mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-12-19 02:23:56 +00:00
Auto-Update: 2023-12-01T07:00:18.051841+00:00
This commit is contained in:
parent
986a0228d0
commit
1a48d0c87b
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45582",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:30.107",
|
||||
"lastModified": "2023-12-01T01:15:07.530",
|
||||
"lastModified": "2023-12-01T06:15:47.530",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,6 +85,10 @@
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00033.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00000.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-39325",
|
||||
"sourceIdentifier": "security@golang.org",
|
||||
"published": "2023-10-11T22:15:09.880",
|
||||
"lastModified": "2023-11-29T03:15:42.130",
|
||||
"lastModified": "2023-12-01T06:15:47.707",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -132,6 +132,10 @@
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SZN67IL7HMGMNAVLOTIXLIHUDXZK4LH/",
|
||||
"source": "security@golang.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/",
|
||||
"source": "security@golang.org"
|
||||
@ -151,6 +155,10 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECRC75BQJP6FJN2L7KCKYZW4DSBD7QSD/",
|
||||
"source": "security@golang.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSY7SXFFTPZFWDM6XELSDSHZLVW3AHK7/",
|
||||
"source": "security@golang.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZQIELEIRSZUYTFFH5KTH2YJ4IIQG2KE/",
|
||||
"source": "security@golang.org"
|
||||
@ -162,6 +170,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NG7IMPL55MVWU3LCI4JQJT3K2U5CHDV7/",
|
||||
"source": "security@golang.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXGWPQOJ3JNDW2XIYKIVJ7N7QUIFNM2Q/",
|
||||
"source": "security@golang.org"
|
||||
|
||||
20
CVE-2023/CVE-2023-452xx/CVE-2023-45252.json
Normal file
20
CVE-2023/CVE-2023-452xx/CVE-2023-45252.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-45252",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-01T06:15:47.840",
|
||||
"lastModified": "2023-12-01T06:15:47.840",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DLL Hijacking vulnerability in Huddly HuddlyCameraService before version 8.0.7, not including version 7.99, due to the installation of the service in a directory that grants write privileges to standard users, allows attackers to manipulate files, execute arbitrary code, and escalate privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
||||
20
CVE-2023/CVE-2023-452xx/CVE-2023-45253.json
Normal file
20
CVE-2023/CVE-2023-452xx/CVE-2023-45253.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-45253",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-01T06:15:47.903",
|
||||
"lastModified": "2023-12-01T06:15:47.903",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Huddly HuddlyCameraService before version 8.0.7, not including version 7.99, allows attackers to manipulate files and escalate privileges via RollingFileAppender.DeleteFile method performed by the log4net library."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
||||
28
README.md
28
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-12-01T05:00:17.855015+00:00
|
||||
2023-12-01T07:00:18.051841+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-12-01T04:01:05.950000+00:00
|
||||
2023-12-01T06:15:47.903000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,33 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
231928
|
||||
231930
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
* [CVE-2023-48016](CVE-2023/CVE-2023-480xx/CVE-2023-48016.json) (`2023-12-01T03:15:07.453`)
|
||||
* [CVE-2023-45252](CVE-2023/CVE-2023-452xx/CVE-2023-45252.json) (`2023-12-01T06:15:47.840`)
|
||||
* [CVE-2023-45253](CVE-2023/CVE-2023-452xx/CVE-2023-45253.json) (`2023-12-01T06:15:47.903`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `13`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
* [CVE-2023-2437](CVE-2023/CVE-2023-24xx/CVE-2023-2437.json) (`2023-12-01T03:47:12.557`)
|
||||
* [CVE-2023-47380](CVE-2023/CVE-2023-473xx/CVE-2023-47380.json) (`2023-12-01T03:47:35.237`)
|
||||
* [CVE-2023-26542](CVE-2023/CVE-2023-265xx/CVE-2023-26542.json) (`2023-12-01T03:48:01.363`)
|
||||
* [CVE-2023-28747](CVE-2023/CVE-2023-287xx/CVE-2023-28747.json) (`2023-12-01T03:48:15.443`)
|
||||
* [CVE-2023-6264](CVE-2023/CVE-2023-62xx/CVE-2023-6264.json) (`2023-12-01T03:51:45.277`)
|
||||
* [CVE-2023-45484](CVE-2023/CVE-2023-454xx/CVE-2023-45484.json) (`2023-12-01T03:56:31.783`)
|
||||
* [CVE-2023-45483](CVE-2023/CVE-2023-454xx/CVE-2023-45483.json) (`2023-12-01T03:57:22.423`)
|
||||
* [CVE-2023-45482](CVE-2023/CVE-2023-454xx/CVE-2023-45482.json) (`2023-12-01T03:58:37.397`)
|
||||
* [CVE-2023-45481](CVE-2023/CVE-2023-454xx/CVE-2023-45481.json) (`2023-12-01T03:58:54.947`)
|
||||
* [CVE-2023-45480](CVE-2023/CVE-2023-454xx/CVE-2023-45480.json) (`2023-12-01T03:59:17.300`)
|
||||
* [CVE-2023-45479](CVE-2023/CVE-2023-454xx/CVE-2023-45479.json) (`2023-12-01T03:59:39.983`)
|
||||
* [CVE-2023-48188](CVE-2023/CVE-2023-481xx/CVE-2023-48188.json) (`2023-12-01T04:00:46.523`)
|
||||
* [CVE-2023-49044](CVE-2023/CVE-2023-490xx/CVE-2023-49044.json) (`2023-12-01T04:01:05.950`)
|
||||
* [CVE-2022-45582](CVE-2022/CVE-2022-455xx/CVE-2022-45582.json) (`2023-12-01T06:15:47.530`)
|
||||
* [CVE-2023-39325](CVE-2023/CVE-2023-393xx/CVE-2023-39325.json) (`2023-12-01T06:15:47.707`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user