/CVE-2024-00xx/CVE-2024-0014.json) (`2024-02-16T02:15:50.580`) -* [CVE-2024-0029](CVE-2024/CVE-2024-00xx/CVE-2024-0029.json) (`2024-02-16T02:15:50.633`) -* [CVE-2024-0030](CVE-2024/CVE-2024-00xx/CVE-2024-0030.json) (`2024-02-16T02:15:50.710`) -* [CVE-2024-0031](CVE-2024/CVE-2024-00xx/CVE-2024-0031.json) (`2024-02-16T02:15:50.763`) -* [CVE-2024-0032](CVE-2024/CVE-2024-00xx/CVE-2024-0032.json) (`2024-02-16T02:15:50.823`) -* [CVE-2024-0033](CVE-2024/CVE-2024-00xx/CVE-2024-0033.json) (`2024-02-16T02:15:50.877`) -* [CVE-2024-0034](CVE-2024/CVE-2024-00xx/CVE-2024-0034.json) (`2024-02-16T02:15:50.933`) -* [CVE-2024-0035](CVE-2024/CVE-2024-00xx/CVE-2024-0035.json) (`2024-02-16T02:15:50.980`) -* [CVE-2024-0036](CVE-2024/CVE-2024-00xx/CVE-2024-0036.json) (`2024-02-16T02:15:51.047`) -* [CVE-2024-0037](CVE-2024/CVE-2024-00xx/CVE-2024-0037.json) (`2024-02-16T02:15:51.097`) -* [CVE-2024-0038](CVE-2024/CVE-2024-00xx/CVE-2024-0038.json) (`2024-02-16T02:15:51.157`) -* [CVE-2024-0040](CVE-2024/CVE-2024-00xx/CVE-2024-0040.json) (`2024-02-16T02:15:51.203`) -* [CVE-2024-0041](CVE-2024/CVE-2024-00xx/CVE-2024-0041.json) (`2024-02-16T02:15:51.253`) -* [CVE-2024-25413](CVE-2024/CVE-2024-254xx/CVE-2024-25413.json) (`2024-02-16T02:15:51.307`) -* [CVE-2024-25414](CVE-2024/CVE-2024-254xx/CVE-2024-25414.json) (`2024-02-16T02:15:51.363`) -* [CVE-2024-25415](CVE-2024/CVE-2024-254xx/CVE-2024-25415.json) (`2024-02-16T02:15:51.443`) +* [CVE-2023-6451](CVE-2023/CVE-2023-64xx/CVE-2023-6451.json) (`2024-02-16T04:15:08.090`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `0` -* [CVE-2020-3259](CVE-2020/CVE-2020-32xx/CVE-2020-3259.json) (`2024-02-16T02:00:03.227`) -* [CVE-2024-21410](CVE-2024/CVE-2024-214xx/CVE-2024-21410.json) (`2024-02-16T02:00:03.233`) ## Download and Usage