From fd01c368d12fb1e292627ca9443dbf981adeab91 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 28 Jul 2023 22:00:28 +0000 Subject: [PATCH] Auto-Update: 2023-07-28T22:00:25.228956+00:00 --- CVE-2023/CVE-2023-323xx/CVE-2023-32364.json | 10 ++- CVE-2023/CVE-2023-324xx/CVE-2023-32429.json | 10 ++- CVE-2023/CVE-2023-324xx/CVE-2023-32444.json | 14 +++- CVE-2023/CVE-2023-326xx/CVE-2023-32654.json | 6 +- CVE-2023/CVE-2023-342xx/CVE-2023-34241.json | 14 +++- CVE-2023/CVE-2023-344xx/CVE-2023-34425.json | 26 +++++++- CVE-2023/CVE-2023-35xx/CVE-2023-3598.json | 24 +++++++ CVE-2023/CVE-2023-363xx/CVE-2023-36339.json | 69 ++++++++++++++++++-- CVE-2023/CVE-2023-364xx/CVE-2023-36495.json | 26 +++++++- CVE-2023/CVE-2023-372xx/CVE-2023-37285.json | 18 +++++- CVE-2023/CVE-2023-37xx/CVE-2023-3791.json | 71 +++++++++++++++++++-- CVE-2023/CVE-2023-385xx/CVE-2023-38565.json | 10 ++- CVE-2023/CVE-2023-385xx/CVE-2023-38571.json | 14 +++- CVE-2023/CVE-2023-385xx/CVE-2023-38590.json | 30 ++++++++- CVE-2023/CVE-2023-385xx/CVE-2023-38593.json | 10 ++- CVE-2023/CVE-2023-385xx/CVE-2023-38598.json | 30 ++++++++- CVE-2023/CVE-2023-386xx/CVE-2023-38601.json | 14 +++- CVE-2023/CVE-2023-386xx/CVE-2023-38603.json | 14 +++- CVE-2023/CVE-2023-386xx/CVE-2023-38604.json | 30 ++++++++- CVE-2023/CVE-2023-386xx/CVE-2023-38609.json | 6 +- CVE-2023/CVE-2023-389xx/CVE-2023-38988.json | 20 ++++++ CVE-2023/CVE-2023-38xx/CVE-2023-3841.json | 55 ++++++++++++++-- README.md | 57 ++++++++--------- 23 files changed, 516 insertions(+), 62 deletions(-) create mode 100644 CVE-2023/CVE-2023-35xx/CVE-2023-3598.json create mode 100644 CVE-2023/CVE-2023-389xx/CVE-2023-38988.json diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32364.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32364.json index 39728ec95bf..c8cd9676c98 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32364.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32364.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32364", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T01:15:20.443", - "lastModified": "2023-07-27T12:13:15.833", + "lastModified": "2023-07-28T21:15:09.927", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -15,6 +15,14 @@ { "url": "https://support.apple.com/en-us/HT213843", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213845", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32429.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32429.json index da42658ad71..2e0b02af9bf 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32429.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32429.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32429", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T01:15:29.543", - "lastModified": "2023-07-27T12:13:15.833", + "lastModified": "2023-07-28T21:15:11.213", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -15,6 +15,14 @@ { "url": "https://support.apple.com/en-us/HT213843", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213845", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32444.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32444.json index da88ed642ba..9513136e636 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32444.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32444.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32444", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-28T05:15:10.403", - "lastModified": "2023-07-28T13:44:36.087", + "lastModified": "2023-07-28T21:15:11.497", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -23,6 +23,18 @@ { "url": "https://support.apple.com/en-us/HT213845", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213845", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32654.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32654.json index 268ce92260b..84d5bf4f01d 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32654.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32654.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32654", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-28T05:15:10.517", - "lastModified": "2023-07-28T13:44:36.087", + "lastModified": "2023-07-28T21:15:11.807", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -15,6 +15,10 @@ { "url": "https://support.apple.com/en-us/HT213843", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213843", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34241.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34241.json index 578e67e411a..f0ad78f2614 100644 --- a/CVE-2023/CVE-2023-342xx/CVE-2023-34241.json +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34241.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34241", "sourceIdentifier": "security-advisories@github.com", "published": "2023-06-22T23:15:09.493", - "lastModified": "2023-07-14T03:15:08.927", + "lastModified": "2023-07-28T21:15:12.083", "vulnStatus": "Modified", "descriptions": [ { @@ -155,6 +155,18 @@ "Mailing List", "Third Party Advisory" ] + }, + { + "url": "https://support.apple.com/kb/HT213843", + "source": "security-advisories@github.com" + }, + { + "url": "https://support.apple.com/kb/HT213844", + "source": "security-advisories@github.com" + }, + { + "url": "https://support.apple.com/kb/HT213845", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34425.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34425.json index 2f80fdec237..f2ef4a27014 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34425.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34425.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34425", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-28T05:15:10.577", - "lastModified": "2023-07-28T13:44:31.450", + "lastModified": "2023-07-28T21:15:13.047", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -35,6 +35,30 @@ { "url": "https://support.apple.com/en-us/HT213848", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213841", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213845", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213848", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3598.