diff --git a/CVE-2021/CVE-2021-313xx/CVE-2021-31314.json b/CVE-2021/CVE-2021-313xx/CVE-2021-31314.json new file mode 100644 index 00000000000..2262fd6248f --- /dev/null +++ b/CVE-2021/CVE-2021-313xx/CVE-2021-31314.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2021-31314", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-20T01:15:07.770", + "lastModified": "2024-01-20T02:58:09.603", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "File upload vulnerability in ejinshan v8+ terminal security system allows attackers to upload arbitrary files to arbitrary locations on the server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/huahaiYa/jinshansoft/blob/main/Kingsoft%20Security%20Arbitrary%20File%20Upload%20%2B%20File%20Contains%20Vulnerabilities.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47024.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47024.json new file mode 100644 index 00000000000..db871b0759e --- /dev/null +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47024.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-47024", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-20T02:15:07.600", + "lastModified": "2024-01-20T02:58:09.603", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Request Forgery vulnerability in NCR Terminal Handler v.1.5.1 allows a remote attacker to obtain sensitive information and escalate privileges via a crafted script to the UserSelfService component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.google.com/document/d/18EOsFghBsAme0b3Obur8Oc6h5xV9zUCNKyQLw5ERs9Q/edit?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Patrick0x41/Security-Advisories/tree/main/CVE-2023-47024", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51729.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51729.json index d6434aaf824..92c750b396e 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51729.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51729.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51729", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-01-17T07:15:52.113", - "lastModified": "2024-01-17T14:01:37.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-20T02:45:53.173", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -50,10 +80,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51730.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51730.json index 23e6cffc135..614f37953a3 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51730.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51730.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51730", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-01-17T07:15:52.710", - "lastModified": "2024-01-17T14:01:37.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-20T02:46:01.520", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -50,10 +80,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51731.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51731.json index 38c523de234..ac2bd9e0ca6 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51731.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51731.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51731", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-01-17T07:15:53.290", - "lastModified": "2024-01-17T14:01:37.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-20T02:46:14.247", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -50,10 +80,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51732.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51732.json index 9d2904689cd..e425de0c8e8 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51732.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51732.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51732", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-01-17T07:15:53.873", - "lastModified": "2024-01-17T14:01:37.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-20T02:46:20.933", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -50,10 +80,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51733.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51733.json index c3292d865b7..a4cbbc631b9 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51733.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51733.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51733", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-01-17T08:15:36.110", - "lastModified": "2024-01-17T14:01:37.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-20T02:46:44.103", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -50,10 +80,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51734.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51734.json index 826bd3cf1ac..32f47670a5d 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51734.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51734.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51734", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-01-17T08:15:36.477", - "lastModified": "2024-01-17T14:01:37.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-20T02:46:49.553", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -50,10 +80,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51735.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51735.json index c61c2292a3e..e7779e469cc 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51735.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51735.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51735", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-01-17T08:15:36.730", - "lastModified": "2024-01-17T14:01:37.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-20T02:46:54.347", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -50,10 +80,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51736.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51736.json index d8ad5545bae..180745a77ee 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51736.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51736.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51736", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-01-17T08:15:36.990", - "lastModified": "2024-01-17T14:01:37.