mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2023-08-20T02:00:30.273928+00:00
This commit is contained in:
parent
ce2a811e17
commit
3dac9fbcf1
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20212",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2023-08-18T20:15:09.773",
|
||||
"lastModified": "2023-08-18T20:15:09.773",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-20T00:48:59.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2110",
|
||||
"sourceIdentifier": "info@starlabs.sg",
|
||||
"published": "2023-08-19T06:15:45.613",
|
||||
"lastModified": "2023-08-19T06:15:45.613",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-20T00:48:59.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2316",
|
||||
"sourceIdentifier": "info@starlabs.sg",
|
||||
"published": "2023-08-19T06:15:46.420",
|
||||
"lastModified": "2023-08-19T06:15:46.420",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-20T00:48:59.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2317",
|
||||
"sourceIdentifier": "info@starlabs.sg",
|
||||
"published": "2023-08-19T06:15:46.687",
|
||||
"lastModified": "2023-08-19T06:15:46.687",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-20T00:48:59.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2318",
|
||||
"sourceIdentifier": "info@starlabs.sg",
|
||||
"published": "2023-08-19T06:15:46.883",
|
||||
"lastModified": "2023-08-19T06:15:46.883",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-20T00:48:59.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2971",
|
||||
"sourceIdentifier": "info@starlabs.sg",
|
||||
"published": "2023-08-19T06:15:47.037",
|
||||
"lastModified": "2023-08-19T06:15:47.037",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-20T00:48:59.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38839",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-18T22:15:09.803",
|
||||
"lastModified": "2023-08-18T22:15:09.803",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-20T00:48:59.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40037",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-08-18T22:15:10.690",
|
||||
"lastModified": "2023-08-19T00:15:09.703",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-20T00:48:59.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40172",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-18T22:15:11.017",
|
||||
"lastModified": "2023-08-18T22:15:11.017",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-20T00:48:59.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40173",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-18T22:15:11.127",
|
||||
"lastModified": "2023-08-18T22:15:11.127",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-20T00:48:59.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40174",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-18T22:15:11.423",
|
||||
"lastModified": "2023-08-18T22:15:11.423",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-20T00:48:59.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40175",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-18T22:15:11.653",
|
||||
"lastModified": "2023-08-18T22:15:11.653",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-20T00:48:59.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2023/CVE-2023-407xx/CVE-2023-40711.json
Normal file
20
CVE-2023/CVE-2023-407xx/CVE-2023-40711.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40711",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-20T01:15:08.920",
|
||||
"lastModified": "2023-08-20T01:15:08.920",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Veilid before 0.1.9 does not check the size of uncompressed data during decompression upon an envelope receipt, which allows remote attackers to cause a denial of service (out-of-memory abort) via crafted packet data, as exploited in the wild in August 2023."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/veilid/veilid/-/blob/main/CHANGELOG.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4432",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-08-19T01:15:09.290",
|
||||
"lastModified": "2023-08-19T01:15:09.290",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-20T00:48:59.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4433",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-08-19T01:15:09.573",
|
||||
"lastModified": "2023-08-19T01:15:09.573",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-20T00:48:59.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2023/CVE-2023-44xx/CVE-2023-4434.json
Normal file
59
CVE-2023/CVE-2023-44xx/CVE-2023-4434.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-4434",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-08-20T01:15:10.050",
|
||||
"lastModified": "2023-08-20T01:15:10.050",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization in GitHub repository hamza417/inure prior to build88."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hamza417/inure/commit/2176af74ca3a81fd001e6cc8eea5a8306f484fbb",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/19e68377-e071-4a8e-aa4c-cd84a426602e",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-44xx/CVE-2023-4435.json
Normal file
59
CVE-2023/CVE-2023-44xx/CVE-2023-4435.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-4435",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-08-20T01:15:10.773",
