mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2023-08-15T23:55:25.001013+00:00
This commit is contained in:
parent
cfd64b7ddc
commit
1e15f2caa0
20
CVE-2023/CVE-2023-205xx/CVE-2023-20560.json
Normal file
20
CVE-2023/CVE-2023-205xx/CVE-2023-20560.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-20560",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-08-15T22:15:09.827",
|
||||
"lastModified": "2023-08-15T22:15:09.827",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\n\n\n\n\n\n\n\n\nInsufficient validation of the IOCTL (Input Output Control) input buffer in AMD Ryzen\u2122 Master may allow a privileged attacker to provide a null value potentially resulting in a Windows crash leading to denial of service.\n\n\n\n\n\n\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7004",
|
||||
"source": "psirt@amd.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-205xx/CVE-2023-20564.json
Normal file
20
CVE-2023/CVE-2023-205xx/CVE-2023-20564.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-20564",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-08-15T22:15:11.597",
|
||||
"lastModified": "2023-08-15T22:15:11.597",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\n\n\n\n\n\n\nInsufficient validation in the IOCTL (Input Output Control) input buffer in AMD Ryzen\u2122 Master may permit a privileged attacker to perform memory reads/writes potentially leading to a loss of confidentiality or arbitrary kernel execution.\n\n\n\n\n\n\n\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7004",
|
||||
"source": "psirt@amd.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-398xx/CVE-2023-39849.json
Normal file
24
CVE-2023/CVE-2023-398xx/CVE-2023-39849.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-39849",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-15T22:15:13.937",
|
||||
"lastModified": "2023-08-15T22:15:13.937",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Pikachu v1.0 was discovered to contain a SQL injection vulnerability via the $username parameter at \\inc\\function.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/KLSEHB/vulnerability-report/blob/main/Pikachu_CVE-2023-39849",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zhuifengshaonianhanlu/pikachu",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-398xx/CVE-2023-39850.json
Normal file
24
CVE-2023/CVE-2023-398xx/CVE-2023-39850.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-39850",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-15T22:15:14.357",
|
||||
"lastModified": "2023-08-15T22:15:14.357",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Schoolmate v1.3 was discovered to contain multiple SQL injection vulnerabilities via the $courseid and $teacherid parameters at DeleteFunctions.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/KLSEHB/vulnerability-report/blob/main/Schoolmate_CVE-2023-39850",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/projects/schoolmate",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-398xx/CVE-2023-39851.json
Normal file
24
CVE-2023/CVE-2023-398xx/CVE-2023-39851.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-39851",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-15T22:15:14.407",
|
||||
"lastModified": "2023-08-15T22:15:14.407",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "webchess v1.0 was discovered to contain a SQL injection vulnerability via the $playerID parameter at mainmenu.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/KLSEHB/vulnerability-report/blob/main/webchess_CVE-2023-39851",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/projects/webchess",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
47
README.md
47
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-08-15T22:00:30.930372+00:00
|
||||
2023-08-15T23:55:25.001013+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-08-15T21:56:06.607000+00:00
|
||||