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-20T02:46:57.723", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -50,10 +80,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51737.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51737.json index 204a0e8b4f2..ddf99e0b0c8 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51737.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51737.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51737", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-01-17T08:15:37.230", - "lastModified": "2024-01-17T14:01:37.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-20T02:47:01.867", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -50,10 +80,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51740.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51740.json index c7dc2faf207..4f128a9e7b7 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51740.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51740.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51740", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-01-17T08:15:37.970", - "lastModified": "2024-01-17T14:01:37.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-20T02:47:22.467", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -50,10 +80,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51741.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51741.json index 533a66e00ed..ed5ca34c6b6 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51741.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51741.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51741", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-01-17T08:15:38.223", - "lastModified": "2024-01-17T14:01:37.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-20T02:47:27.847", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -50,10 +80,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51742.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51742.json index 05042a73126..a2180ce149b 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51742.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51742.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51742", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-01-17T08:15:38.487", - "lastModified": "2024-01-17T14:01:37.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-20T02:47:30.753", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -50,10 +80,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51743.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51743.json index 0ef357ec510..3f12128c96c 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51743.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51743.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51743", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-01-17T08:15:38.750", - "lastModified": "2024-01-17T14:01:37.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-20T02:45:39.117", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -50,10 +80,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF6B1EE-BD96-454A-BDDC-A84377358F13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F250D98F-03F0-4F0D-A3B3-83295D026881" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51892.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51892.json new file mode 100644 index 00000000000..9d85b9fec4f --- /dev/null +++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51892.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-51892", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-20T01:15:07.857", + "lastModified": "2024-01-20T02:58:09.603", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue in weaver e-cology v.10.0.2310.01 allows a remote attacker to execute arbitrary code via a crafted script to the FrameworkShellController component." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://e-cology.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51892.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.weaver.com.cn/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51906.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51906.json new file mode 100644 index 00000000000..de2f843222b --- /dev/null +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51906.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-51906", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-20T02:15:07.670", + "lastModified": "2024-01-20T02:58:09.603", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue in yonyou YonBIP v3_23.05 allows a remote attacker to execute arbitrary code via a crafted script to the ServiceDispatcherServlet uap.framework.rc.itf.IResourceManager component." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://yonbip.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51906.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.yonyou.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51924.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51924.json new file mode 100644 index 00000000000..9d5de51be49 --- /dev/null +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51924.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-51924", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-20T02:15:07.723", + "lastModified": "2024-01-20T02:58:09.603", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file upload vulnerability in the uap.framework.rc.itf.IResourceManager interface of YonBIP v3_23.05 allows attackers to execute arbitrary code via uploading a crafted file." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://yonbip.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51924.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.yonyou.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51925.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51925.json new file mode 100644 index 00000000000..c428f0846d3 --- /dev/null +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51925.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-51925", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-20T02:15:07.773", + "lastModified": "2024-01-20T02:58:09.603", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file upload vulnerability in the nccloud.web.arcp.taskmonitor.action.ArcpUploadAction.doAction() method of YonBIP v3_23.05 allows attackers to execute arbitrary code via uploading a crafted file." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://yonbip.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51925.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.yonyou.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51926.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51926.json new file mode 100644 index 00000000000..56bc37568ff --- /dev/null +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51926.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-51926", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-20T01:15:07.907", + "lastModified": "2024-01-20T02:58:09.603", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "YonBIP v3_23.05 was discovered to contain an arbitrary file read vulnerability via the nc.bs.framework.comn.serv.CommonServletDispatcher component." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://yonbip.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51926.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.yonyou.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51927.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51927.json new file mode 100644 index 00000000000..1cf52fa8dd3 --- /dev/null +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51927.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-51927", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-20T01:15:07.957", + "lastModified": "2024-01-20T02:58:09.603", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "YonBIP v3_23.05 was discovered to contain a SQL injection vulnerability via the com.yonyou.hrcloud.attend.web.AttendScriptController.runScript() method." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://yonbip.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51927.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.yonyou.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51928.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51928.json new file mode 100644 index 00000000000..bb21d3c2356 --- /dev/null +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51928.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-51928", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-20T01:15:08.010", + "lastModified": "2024-01-20T02:58:09.603", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file upload vulnerability in the nccloud.web.arcp.taskmonitor.action.ArcpUploadAction.doAction() method of YonBIP v3_23.05 allows attackers to execute arbitrary code via uploading a crafted file." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://yonbip.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51928.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.yonyou.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23332.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23332.json index 4d7029645cd..9938a2cd0b9 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23332.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23332.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23332", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-19T23:15:07.930", - "lastModified": "2024-01-19T23:15:07.930", - "vulnStatus": "Received", + "lastModified": "2024-01-20T02:58:09.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index b1df5d28c92..d638eed3520 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-20T00:55:24.057895+00:00 +2024-01-20T03:00:25.488368+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-19T23:15:07.930000+00:00 +2024-01-20T02:58:09.603000+00:00 ``` ### Last Data Feed Release @@ -23,26 +23,48 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-01-19T01:00:28.268681+00:00 +2024-01-20T01:00:28.246821+00:00 ``` ### Total Number of included CVEs ```plain -236454 +236463 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `9` -* [CVE-2024-23332](CVE-2024/CVE-2024-233xx/CVE-2024-23332.json) (`2024-01-19T23:15:07.930`) +* [CVE-2021-31314](CVE-2021/CVE-2021-313xx/CVE-2021-31314.json) (`2024-01-20T01:15:07.770`) +* [CVE-2023-51892](CVE-2023/CVE-2023-518xx/CVE-2023-51892.json) (`2024-01-20T01:15:07.857`) +* [CVE-2023-51926](CVE-2023/CVE-2023-519xx/CVE-2023-51926.json) (`2024-01-20T01:15:07.907`) +* [CVE-2023-51927](CVE-2023/CVE-2023-519xx/CVE-2023-51927.json) (`2024-01-20T01:15:07.957`) +* [CVE-2023-51928](CVE-2023/CVE-2023-519xx/CVE-2023-51928.json) (`2024-01-20T01:15:08.010`) +* [CVE-2023-47024](CVE-2023/CVE-2023-470xx/CVE-2023-47024.json) (`2024-01-20T02:15:07.600`) +* [CVE-2023-51906](CVE-2023/CVE-2023-519xx/CVE-2023-51906.json) (`2024-01-20T02:15:07.670`) +* [CVE-2023-51924](CVE-2023/CVE-2023-519xx/CVE-2023-51924.json) (`2024-01-20T02:15:07.723`) +* [CVE-2023-51925](CVE-2023/CVE-2023-519xx/CVE-2023-51925.json) (`2024-01-20T02:15:07.773`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` - +Recently modified CVEs: `14` + +* [CVE-2023-51743](CVE-2023/CVE-2023-517xx/CVE-2023-51743.json) (`2024-01-20T02:45:39.117`) +* [CVE-2023-51729](CVE-2023/CVE-2023-517xx/CVE-2023-51729.json) (`2024-01-20T02:45:53.173`) +* [CVE-2023-51730](CVE-2023/CVE-2023-517xx/CVE-2023-51730.json) (`2024-01-20T02:46:01.520`) +* [CVE-2023-51731](CVE-2023/CVE-2023-517xx/CVE-2023-51731.json) (`2024-01-20T02:46:14.247`) +* [CVE-2023-51732](CVE-2023/CVE-2023-517xx/CVE-2023-51732.json) (`2024-01-20T02:46:20.933`) +* [CVE-2023-51733](CVE-2023/CVE-2023-517xx/CVE-2023-51733.json) (`2024-01-20T02:46:44.103`) +* [CVE-2023-51734](CVE-2023/CVE-2023-517xx/CVE-2023-51734.json) (`2024-01-20T02:46:49.553`) +* [CVE-2023-51735](CVE-2023/CVE-2023-517xx/CVE-2023-51735.json) (`2024-01-20T02:46:54.347`) +* [CVE-2023-51736](CVE-2023/CVE-2023-517xx/CVE-2023-51736.json) (`2024-01-20T02:46:57.723`) +* [CVE-2023-51737](CVE-2023/CVE-2023-517xx/CVE-2023-51737.json) (`2024-01-20T02:47:01.867`) +* [CVE-2023-51740](CVE-2023/CVE-2023-517xx/CVE-2023-51740.json) (`2024-01-20T02:47:22.467`) +* [CVE-2023-51741](CVE-2023/CVE-2023-517xx/CVE-2023-51741.json) (`2024-01-20T02:47:27.847`) +* [CVE-2023-51742](CVE-2023/CVE-2023-517xx/CVE-2023-51742.json) (`2024-01-20T02:47:30.753`) +* [CVE-2024-23332](CVE-2024/CVE-2024-233xx/CVE-2024-23332.json) (`2024-01-20T02:58:09.603`) ## Download and Usage