Skip to content

Commit

Permalink
Auto-Update: 2024-01-16T03:00:25.713699+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Jan 16, 2024
1 parent 16e56f4 commit 5929452
Show file tree
Hide file tree
Showing 23 changed files with 461 additions and 23 deletions.
6 changes: 5 additions & 1 deletion CVE-2009/CVE-2009-41xx/CVE-2009-4128.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2009-4128",
"sourceIdentifier": "[email protected]",
"published": "2009-12-01T16:30:01.467",
"lastModified": "2017-08-17T01:31:27.337",
"lastModified": "2024-01-16T01:15:33.613",
"vulnStatus": "Modified",
"descriptions": [
{
Expand Down Expand Up @@ -78,6 +78,10 @@
"Exploit"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/15/3",
"source": "[email protected]"
},
{
"url": "http://www.securityfocus.com/bid/36968",
"source": "[email protected]",
Expand Down
6 changes: 5 additions & 1 deletion CVE-2012/CVE-2012-23xx/CVE-2012-2314.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2012-2314",
"sourceIdentifier": "[email protected]",
"published": "2012-07-03T22:55:01.117",
"lastModified": "2023-11-07T02:10:29.857",
"lastModified": "2024-01-16T01:15:33.763",
"vulnStatus": "Modified",
"descriptions": [
{
Expand Down Expand Up @@ -90,6 +90,10 @@
"url": "http://www.openwall.com/lists/oss-security/2012/05/04/12",
"source": "[email protected]"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/15/3",
"source": "[email protected]"
},
{
"url": "http://www.securityfocus.com/bid/53486",
"source": "[email protected]"
Expand Down
8 changes: 6 additions & 2 deletions CVE-2013/CVE-2013-45xx/CVE-2013-4577.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2013-4577",
"sourceIdentifier": "[email protected]",
"published": "2014-05-12T14:55:05.023",
"lastModified": "2014-05-12T16:43:05.353",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-16T01:15:33.860",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand Down Expand Up @@ -85,6 +85,10 @@
"Patch"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/15/3",
"source": "[email protected]"
},
{
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632598",
"source": "[email protected]"
Expand Down
6 changes: 5 additions & 1 deletion CVE-2015/CVE-2015-83xx/CVE-2015-8370.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2015-8370",
"sourceIdentifier": "[email protected]",
"published": "2015-12-16T21:59:04.063",
"lastModified": "2018-10-09T19:58:30.253",
"lastModified": "2024-01-16T01:15:33.947",
"vulnStatus": "Modified",
"descriptions": [
{
Expand Down Expand Up @@ -169,6 +169,10 @@
"url": "http://www.openwall.com/lists/oss-security/2015/12/15/6",
"source": "[email protected]"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/15/3",
"source": "[email protected]"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"source": "[email protected]",
Expand Down
6 changes: 5 additions & 1 deletion CVE-2021/CVE-2021-39xx/CVE-2021-3981.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2021-3981",
"sourceIdentifier": "[email protected]",
"published": "2022-03-10T17:43:14.770",
"lastModified": "2023-02-12T23:43:06.467",
"lastModified": "2024-01-16T01:15:34.110",
"vulnStatus": "Modified",
"descriptions": [
{
Expand Down Expand Up @@ -119,6 +119,10 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/15/3",
"source": "[email protected]"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024170",
"source": "[email protected]",
Expand Down
8 changes: 6 additions & 2 deletions CVE-2022/CVE-2022-464xx/CVE-2022-46480.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2022-46480",
"sourceIdentifier": "[email protected]",
"published": "2023-12-05T00:15:07.460",
"lastModified": "2023-12-08T17:27:55.003",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-16T02:15:28.090",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand Down Expand Up @@ -84,6 +84,10 @@
}
],
"references": [
{
"url": "https://arxiv.org/abs/2312.00021",
"source": "[email protected]"
},
{
"url": "https://www.researchgate.net/publication/375759408_Technical_Report_-_CVE-2022-46480_CVE-2023-26941_CVE-2023-26942_and_CVE-2023-26943#fullTextFileContent",
"source": "[email protected]",
Expand Down
8 changes: 6 additions & 2 deletions CVE-2023/CVE-2023-269xx/CVE-2023-26941.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-26941",
"sourceIdentifier": "[email protected]",
"published": "2023-12-05T00:15:08.110",
"lastModified": "2023-12-08T17:27:42.643",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-16T02:15:28.207",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand Down Expand Up @@ -80,6 +80,10 @@
}
],
"references": [
{
"url": "https://arxiv.org/abs/2312.00021",
"source": "[email protected]"
},
{
"url": "https://www.researchgate.net/publication/375759408_Technical_Report_-_CVE-2022-46480_CVE-2023-26941_CVE-2023-26942_and_CVE-2023-26943#fullTextFileContent",
"source": "[email protected]",
Expand Down
8 changes: 6 additions & 2 deletions CVE-2023/CVE-2023-269xx/CVE-2023-26942.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-26942",
"sourceIdentifier": "[email protected]",
"published": "2023-12-05T00:15:08.163",
"lastModified": "2023-12-08T17:27:34.710",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-16T02:15:28.283",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand Down Expand Up @@ -80,6 +80,10 @@
}
],
"references": [
{
"url": "https://arxiv.org/abs/2312.00021",
"source": "[email protected]"
},
{