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3598.json new file mode 100644 index 00000000000..903e578dd3d --- /dev/null +++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3598.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-3598", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-28T21:15:14.287", + "lastModified": "2023-07-28T21:15:14.287", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1427865", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36339.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36339.json index ea39a6b195d..2e75cb9b99c 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36339.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36339.json @@ -2,23 +2,82 @@ "id": "CVE-2023-36339", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-21T20:15:15.887", - "lastModified": "2023-07-25T01:15:09.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-28T21:57:14.937", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An access control issue in WebBoss.io CMS v3.7.0.1 allows attackers to access the Website Backup Tool via a crafted GET request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webboss:webboss.io_cms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.7.0.1", + "matchCriteriaId": "CA1D5124-C407-4F16-9B0F-28152A1F7E64" + } + ] + } + ] + } + ], "references": [ { "url": "https://webboss.feedbear.com/updates", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.realinfosec.net/advisories/WEBBOSS-CMS-IDOR-2023-0xv3jsv.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36495.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36495.json index 0c015cbed89..1876b090b8c 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36495.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36495.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36495", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-28T05:15:10.637", - "lastModified": "2023-07-28T13:44:31.450", + "lastModified": "2023-07-28T21:15:13.387", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -35,6 +35,30 @@ { "url": "https://support.apple.com/en-us/HT213848", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213841", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213846", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213848", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37285.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37285.json index d78916199b3..7d8717a0ad0 100644 --- a/CVE-2023/CVE-2023-372xx/CVE-2023-37285.json +++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37285.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37285", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-28T05:15:10.690", - "lastModified": "2023-07-28T13:44:31.450", + "lastModified": "2023-07-28T21:15:13.553", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -27,6 +27,22 @@ { "url": "https://support.apple.com/en-us/HT213845", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213845", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3791.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3791.json index 4037cb0e920..60ceb46922b 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3791.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3791.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3791", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-20T18:15:12.353", - "lastModified": "2023-07-21T12:52:36.740", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-28T21:58:15.107", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -61,7 +83,7 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -69,20 +91,57 @@ "value": "CWE-89" } ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibos:ibos:4.5.5:*:*:*:*:*:*:*", + "matchCriteriaId": "1F678D76-48AA-4940-833F-5567D196DB7D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/zry-wyj/cve/blob/main/ibos.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.235058", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.235058", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38565.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38565.json index a23a189aff0..c442c16a3ba 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38565.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38565.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38565", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T01:15:36.677", - "lastModified": "2023-07-27T12:13:11.147", + "lastModified": "2023-07-28T21:15:13.620", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -31,6 +31,14 @@ { "url": "https://support.apple.com/en-us/HT213848", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213846", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38571.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38571.json index 451d60e131d..4625ef7e379 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38571.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38571.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38571", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-28T05:15:10.743", - "lastModified": "2023-07-28T13:44:31.450", + "lastModified": "2023-07-28T21:15:13.683", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -23,6 +23,18 @@ { "url": "https://support.apple.com/en-us/HT213845", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213845", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38590.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38590.json index 50fb0c3faeb..fb35dbaa782 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38590.