2023-08-15T22:15:14.407000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,51 +29,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
222762
|
||||
222767
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
* [CVE-2023-38864](CVE-2023/CVE-2023-388xx/CVE-2023-38864.json) (`2023-08-15T20:15:10.817`)
|
||||
* [CVE-2023-38866](CVE-2023/CVE-2023-388xx/CVE-2023-38866.json) (`2023-08-15T20:15:11.267`)
|
||||
* [CVE-2023-39841](CVE-2023/CVE-2023-398xx/CVE-2023-39841.json) (`2023-08-15T20:15:11.520`)
|
||||
* [CVE-2023-39842](CVE-2023/CVE-2023-398xx/CVE-2023-39842.json) (`2023-08-15T20:15:11.683`)
|
||||
* [CVE-2023-39843](CVE-2023/CVE-2023-398xx/CVE-2023-39843.json) (`2023-08-15T20:15:11.857`)
|
||||
* [CVE-2023-39848](CVE-2023/CVE-2023-398xx/CVE-2023-39848.json) (`2023-08-15T21:15:09.700`)
|
||||
* [CVE-2023-39852](CVE-2023/CVE-2023-398xx/CVE-2023-39852.json) (`2023-08-15T21:15:09.907`)
|
||||
* [CVE-2023-20560](CVE-2023/CVE-2023-205xx/CVE-2023-20560.json) (`2023-08-15T22:15:09.827`)
|
||||
* [CVE-2023-20564](CVE-2023/CVE-2023-205xx/CVE-2023-20564.json) (`2023-08-15T22:15:11.597`)
|
||||
* [CVE-2023-39849](CVE-2023/CVE-2023-398xx/CVE-2023-39849.json) (`2023-08-15T22:15:13.937`)
|
||||
* [CVE-2023-39850](CVE-2023/CVE-2023-398xx/CVE-2023-39850.json) (`2023-08-15T22:15:14.357`)
|
||||
* [CVE-2023-39851](CVE-2023/CVE-2023-398xx/CVE-2023-39851.json) (`2023-08-15T22:15:14.407`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `46`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2023-4342](CVE-2023/CVE-2023-43xx/CVE-2023-4342.json) (`2023-08-15T20:01:35.727`)
|
||||
* [CVE-2023-4343](CVE-2023/CVE-2023-43xx/CVE-2023-4343.json) (`2023-08-15T20:01:35.727`)
|
||||
* [CVE-2023-4344](CVE-2023/CVE-2023-43xx/CVE-2023-4344.json) (`2023-08-15T20:01:35.727`)
|
||||
* [CVE-2023-38401](CVE-2023/CVE-2023-384xx/CVE-2023-38401.json) (`2023-08-15T20:01:42.207`)
|
||||
* [CVE-2023-38402](CVE-2023/CVE-2023-384xx/CVE-2023-38402.json) (`2023-08-15T20:01:42.207`)
|
||||
* [CVE-2023-38861](CVE-2023/CVE-2023-388xx/CVE-2023-38861.json) (`2023-08-15T20:01:42.207`)
|
||||
* [CVE-2023-38862](CVE-2023/CVE-2023-388xx/CVE-2023-38862.json) (`2023-08-15T20:01:42.207`)
|
||||
* [CVE-2023-38863](CVE-2023/CVE-2023-388xx/CVE-2023-38863.json) (`2023-08-15T20:01:42.207`)
|
||||
* [CVE-2023-38865](CVE-2023/CVE-2023-388xx/CVE-2023-38865.json) (`2023-08-15T20:01:42.207`)
|
||||
* [CVE-2023-4323](CVE-2023/CVE-2023-43xx/CVE-2023-4323.json) (`2023-08-15T20:01:42.207`)
|
||||
* [CVE-2023-4324](CVE-2023/CVE-2023-43xx/CVE-2023-4324.json) (`2023-08-15T20:01:42.207`)
|
||||
* [CVE-2023-32562](CVE-2023/CVE-2023-325xx/CVE-2023-32562.json) (`2023-08-15T20:03:45.580`)
|
||||
* [CVE-2023-4282](CVE-2023/CVE-2023-42xx/CVE-2023-4282.json) (`2023-08-15T20:07:12.687`)
|
||||
* [CVE-2023-32564](CVE-2023/CVE-2023-325xx/CVE-2023-32564.json) (`2023-08-15T20:08:50.277`)
|
||||
* [CVE-2023-32563](CVE-2023/CVE-2023-325xx/CVE-2023-32563.json) (`2023-08-15T20:10:36.940`)
|
||||
* [CVE-2023-39533](CVE-2023/CVE-2023-395xx/CVE-2023-39533.json) (`2023-08-15T20:15:09.267`)
|
||||
* [CVE-2023-4107](CVE-2023/CVE-2023-41xx/CVE-2023-4107.json) (`2023-08-15T20:19:59.237`)
|
||||
* [CVE-2023-4108](CVE-2023/CVE-2023-41xx/CVE-2023-4108.json) (`2023-08-15T20:20:46.160`)
|
||||
* [CVE-2023-32566](CVE-2023/CVE-2023-325xx/CVE-2023-32566.json) (`2023-08-15T20:21:44.847`)
|
||||
* [CVE-2023-32567](CVE-2023/CVE-2023-325xx/CVE-2023-32567.json) (`2023-08-15T20:22:37.530`)
|
||||
* [CVE-2023-28129](CVE-2023/CVE-2023-281xx/CVE-2023-28129.json) (`2023-08-15T20:28:13.247`)
|
||||
* [CVE-2023-4105](CVE-2023/CVE-2023-41xx/CVE-2023-4105.json) (`2023-08-15T20:36:39.007`)
|
||||
* [CVE-2023-4106](CVE-2023/CVE-2023-41xx/CVE-2023-4106.json) (`2023-08-15T20:37:02.983`)
|
||||
* [CVE-2023-24391](CVE-2023/CVE-2023-243xx/CVE-2023-24391.json) (`2023-08-15T21:00:27.287`)
|
||||
* [CVE-2023-28779](CVE-2023/CVE-2023-287xx/CVE-2023-28779.json) (`2023-08-15T21:09:11.333`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user