"url": "https://www.researchgate.net/publication/375759408_Technical_Report_-_CVE-2022-46480_CVE-2023-26941_CVE-2023-26942_and_CVE-2023-26943#fullTextFileContent",
"source": "[email protected]",
Expand Down
8 changes: 6 additions & 2 deletions CVE-2023/CVE-2023-269xx/CVE-2023-26943.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-26943",
"sourceIdentifier": "[email protected]",
"published": "2023-12-05T00:15:08.227",
"lastModified": "2023-12-08T17:27:23.397",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-16T02:15:28.350",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand Down Expand Up @@ -80,6 +80,10 @@
}
],
"references": [
{
"url": "https://arxiv.org/abs/2312.00021",
"source": "[email protected]"
},
{
"url": "https://www.researchgate.net/publication/375759408_Technical_Report_-_CVE-2022-46480_CVE-2023-26941_CVE-2023-26942_and_CVE-2023-26943#fullTextFileContent",
"source": "[email protected]",
Expand Down
6 changes: 5 additions & 1 deletion CVE-2023/CVE-2023-40xx/CVE-2023-4001.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-4001",
"sourceIdentifier": "[email protected]",
"published": "2024-01-15T11:15:08.270",
"lastModified": "2024-01-15T12:15:43.243",
"lastModified": "2024-01-16T01:15:34.820",
"vulnStatus": "Received",
"descriptions": [
{
Expand Down Expand Up @@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/15/3",
"source": "[email protected]"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4001",
"source": "[email protected]"
Expand Down
24 changes: 24 additions & 0 deletions CVE-2023/CVE-2023-416xx/CVE-2023-41619.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
{
"id": "CVE-2023-41619",
"sourceIdentifier": "[email protected]",
"published": "2024-01-16T01:15:34.233",
"lastModified": "2024-01-16T01:15:34.233",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Emlog Pro v2.1.14 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/article.php?action=write."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/GhostBalladw/wuhaozhe-s-CVE/blob/main/CVE-2023-41619",
"source": "[email protected]"
},
{
"url": "https://github.com/emlog/emlog",
"source": "[email protected]"
}
]
}
20 changes: 20 additions & 0 deletions CVE-2023/CVE-2023-434xx/CVE-2023-43449.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
{
"id": "CVE-2023-43449",
"sourceIdentifier": "[email protected]",
"published": "2024-01-16T02:15:28.420",
"lastModified": "2024-01-16T02:15:28.420",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in HummerRisk HummerRisk v.1.10 thru 1.4.1 allows an authenticated attacker to execute arbitrary code via a crafted request to the service/LicenseService component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/HummerRisk/HummerRisk/issues/446",
"source": "[email protected]"
}
]
}
24 changes: 24 additions & 0 deletions CVE-2023/CVE-2023-474xx/CVE-2023-47459.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
{
"id": "CVE-2023-47459",
"sourceIdentifier": "[email protected]",
"published": "2024-01-16T01:15:34.283",
"lastModified": "2024-01-16T01:15:34.283",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in Knovos Discovery v.22.67.0 allows a remote attacker to obtain sensitive information via the /DiscoveryReview/Service/CaseManagement.svc/GetProductSiteName component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/aleksey-vi/CVE-2023-47459",
"source": "[email protected]"
},
{
"url": "https://www.knovos.com",
"source": "[email protected]"
}
]
}
24 changes: 24 additions & 0 deletions CVE-2023/CVE-2023-474xx/CVE-2023-47460.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
{
"id": "CVE-2023-47460",
"sourceIdentifier": "[email protected]",
"published": "2024-01-16T01:15:34.327",
"lastModified": "2024-01-16T01:15:34.327",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in Knovos Discovery v.22.67.0 allows a remote attacker to execute arbitrary code via the /DiscoveryProcess/Service/Admin.svc/getGridColumnStructure component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/aleksey-vi/CVE-2023-47460",
"source": "[email protected]"
},
{
"url": "https://www.knovos.com",
"source": "[email protected]"
}
]
}
24 changes: 24 additions & 0 deletions CVE-2023/CVE-2023-481xx/CVE-2023-48104.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
{
"id": "CVE-2023-48104",
"sourceIdentifier": "[email protected]",
"published": "2024-01-16T01:15:34.370",
"lastModified": "2024-01-16T01:15:34.370",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Alinto SOGo 5.8.0 is vulnerable to HTML Injection."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Alinto/sogo/commit/7481ccf37087c3f456d7e5a844da01d0f8883098",
"source": "[email protected]"
},
{
"url": "https://github.com/E1tex/CVE-2023-48104",
"source": "[email protected]"
}
]
}
55 changes: 55 additions & 0 deletions CVE-2023/CVE-2023-491xx/CVE-2023-49106.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
{
"id": "CVE-2023-49106",
"sourceIdentifier": "[email protected]",
"published": "2024-01-16T01:15:34.423",
"lastModified": "2024-01-16T01:15:34.423",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Password Field Masking vulnerability in Hitachi Device Manager on Windows, Linux (Device Manager Agent component).This issue affects Hitachi Device Manager: before 8.8.5-04.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-549"
}
]
}
],
"references": [
{
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-101/index.html",
"source": "[email protected]"
}
]
}
Loading

0 comments on commit 5929452

Please sign in to comment.