mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-02-16T05:00:24.361140+00:00
This commit is contained in:
parent
5f1ca0790d
commit
fbc5bfd6a8
55
CVE-2023/CVE-2023-64xx/CVE-2023-6451.json
Normal file
55
CVE-2023/CVE-2023-64xx/CVE-2023-6451.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-6451",
|
||||||
|
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||||
|
"published": "2024-02-16T04:15:08.090",
|
||||||
|
"lastModified": "2024-02-16T04:15:08.090",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Publicly known cryptographic machine key in AlayaCare's Procura Portal before 9.0.1.2 allows attackers to forge their own authentication cookies and bypass the application's authentication mechanisms.\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "vdp@themissinglink.com.au",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 8.6,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "vdp@themissinglink.com.au",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1394"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.themissinglink.com.au/security-advisories/cve-2023-6451",
|
||||||
|
"source": "vdp@themissinglink.com.au"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
31
README.md
31
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-02-16T03:00:25.249802+00:00
|
2024-02-16T05:00:24.361140+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-02-16T02:15:51.443000+00:00
|
2024-02-16T04:15:08.090000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -29,39 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
238734
|
238735
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `18`
|
Recently added CVEs: `1`
|
||||||
|
|
||||||
* [CVE-2023-40093](CVE-2023/CVE-2023-400xx/CVE-2023-40093.json) (`2024-02-16T02:15:49.963`)
|
* [CVE-2023-6451](CVE-2023/CVE-2023-64xx/CVE-2023-6451.json) (`2024-02-16T04:15:08.090`)
|
||||||
* [CVE-2023-40122](CVE-2023/CVE-2023-401xx/CVE-2023-40122.json) (`2024-02-16T02:15:50.513`)
|
|
||||||
* [CVE-2024-0014](CVE-2024/CVE-2024-00xx/CVE-2024-0014.json) (`2024-02-16T02:15:50.580`)
|
|
||||||
* [CVE-2024-0029](CVE-2024/CVE-2024-00xx/CVE-2024-0029.json) (`2024-02-16T02:15:50.633`)
|
|
||||||
* [CVE-2024-0030](CVE-2024/CVE-2024-00xx/CVE-2024-0030.json) (`2024-02-16T02:15:50.710`)
|
|
||||||
* [CVE-2024-0031](CVE-2024/CVE-2024-00xx/CVE-2024-0031.json) (`2024-02-16T02:15:50.763`)
|
|
||||||
* [CVE-2024-0032](CVE-2024/CVE-2024-00xx/CVE-2024-0032.json) (`2024-02-16T02:15:50.823`)
|
|
||||||
* [CVE-2024-0033](CVE-2024/CVE-2024-00xx/CVE-2024-0033.json) (`2024-02-16T02:15:50.877`)
|
|
||||||
* [CVE-2024-0034](CVE-2024/CVE-2024-00xx/CVE-2024-0034.json) (`2024-02-16T02:15:50.933`)
|
|
||||||
* [CVE-2024-0035](CVE-2024/CVE-2024-00xx/CVE-2024-0035.json) (`2024-02-16T02:15:50.980`)
|
|
||||||
* [CVE-2024-0036](CVE-2024/CVE-2024-00xx/CVE-2024-0036.json) (`2024-02-16T02:15:51.047`)
|
|
||||||
* [CVE-2024-0037](CVE-2024/CVE-2024-00xx/CVE-2024-0037.json) (`2024-02-16T02:15:51.097`)
|
|
||||||
* [CVE-2024-0038](CVE-2024/CVE-2024-00xx/CVE-2024-0038.json) (`2024-02-16T02:15:51.157`)
|
|
||||||
* [CVE-2024-0040](CVE-2024/CVE-2024-00xx/CVE-2024-0040.json) (`2024-02-16T02:15:51.203`)
|
|
||||||
* [CVE-2024-0041](CVE-2024/CVE-2024-00xx/CVE-2024-0041.json) (`2024-02-16T02:15:51.253`)
|
|
||||||
* [CVE-2024-25413](CVE-2024/CVE-2024-254xx/CVE-2024-25413.json) (`2024-02-16T02:15:51.307`)
|
|
||||||
* [CVE-2024-25414](CVE-2024/CVE-2024-254xx/CVE-2024-25414.json) (`2024-02-16T02:15:51.363`)
|
|
||||||
* [CVE-2024-25415](CVE-2024/CVE-2024-254xx/CVE-2024-25415.json) (`2024-02-16T02:15:51.443`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `2`
|
Recently modified CVEs: `0`
|
||||||
|
|
||||||
* [CVE-2020-3259](CVE-2020/CVE-2020-32xx/CVE-2020-3259.json) (`2024-02-16T02:00:03.227`)
|
|
||||||
* [CVE-2024-21410](CVE-2024/CVE-2024-214xx/CVE-2024-21410.json) (`2024-02-16T02:00:03.233`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
Loading…
x
Reference in New Issue
Block a user