Auto-Update: 2023-04-25T16:00:23.432658+00:00

This commit is contained in:
René Helmke 2023-04-25 18:00:26 +02:00
parent 4344218689
commit 0c658a5edb
15 changed files with 73 additions and 109 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42335",
"sourceIdentifier": "security@xen.org",
"published": "2023-04-25T13:15:09.643",
"lastModified": "2023-04-25T14:15:09.317",
"vulnStatus": "Received",
"lastModified": "2023-04-25T15:57:53.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,10 @@
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/04/25/1",
"source": "security@xen.org"
},
{
"url": "http://xenbits.xen.org/xsa/advisory-430.html",
"source": "security@xen.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2281",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-04-25T14:15:09.423",
"lastModified": "2023-04-25T14:15:09.423",
"vulnStatus": "Received",
"lastModified": "2023-04-25T15:57:53.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25346",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T13:15:09.710",
"lastModified": "2023-04-25T13:15:09.710",
"vulnStatus": "Received",
"lastModified": "2023-04-25T15:57:53.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25347",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T13:15:09.753",
"lastModified": "2023-04-25T13:15:09.753",
"vulnStatus": "Received",
"lastModified": "2023-04-25T15:57:53.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25348",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T13:15:09.800",
"lastModified": "2023-04-25T13:15:09.800",
"vulnStatus": "Received",
"lastModified": "2023-04-25T15:57:53.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26057",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T13:15:09.847",
"lastModified": "2023-04-25T13:15:09.847",
"vulnStatus": "Received",
"lastModified": "2023-04-25T15:57:53.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26058",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T13:15:09.900",
"lastModified": "2023-04-25T13:15:09.900",
"vulnStatus": "Received",
"lastModified": "2023-04-25T15:57:53.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26839",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T13:15:09.947",
"lastModified": "2023-04-25T13:15:09.947",
"vulnStatus": "Received",
"lastModified": "2023-04-25T15:57:53.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26840",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T13:15:09.987",
"lastModified": "2023-04-25T13:15:09.987",
"vulnStatus": "Received",
"lastModified": "2023-04-25T15:57:53.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26841",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T13:15:10.027",
"lastModified": "2023-04-25T13:15:10.027",
"vulnStatus": "Received",
"lastModified": "2023-04-25T15:57:53.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26843",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T13:15:10.063",
"lastModified": "2023-04-25T13:15:10.063",
"vulnStatus": "Received",
"lastModified": "2023-04-25T15:57:53.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-27105",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T15:15:08.783",
"lastModified": "2023-04-25T15:57:53.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Wi-Fi file transfer module of Shanling M5S Portable Music Player with Shanling MTouch OS v4.3 and Shanling M2X Portable Music Player with Shanling MTouch OS v3.3 allows attackers to arbitrarily read, delete, or modify any critical system files via directory traversal."
}
],
"metrics": {},
"references": [
{
"url": "https://en.shanling.com/",
"source": "cve@mitre.org"
},
{
"url": "https://hexavector.github.io/4bf46f12/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29779",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T14:15:09.383",
"lastModified": "2023-04-25T14:15:09.383",
"vulnStatus": "Received",
"lastModified": "2023-04-25T15:57:53.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30417",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T13:15:10.103",
"lastModified": "2023-04-25T13:15:10.103",
"vulnStatus": "Received",
"lastModified": "2023-04-25T15:57:53.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

102
README.md
View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD in 2 hour periods.
### Last repository update
```plain
2023-04-25T15:08:22.739572+00:00
2023-04-25T16:00:23.432658+00:00
```
### Most recent CVE modification timestamp synchronized with NVD
```plain
2023-04-25T14:33:00.543000+00:00
