Auto-Update: 2023-07-25T12:00:25.606777+00:00

This commit is contained in:
cad-safe-bot 2023-07-25 12:00:29 +00:00
parent e24b319bca
commit 0fb10e4b07
2 changed files with 7 additions and 26 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-3897",
"sourceIdentifier": "security@42gears.com",
"published": "2023-07-25T09:15:11.687",
"lastModified": "2023-07-25T09:15:11.687",
"lastModified": "2023-07-25T10:15:10.093",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User enumeration in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message.This issue affects SureMDM On-premise: 6.31 and below version\u00a0\n\n"
"value": "User enumeration in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message.This issue affects SureMDM On-premise: 6.31 and below versions\u00a0\n\n"
}
],
"metrics": {

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-07-25T10:00:28.960660+00:00
2023-07-25T12:00:25.606777+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-07-25T09:15:11.687000+00:00
2023-07-25T10:15:10.093000+00:00
```
### Last Data Feed Release
@ -34,34 +34,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `0`
* [CVE-2023-21405](CVE-2023/CVE-2023-214xx/CVE-2023-21405.json) (`2023-07-25T08:15:09.927`)
* [CVE-2023-21406](CVE-2023/CVE-2023-214xx/CVE-2023-21406.json) (`2023-07-25T08:15:10.003`)
* [CVE-2023-34189](CVE-2023/CVE-2023-341xx/CVE-2023-34189.json) (`2023-07-25T08:15:10.077`)
* [CVE-2023-34434](CVE-2023/CVE-2023-344xx/CVE-2023-34434.json) (`2023-07-25T08:15:10.147`)
* [CVE-2023-35088](CVE-2023/CVE-2023-350xx/CVE-2023-35088.json) (`2023-07-25T08:15:10.213`)
* [CVE-2023-3886](CVE-2023/CVE-2023-38xx/CVE-2023-3886.json) (`2023-07-25T08:15:10.280`)
* [CVE-2023-3887](CVE-2023/CVE-2023-38xx/CVE-2023-3887.json) (`2023-07-25T08:15:10.353`)
* [CVE-2023-3888](CVE-2023/CVE-2023-38xx/CVE-2023-3888.json) (`2023-07-25T08:15:10.420`)
* [CVE-2023-3890](CVE-2023/CVE-2023-38xx/CVE-2023-3890.json) (`2023-07-25T09:15:11.557`)
* [CVE-2023-3897](CVE-2023/CVE-2023-38xx/CVE-2023-3897.json) (`2023-07-25T09:15:11.687`)
### CVEs modified in the last Commit
Recently modified CVEs: `10`
Recently modified CVEs: `1`
* [CVE-2022-0828](CVE-2022/CVE-2022-08xx/CVE-2022-0828.json) (`2023-07-25T08:15:09.387`)
* [CVE-2022-0837](CVE-2022/CVE-2022-08xx/CVE-2022-0837.json) (`2023-07-25T08:15:09.523`)
* [CVE-2022-1412](CVE-2022/CVE-2022-14xx/CVE-2022-1412.json) (`2023-07-25T08:15:09.627`)
* [CVE-2022-1551](CVE-2022/CVE-2022-15xx/CVE-2022-1551.json) (`2023-07-25T08:15:09.720`)
* [CVE-2022-2083](CVE-2022/CVE-2022-20xx/CVE-2022-2083.json) (`2023-07-25T08:15:09.820`)
* [CVE-2022-31781](CVE-2022/CVE-2022-317xx/CVE-2022-31781.json) (`2023-07-25T09:15:10.383`)
* [CVE-2022-33891](CVE-2022/CVE-2022-338xx/CVE-2022-33891.json) (`2023-07-25T09:15:11.037`)
* [CVE-2022-37400](CVE-2022/CVE-2022-374xx/CVE-2022-37400.json) (`2023-07-25T09:15:11.170`)
* [CVE-2022-37401](CVE-2022/CVE-2022-374xx/CVE-2022-37401.json) (`2023-07-25T09:15:11.327`)
* [CVE-2022-37435](CVE-2022/CVE-2022-374xx/CVE-2022-37435.json) (`2023-07-25T09:15:11.423`)
* [CVE-2023-3897](CVE-2023/CVE-2023-38xx/CVE-2023-3897.json) (`2023-07-25T10:15:10.093`)
## Download and Usage