|
||||
"lastModified": "2023-08-20T01:15:10.773",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Input Validation in GitHub repository hamza417/inure prior to build88."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hamza417/inure/commit/e74062e439f860fd144da4bfc3f35e96c19c3abd",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/1875ee85-4b92-4aa4-861e-094137a29276",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
54
README.md
54
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-08-19T20:00:28.872701+00:00
|
||||
2023-08-20T02:00:30.273928+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-08-19T18:17:16.537000+00:00
|
||||
2023-08-20T01:15:10.773000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -23,50 +23,42 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2023-08-19T00:00:13.540076+00:00
|
||||
2023-08-20T00:00:13.554013+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
223009
|
||||
223012
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* [CVE-2023-40711](CVE-2023/CVE-2023-407xx/CVE-2023-40711.json) (`2023-08-20T01:15:08.920`)
|
||||
* [CVE-2023-4434](CVE-2023/CVE-2023-44xx/CVE-2023-4434.json) (`2023-08-20T01:15:10.050`)
|
||||
* [CVE-2023-4435](CVE-2023/CVE-2023-44xx/CVE-2023-4435.json) (`2023-08-20T01:15:10.773`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `31`
|
||||
Recently modified CVEs: `14`
|
||||
|
||||
* [CVE-2023-21400](CVE-2023/CVE-2023-214xx/CVE-2023-21400.json) (`2023-08-19T18:15:24.267`)
|
||||
* [CVE-2023-2002](CVE-2023/CVE-2023-20xx/CVE-2023-2002.json) (`2023-08-19T18:15:25.257`)
|
||||
* [CVE-2023-2007](CVE-2023/CVE-2023-20xx/CVE-2023-2007.json) (`2023-08-19T18:15:40.893`)
|
||||
* [CVE-2023-2124](CVE-2023/CVE-2023-21xx/CVE-2023-2124.json) (`2023-08-19T18:15:45.500`)
|
||||
* [CVE-2023-2269](CVE-2023/CVE-2023-22xx/CVE-2023-2269.json) (`2023-08-19T18:15:48.603`)
|
||||
* [CVE-2023-2898](CVE-2023/CVE-2023-28xx/CVE-2023-2898.json) (`2023-08-19T18:15:50.740`)
|
||||
* [CVE-2023-31084](CVE-2023/CVE-2023-310xx/CVE-2023-31084.json) (`2023-08-19T18:16:44.450`)
|
||||
* [CVE-2023-35788](CVE-2023/CVE-2023-357xx/CVE-2023-35788.json) (`2023-08-19T18:16:44.583`)
|
||||
* [CVE-2023-3090](CVE-2023/CVE-2023-30xx/CVE-2023-3090.json) (`2023-08-19T18:16:44.790`)
|
||||
* [CVE-2023-3111](CVE-2023/CVE-2023-31xx/CVE-2023-3111.json) (`2023-08-19T18:16:45.337`)
|
||||
* [CVE-2023-3212](CVE-2023/CVE-2023-32xx/CVE-2023-3212.json) (`2023-08-19T18:16:46.507`)
|
||||
* [CVE-2023-3268](CVE-2023/CVE-2023-32xx/CVE-2023-3268.json) (`2023-08-19T18:16:47.147`)
|
||||
* [CVE-2023-3338](CVE-2023/CVE-2023-33xx/CVE-2023-3338.json) (`2023-08-19T18:16:47.707`)
|
||||
* [CVE-2023-3389](CVE-2023/CVE-2023-33xx/CVE-2023-3389.json) (`2023-08-19T18:16:48.263`)
|
||||
* [CVE-2023-3609](CVE-2023/CVE-2023-36xx/CVE-2023-3609.json) (`2023-08-19T18:16:48.420`)
|
||||
* [CVE-2023-3611](CVE-2023/CVE-2023-36xx/CVE-2023-3611.json) (`2023-08-19T18:17:01.003`)
|
||||
* [CVE-2023-3776](CVE-2023/CVE-2023-37xx/CVE-2023-3776.json) (`2023-08-19T18:17:01.323`)
|
||||
* [CVE-2023-3863](CVE-2023/CVE-2023-38xx/CVE-2023-3863.json) (`2023-08-19T18:17:01.767`)
|
||||
* [CVE-2023-40283](CVE-2023/CVE-2023-402xx/CVE-2023-40283.json) (`2023-08-19T18:17:08.550`)
|
||||
* [CVE-2023-4004](CVE-2023/CVE-2023-40xx/CVE-2023-4004.json) (`2023-08-19T18:17:09.050`)
|
||||
* [CVE-2023-4128](CVE-2023/CVE-2023-41xx/CVE-2023-4128.json) (`2023-08-19T18:17:09.413`)
|
||||
* [CVE-2023-4132](CVE-2023/CVE-2023-41xx/CVE-2023-4132.json) (`2023-08-19T18:17:14.500`)
|
||||
* [CVE-2023-4147](CVE-2023/CVE-2023-41xx/CVE-2023-4147.json) (`2023-08-19T18:17:15.150`)
|
||||
* [CVE-2023-4194](CVE-2023/CVE-2023-41xx/CVE-2023-4194.json) (`2023-08-19T18:17:15.787`)
|
||||
* [CVE-2023-4273](CVE-2023/CVE-2023-42xx/CVE-2023-4273.json) (`2023-08-19T18:17:16.537`)
|
||||
* [CVE-2023-20212](CVE-2023/CVE-2023-202xx/CVE-2023-20212.json) (`2023-08-20T00:48:59.350`)
|
||||
* [CVE-2023-38839](CVE-2023/CVE-2023-388xx/CVE-2023-38839.json) (`2023-08-20T00:48:59.350`)
|
||||
* [CVE-2023-40037](CVE-2023/CVE-2023-400xx/CVE-2023-40037.json) (`2023-08-20T00:48:59.350`)
|
||||
* [CVE-2023-40172](CVE-2023/CVE-2023-401xx/CVE-2023-40172.json) (`2023-08-20T00:48:59.350`)
|
||||
* [CVE-2023-40173](CVE-2023/CVE-2023-401xx/CVE-2023-40173.json) (`2023-08-20T00:48:59.350`)
|
||||
* [CVE-2023-40174](CVE-2023/CVE-2023-401xx/CVE-2023-40174.json) (`2023-08-20T00:48:59.350`)
|
||||
* [CVE-2023-40175](CVE-2023/CVE-2023-401xx/CVE-2023-40175.json) (`2023-08-20T00:48:59.350`)
|
||||
* [CVE-2023-4432](CVE-2023/CVE-2023-44xx/CVE-2023-4432.json) (`2023-08-20T00:48:59.350`)
|
||||
* [CVE-2023-4433](CVE-2023/CVE-2023-44xx/CVE-2023-4433.json) (`2023-08-20T00:48:59.350`)
|
||||
* [CVE-2023-2110](CVE-2023/CVE-2023-21xx/CVE-2023-2110.json) (`2023-08-20T00:48:59.350`)
|
||||
* [CVE-2023-2316](CVE-2023/CVE-2023-23xx/CVE-2023-2316.json) (`2023-08-20T00:48:59.350`)
|
||||
* [CVE-2023-2317](CVE-2023/CVE-2023-23xx/CVE-2023-2317.json) (`2023-08-20T00:48:59.350`)
|
||||
* [CVE-2023-2318](CVE-2023/CVE-2023-23xx/CVE-2023-2318.json) (`2023-08-20T00:48:59.350`)
|
||||
* [CVE-2023-2971](CVE-2023/CVE-2023-29xx/CVE-2023-2971.json) (`2023-08-20T00:48:59.350`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user