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38590.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38590", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-28T05:15:10.810", - "lastModified": "2023-07-28T13:44:31.450", + "lastModified": "2023-07-28T21:15:13.750", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -39,6 +39,34 @@ { "url": "https://support.apple.com/en-us/HT213848", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213841", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213845", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213846", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213848", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38593.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38593.json index 1789e324b82..827e5b00a34 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38593.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38593.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38593", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T01:15:37.330", - "lastModified": "2023-07-27T12:13:11.147", + "lastModified": "2023-07-28T21:15:13.820", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -31,6 +31,14 @@ { "url": "https://support.apple.com/en-us/HT213848", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213846", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38598.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38598.json index 9cd29d48a33..4dee3fffaf9 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38598.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38598.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38598", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-28T05:15:10.937", - "lastModified": "2023-07-28T13:44:31.450", + "lastModified": "2023-07-28T21:15:13.883", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -39,6 +39,34 @@ { "url": "https://support.apple.com/en-us/HT213848", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213841", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213845", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213846", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213848", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38601.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38601.json index 7db9ad2c86f..1d9b354a9cb 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38601.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38601.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38601", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-28T05:15:11.050", - "lastModified": "2023-07-28T13:44:31.450", + "lastModified": "2023-07-28T21:15:13.957", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -23,6 +23,18 @@ { "url": "https://support.apple.com/en-us/HT213845", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213845", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38603.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38603.json index 26eb79f1bcd..b905700fa2b 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38603.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38603.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38603", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T01:15:38.630", - "lastModified": "2023-07-27T12:13:11.147", + "lastModified": "2023-07-28T21:15:14.020", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -19,6 +19,18 @@ { "url": "https://support.apple.com/en-us/HT213843", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213845", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38604.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38604.json index 06be18be438..ae415e135db 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38604.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38604.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38604", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-28T05:15:11.097", - "lastModified": "2023-07-28T13:44:31.450", + "lastModified": "2023-07-28T21:15:14.087", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -39,6 +39,34 @@ { "url": "https://support.apple.com/en-us/HT213848", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213841", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213845", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213846", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213848", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38609.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38609.json index b9091aeb20f..e8c33be1a76 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38609.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38609.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38609", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-28T05:15:11.150", - "lastModified": "2023-07-28T13:44:31.450", + "lastModified": "2023-07-28T21:15:14.157", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -15,6 +15,10 @@ { "url": "https://support.apple.com/en-us/HT213843", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213843", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38988.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38988.json new file mode 100644 index 00000000000..f132cb3bc31 --- /dev/null +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38988.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-38988", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-07-28T21:15:14.213", + "lastModified": "2023-07-28T21:15:14.213", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in the delete function in the OaNotifyController class of jeesite v1.2.6 allows authenticated attackers to arbitrarily delete notifications created by Administrators." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/thinkgem/jeesite/issues/517", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3841.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3841.json index c58ab00803f..a5d28cf38c5 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3841.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3841.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3841", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-23T03:15:10.010", - "lastModified": "2023-07-24T13:09:06.887", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-28T21:46:34.193", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -75,14 +97,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nxfilter:nxfilter:4.3.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "398BEE30-6A58-498C-84C1-1D8528615153" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.235192", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.235192", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 50362bc52c1..16fc556454c 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-07-28T20:00:28.468243+00:00 +2023-07-28T22:00:25.228956+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-07-28T19:39:59.777000+00:00 +2023-07-28T21:58:15.107000+00:00 ``` ### Last Data Feed Release @@ -29,44 +29,41 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -221236 +221238 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `2` +* [CVE-2023-38988](CVE-2023/CVE-2023-389xx/CVE-2023-38988.json) (`2023-07-28T21:15:14.213`) +* [CVE-2023-3598](CVE-2023/CVE-2023-35xx/CVE-2023-3598.json) (`2023-07-28T21:15:14.287`) ### CVEs modified in the last Commit -Recently modified CVEs: `29` +Recently modified CVEs: `20` -* [CVE-2020-27777](CVE-2020/CVE-2020-277xx/CVE-2020-27777.json) (`2023-07-28T19:39:28.790`) -* [CVE-2020-25668](CVE-2020/CVE-2020-256xx/CVE-2020-25668.json) (`2023-07-28T19:39:59.777`) -* [CVE-2021-23133](CVE-2021/CVE-2021-231xx/CVE-2021-23133.json) (`2023-07-28T19:34:47.840`) -* [CVE-2021-20292](CVE-2021/CVE-2021-202xx/CVE-2021-20292.json) (`2023-07-28T19:35:59.133`) -* [CVE-2023-3837](CVE-2023/CVE-2023-38xx/CVE-2023-3837.json) (`2023-07-28T18:16:20.490`) -* [CVE-2023-3836](CVE-2023/CVE-2023-38xx/CVE-2023-3836.json) (`2023-07-28T18:17:17.343`) -* [CVE-2023-3881](CVE-2023/CVE-2023-38xx/CVE-2023-3881.json) (`2023-07-28T18:21:32.553`) -* [CVE-2023-3888](CVE-2023/CVE-2023-38xx/CVE-2023-3888.json) (`2023-07-28T18:21:37.507`) -* [CVE-2023-36884](CVE-2023/CVE-2023-368xx/CVE-2023-36884.json) (`2023-07-28T18:22:24.783`) -* [CVE-2023-3880](CVE-2023/CVE-2023-38xx/CVE-2023-3880.json) (`2023-07-28T18:22:44.390`) -* [CVE-2023-3839](CVE-2023/CVE-2023-38xx/CVE-2023-3839.json) (`2023-07-28T18:47:48.480`) -* [CVE-2023-34625](CVE-2023/CVE-2023-346xx/CVE-2023-34625.json) (`2023-07-28T19:00:46.247`) -* [CVE-2023-28754](CVE-2023/CVE-2023-287xx/CVE-2023-28754.json) (`2023-07-28T19:01:07.280`) -* [CVE-2023-3446](CVE-2023/CVE-2023-34xx/CVE-2023-3446.json) (`2023-07-28T19:02:27.320`) -* [CVE-2023-3792](CVE-2023/CVE-2023-37xx/CVE-2023-3792.json) (`2023-07-28T19:03:10.387`) -* [CVE-2023-3883](CVE-2023/CVE-2023-38xx/CVE-2023-3883.json) (`2023-07-28T19:03:18.153`) -* [CVE-2023-3882](CVE-2023/CVE-2023-38xx/CVE-2023-3882.json) (`2023-07-28T19:03:22.230`) -* [CVE-2023-3840](CVE-2023/CVE-2023-38xx/CVE-2023-3840.json) (`2023-07-28T19:03:29.123`) -* [CVE-2023-3886](CVE-2023/CVE-2023-38xx/CVE-2023-3886.json) (`2023-07-28T19:03:35.613`) -* [CVE-2023-3885](CVE-2023/CVE-2023-38xx/CVE-2023-3885.json) (`2023-07-28T19:03:41.597`) -* [CVE-2023-3884](CVE-2023/CVE-2023-38xx/CVE-2023-3884.json) (`2023-07-28T19:03:58.700`) -* [CVE-2023-3887](CVE-2023/CVE-2023-38xx/CVE-2023-3887.json) (`2023-07-28T19:04:31.193`) -* [CVE-2023-3879](CVE-2023/CVE-2023-38xx/CVE-2023-3879.json) (`2023-07-28T19:25:27.190`) -* [CVE-2023-3878](CVE-2023/CVE-2023-38xx/CVE-2023-3878.json) (`2023-07-28T19:25:31.317`) -* [CVE-2023-3877](CVE-2023/CVE-2023-38xx/CVE-2023-3877.json) (`2023-07-28T19:25:40.590`) +* [CVE-2023-32364](CVE-2023/CVE-2023-323xx/CVE-2023-32364.json) (`2023-07-28T21:15:09.927`) +* [CVE-2023-32429](CVE-2023/CVE-2023-324xx/CVE-2023-32429.json) (`2023-07-28T21:15:11.213`) +* [CVE-2023-32444](CVE-2023/CVE-2023-324xx/CVE-2023-32444.json) (`2023-07-28T21:15:11.497`) +* [CVE-2023-32654](CVE-2023/CVE-2023-326xx/CVE-2023-32654.json) (`2023-07-28T21:15:11.807`) +* [CVE-2023-34241](CVE-2023/CVE-2023-342xx/CVE-2023-34241.json) (`2023-07-28T21:15:12.083`) +* [CVE-2023-34425](CVE-2023/CVE-2023-344xx/CVE-2023-34425.json) (`2023-07-28T21:15:13.047`) +* [CVE-2023-36495](CVE-2023/CVE-2023-364xx/CVE-2023-36495.json) (`2023-07-28T21:15:13.387`) +* [CVE-2023-37285](CVE-2023/CVE-2023-372xx/CVE-2023-37285.json) (`2023-07-28T21:15:13.553`) +* [CVE-2023-38565](CVE-2023/CVE-2023-385xx/CVE-2023-38565.json) (`2023-07-28T21:15:13.620`) +* [CVE-2023-38571](CVE-2023/CVE-2023-385xx/CVE-2023-38571.json) (`2023-07-28T21:15:13.683`) +* [CVE-2023-38590](CVE-2023/CVE-2023-385xx/CVE-2023-38590.json) (`2023-07-28T21:15:13.750`) +* [CVE-2023-38593](CVE-2023/CVE-2023-385xx/CVE-2023-38593.json) (`2023-07-28T21:15:13.820`) +* [CVE-2023-38598](CVE-2023/CVE-2023-385xx/CVE-2023-38598.json) (`2023-07-28T21:15:13.883`) +* [CVE-2023-38601](CVE-2023/CVE-2023-386xx/CVE-2023-38601.json) (`2023-07-28T21:15:13.957`) +* [CVE-2023-38603](CVE-2023/CVE-2023-386xx/CVE-2023-38603.json) (`2023-07-28T21:15:14.020`) +* [CVE-2023-38604](CVE-2023/CVE-2023-386xx/CVE-2023-38604.json) (`2023-07-28T21:15:14.087`) +* [CVE-2023-38609](CVE-2023/CVE-2023-386xx/CVE-2023-38609.json) (`2023-07-28T21:15:14.157`) +* [CVE-2023-3841](CVE-2023/CVE-2023-38xx/CVE-2023-3841.json) (`2023-07-28T21:46:34.193`) +* [CVE-2023-36339](CVE-2023/CVE-2023-363xx/CVE-2023-36339.json) (`2023-07-28T21:57:14.937`) +* [CVE-2023-3791](CVE-2023/CVE-2023-37xx/CVE-2023-3791.json) (`2023-07-28T21:58:15.107`) ## Download and Usage