mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2023-07-25T12:00:25.606777+00:00
This commit is contained in:
parent
e24b319bca
commit
0fb10e4b07
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-3897",
|
||||
"sourceIdentifier": "security@42gears.com",
|
||||
"published": "2023-07-25T09:15:11.687",
|
||||
"lastModified": "2023-07-25T09:15:11.687",
|
||||
"lastModified": "2023-07-25T10:15:10.093",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "User enumeration in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message.This issue affects SureMDM On-premise: 6.31 and below version\u00a0\n\n"
|
||||
"value": "User enumeration in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message.This issue affects SureMDM On-premise: 6.31 and below versions\u00a0\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
29
README.md
29
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-07-25T10:00:28.960660+00:00
|
||||
2023-07-25T12:00:25.606777+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-07-25T09:15:11.687000+00:00
|
||||
2023-07-25T10:15:10.093000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -34,34 +34,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
* [CVE-2023-21405](CVE-2023/CVE-2023-214xx/CVE-2023-21405.json) (`2023-07-25T08:15:09.927`)
|
||||
* [CVE-2023-21406](CVE-2023/CVE-2023-214xx/CVE-2023-21406.json) (`2023-07-25T08:15:10.003`)
|
||||
* [CVE-2023-34189](CVE-2023/CVE-2023-341xx/CVE-2023-34189.json) (`2023-07-25T08:15:10.077`)
|
||||
* [CVE-2023-34434](CVE-2023/CVE-2023-344xx/CVE-2023-34434.json) (`2023-07-25T08:15:10.147`)
|
||||
* [CVE-2023-35088](CVE-2023/CVE-2023-350xx/CVE-2023-35088.json) (`2023-07-25T08:15:10.213`)
|
||||
* [CVE-2023-3886](CVE-2023/CVE-2023-38xx/CVE-2023-3886.json) (`2023-07-25T08:15:10.280`)
|
||||
* [CVE-2023-3887](CVE-2023/CVE-2023-38xx/CVE-2023-3887.json) (`2023-07-25T08:15:10.353`)
|
||||
* [CVE-2023-3888](CVE-2023/CVE-2023-38xx/CVE-2023-3888.json) (`2023-07-25T08:15:10.420`)
|
||||
* [CVE-2023-3890](CVE-2023/CVE-2023-38xx/CVE-2023-3890.json) (`2023-07-25T09:15:11.557`)
|
||||
* [CVE-2023-3897](CVE-2023/CVE-2023-38xx/CVE-2023-3897.json) (`2023-07-25T09:15:11.687`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `10`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
* [CVE-2022-0828](CVE-2022/CVE-2022-08xx/CVE-2022-0828.json) (`2023-07-25T08:15:09.387`)
|
||||
* [CVE-2022-0837](CVE-2022/CVE-2022-08xx/CVE-2022-0837.json) (`2023-07-25T08:15:09.523`)
|
||||
* [CVE-2022-1412](CVE-2022/CVE-2022-14xx/CVE-2022-1412.json) (`2023-07-25T08:15:09.627`)
|
||||
* [CVE-2022-1551](CVE-2022/CVE-2022-15xx/CVE-2022-1551.json) (`2023-07-25T08:15:09.720`)
|
||||
* [CVE-2022-2083](CVE-2022/CVE-2022-20xx/CVE-2022-2083.json) (`2023-07-25T08:15:09.820`)
|
||||
* [CVE-2022-31781](CVE-2022/CVE-2022-317xx/CVE-2022-31781.json) (`2023-07-25T09:15:10.383`)
|
||||
* [CVE-2022-33891](CVE-2022/CVE-2022-338xx/CVE-2022-33891.json) (`2023-07-25T09:15:11.037`)
|
||||
* [CVE-2022-37400](CVE-2022/CVE-2022-374xx/CVE-2022-37400.json) (`2023-07-25T09:15:11.170`)
|
||||
* [CVE-2022-37401](CVE-2022/CVE-2022-374xx/CVE-2022-37401.json) (`2023-07-25T09:15:11.327`)
|
||||
* [CVE-2022-37435](CVE-2022/CVE-2022-374xx/CVE-2022-37435.json) (`2023-07-25T09:15:11.423`)
|
||||
* [CVE-2023-3897](CVE-2023/CVE-2023-38xx/CVE-2023-3897.json) (`2023-07-25T10:15:10.093`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user