2023-04-25T15:57:53.957000+00:00
```
### Last Data Feed release
@ -29,97 +29,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-datafeeds/r
### Total numbers of included CVEs
```plain
213496
213497
```
### CVEs added in the last commit
Recently added CVEs: `0`
Recently added CVEs: `1`
* CVE-2023-27105 (*2023-04-25T15:15:08.783*)
### CVEs modified in the last commit
Recently modified CVEs: `78`
Recently modified CVEs: `13`
* CVE-2012-10013 (*2023-04-25T12:52:57.877*)
* CVE-2012-10014 (*2023-04-25T12:52:57.877*)
* CVE-2022-28354 (*2023-04-25T12:52:57.877*)
* CVE-2022-37462 (*2023-04-25T13:12:59.477*)
* CVE-2022-42335 (*2023-04-25T14:15:09.317*)
* CVE-2022-45837 (*2023-04-25T12:52:57.877*)
* CVE-2022-48177 (*2023-04-25T13:14:33.873*)
* CVE-2023-0276 (*2023-04-25T12:52:57.877*)
* CVE-2023-0388 (*2023-04-25T12:52:57.877*)
* CVE-2023-0418 (*2023-04-25T12:52:57.877*)
* CVE-2023-0420 (*2023-04-25T12:52:57.877*)
* CVE-2023-0424 (*2023-04-25T12:52:57.877*)
* CVE-2023-0899 (*2023-04-25T12:52:57.877*)
* CVE-2023-1020 (*2023-04-25T12:52:57.877*)
* CVE-2023-1126 (*2023-04-25T12:52:57.877*)
* CVE-2023-1129 (*2023-04-25T12:52:57.877*)
* CVE-2023-1324 (*2023-04-25T12:52:57.877*)
* CVE-2023-1414 (*2023-04-25T12:52:57.877*)
* CVE-2023-1420 (*2023-04-25T12:52:57.877*)
* CVE-2023-1435 (*2023-04-25T12:52:57.877*)
* CVE-2023-1623 (*2023-04-25T12:52:57.877*)
* CVE-2023-1624 (*2023-04-25T12:52:57.877*)
* CVE-2023-2006 (*2023-04-25T12:52:57.877*)
* CVE-2023-2007 (*2023-04-25T12:52:57.877*)
* CVE-2023-2019 (*2023-04-25T12:52:57.877*)
* CVE-2023-2250 (*2023-04-25T12:52:57.877*)
* CVE-2023-2257 (*2023-04-25T12:52:57.877*)
* CVE-2023-2258 (*2023-04-25T12:52:57.877*)
* CVE-2023-2259 (*2023-04-25T12:52:57.877*)
* CVE-2023-2260 (*2023-04-25T12:52:57.877*)
* CVE-2023-22665 (*2023-04-25T12:52:57.877*)
* CVE-2023-2281 (*2023-04-25T14:15:09.423*)
* CVE-2023-22918 (*2023-04-25T12:52:57.877*)
* CVE-2023-24509 (*2023-04-25T14:19:44.713*)
* CVE-2023-25346 (*2023-04-25T13:15:09.710*)
* CVE-2023-25347 (*2023-04-25T13:15:09.753*)
* CVE-2023-25348 (*2023-04-25T13:15:09.800*)
* CVE-2023-25479 (*2023-04-25T12:52:57.877*)
* CVE-2023-25490 (*2023-04-25T12:52:57.877*)
* CVE-2023-25710 (*2023-04-25T12:52:57.877*)
* CVE-2023-26057 (*2023-04-25T13:15:09.847*)
* CVE-2023-26058 (*2023-04-25T13:15:09.900*)
* CVE-2023-26059 (*2023-04-25T12:52:57.877*)
* CVE-2023-26097 (*2023-04-25T12:52:57.877*)
* CVE-2023-26098 (*2023-04-25T12:52:57.877*)
* CVE-2023-26099 (*2023-04-25T12:52:57.877*)
* CVE-2023-26839 (*2023-04-25T13:15:09.947*)
* CVE-2023-26840 (*2023-04-25T13:15:09.987*)
* CVE-2023-26841 (*2023-04-25T13:15:10.027*)
* CVE-2023-26843 (*2023-04-25T13:15:10.063*)
* CVE-2023-26865 (*2023-04-25T12:52:57.877*)
* CVE-2023-27619 (*2023-04-25T12:52:57.877*)
* CVE-2023-27747 (*2023-04-25T13:42:56.447*)
* CVE-2023-27748 (*2023-04-25T13:38:10.467*)
* CVE-2023-27848 (*2023-04-25T12:52:57.877*)
* CVE-2023-27849 (*2023-04-25T12:52:57.877*)
* CVE-2023-27990 (*2023-04-25T12:52:57.877*)
* CVE-2023-27991 (*2023-04-25T12:52:57.877*)
* CVE-2023-28484 (*2023-04-25T12:52:57.877*)
* CVE-2023-28771 (*2023-04-25T12:52:57.877*)
* CVE-2023-29018 (*2023-04-25T14:25:04.857*)
* CVE-2023-29194 (*2023-04-25T14:33:00.543*)
* CVE-2023-29469 (*2023-04-25T12:52:57.877*)
* CVE-2023-29529 (*2023-04-25T14:06:24.803*)
* CVE-2023-29530 (*2023-04-25T12:52:57.877*)
* CVE-2023-29566 (*2023-04-25T12:52:57.877*)
* CVE-2023-29779 (*2023-04-25T14:15:09.383*)
* CVE-2023-29780 (*2023-04-25T12:52:57.877*)
* CVE-2023-30406 (*2023-04-25T12:52:57.877*)
* CVE-2023-30408 (*2023-04-25T12:52:57.877*)
* CVE-2023-30410 (*2023-04-25T12:52:57.877*)
* CVE-2023-30414 (*2023-04-25T12:52:57.877*)
* CVE-2023-30417 (*2023-04-25T13:15:10.103*)
* CVE-2023-30623 (*2023-04-25T12:52:57.877*)
* CVE-2023-30626 (*2023-04-25T12:52:57.877*)
* CVE-2023-30627 (*2023-04-25T12:52:57.877*)
* CVE-2023-30628 (*2023-04-25T12:52:57.877*)
* CVE-2023-30629 (*2023-04-25T12:52:57.877*)
* CVE-2022-42335 (*2023-04-25T15:57:53.957*)
* CVE-2023-2281 (*2023-04-25T15:57:53.957*)
* CVE-2023-25346 (*2023-04-25T15:57:53.957*)
* CVE-2023-25347 (*2023-04-25T15:57:53.957*)
* CVE-2023-25348 (*2023-04-25T15:57:53.957*)
* CVE-2023-26057 (*2023-04-25T15:57:53.957*)
* CVE-2023-26058 (*2023-04-25T15:57:53.957*)
* CVE-2023-26839 (*2023-04-25T15:57:53.957*)
* CVE-2023-26840 (*2023-04-25T15:57:53.957*)
* CVE-2023-26841 (*2023-04-25T15:57:53.957*)
* CVE-2023-26843 (*2023-04-25T15:57:53.957*)
* CVE-2023-29779 (*2023-04-25T15:57:53.957*)
* CVE-2023-30417 (*2023-04-25T15:57:53.957*)
## Download and Usage