Auto-Update: 2023-09-28T14:00:24.814526+00:00

This commit is contained in:
cad-safe-bot 2023-09-28 14:00:28 +00:00
parent 8230061c5a
commit 3f6b2bffde
51 changed files with 345 additions and 110 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26145",
"sourceIdentifier": "report@snyk.io",
"published": "2023-09-28T05:15:45.843",
"lastModified": "2023-09-28T05:15:45.843",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26149",
"sourceIdentifier": "report@snyk.io",
"published": "2023-09-28T05:15:46.023",
"lastModified": "2023-09-28T05:15:46.023",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33972",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T19:15:11.497",
"lastModified": "2023-09-27T19:15:11.497",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:18.717",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38870",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T04:15:11.893",
"lastModified": "2023-09-28T04:15:11.893",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38871",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T04:15:12.003",
"lastModified": "2023-09-28T04:15:12.003",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38872",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T04:15:12.067",
"lastModified": "2023-09-28T04:15:12.067",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38873",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T04:15:12.123",
"lastModified": "2023-09-28T04:15:12.123",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38874",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T04:15:12.223",
"lastModified": "2023-09-28T04:15:12.223",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38877",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T04:15:12.280",
"lastModified": "2023-09-28T04:15:12.280",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40026",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T21:15:09.713",
"lastModified": "2023-09-27T21:15:09.713",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40604",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-09-27T15:19:20.223",
"lastModified": "2023-09-27T15:41:47.123",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-28T13:37:57.513",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jesmadsen:cookies_by_jm:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "FB2DEAA0-2EAC-4085-8327-FC73F255559B"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cookies-by-jm/wordpress-cookies-by-jm-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40605",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-09-27T15:19:20.697",
"lastModified": "2023-09-27T15:41:47.123",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-28T13:29:56.727",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:93digital:typing_effect:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.6",
"matchCriteriaId": "F127DC86-DBB0-4176-8C90-9A433C43B34E"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/animated-typing-effect/wordpress-typing-effect-plugin-1-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4066",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-27T21:15:10.550",
"lastModified": "2023-09-27T21:15:10.550",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,19 +2,80 @@
"id": "CVE-2023-41079",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-09-27T15:19:26.773",
"lastModified": "2023-09-27T15:41:07.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-28T13:18:16.230",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved permissions logic. This issue is fixed in macOS Sonoma 14. An app may be able to bypass Privacy preferences."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con una l\u00f3gica de permisos mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14. Es posible que una aplicaci\u00f3n pueda saltarse los ajustes de Privacidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.0",
"matchCriteriaId": "7A5DD3D5-FB4F-4313-B873-DCED87FC4605"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213940",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41241",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-09-27T15:19:28.200",
"lastModified": "2023-09-27T15:41:47.123",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-28T13:48:59.413",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:surecart:surecart:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.5.0",
"matchCriteriaId": "861CE0E7-0A07-43B3-8FF1-F9E9C925083F"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/surecart/wordpress-surecart-plugin-2-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41444",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T03:15:11.193",
"lastModified": "2023-09-28T03:15:11.193",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41445",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T23:15:10.150",
"lastModified": "2023-09-27T23:15:10.150",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41446",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T03:15:11.387",
"lastModified": "2023-09-28T03:15:11.387",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41447",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T03:15:11.480",
"lastModified": "2023-09-28T03:15:11.480",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41448",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T23:15:11.667",
"lastModified": "2023-09-27T23:15:11.667",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41449",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T23:15:11.730",
"lastModified": "2023-09-27T23:15:11.730",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41450",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T03:15:11.563",
"lastModified": "2023-09-28T03:15:11.563",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41451",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T23:15:11.787",
"lastModified": "2023-09-27T23:15:11.787",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41452",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T23:15:11.843",
"lastModified": "2023-09-27T23:15:11.843",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41453",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T23:15:11.900",
"lastModified": "2023-09-27T23:15:11.900",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42222",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T03:15:11.643",
"lastModified": "2023-09-28T03:15:11.643",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42818",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T21:15:10.173",
"lastModified": "2023-09-27T21:15:10.173",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43191",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T23:15:11.960",
"lastModified": "2023-09-27T23:15:11.960",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43192",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T22:15:09.700",
"lastModified": "2023-09-27T22:15:09.700",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43233",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T23:15:12.007",
"lastModified": "2023-09-27T23:15:12.007",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43314",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T23:15:12.057",
"lastModified": "2023-09-27T23:15:12.057",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43320",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T23:15:12.113",
"lastModified": "2023-09-27T23:15:12.113",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43650",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T19:15:11.927",
"lastModified": "2023-09-27T19:15:11.927",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:18.717",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43651",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T21:15:10.347",
"lastModified": "2023-09-27T21:15:10.347",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43652",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T19:15:12.133",
"lastModified": "2023-09-27T19:15:12.133",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:18.717",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43656",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T21:15:10.443",
"lastModified": "2023-09-27T21:15:10.443",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43660",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T22:15:10.730",
"lastModified": "2023-09-27T22:15:10.730",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-43869",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T13:15:09.850",
"lastModified": "2023-09-28T13:15:09.850",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard56 Function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44047",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T20:15:09.850",
"lastModified": "2023-09-27T22:15:11.283",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44048",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T20:15:13.493",
"lastModified": "2023-09-27T22:15:11.513",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44080",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T22:15:11.783",
"lastModified": "2023-09-27T22:15:11.783",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:13.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44273",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T04:15:12.493",
"lastModified": "2023-09-28T04:15:12.493",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44275",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T05:15:46.243",
"lastModified": "2023-09-28T05:15:46.243",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44276",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-28T05:15:46.290",
"lastModified": "2023-09-28T05:15:46.290",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4523",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-09-27T19:15:12.373",
"lastModified": "2023-09-27T19:15:12.373",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:18.717",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4863",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T15:15:24.327",
"lastModified": "2023-09-27T20:15:14.377",
"lastModified": "2023-09-28T12:15:09.650",
"vulnStatus": "Modified",
"cisaExploitAdd": "2023-09-13",
"cisaActionDue": "2023-10-04",
@ -237,6 +237,10 @@
"url": "http://www.openwall.com/lists/oss-security/2023/09/26/7",
"source": "chrome-cve-admin@google.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/28/1",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5230",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-09-28T05:15:46.337",
"lastModified": "2023-09-28T05:15:46.337",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5232",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-09-28T05:15:46.437",
"lastModified": "2023-09-28T05:15:46.437",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5233",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-09-28T05:15:46.513",
"lastModified": "2023-09-28T05:15:46.513",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5244",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-28T01:15:09.060",
"lastModified": "2023-09-28T01:15:09.060",
"vulnStatus": "Received",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-28T12:00:25.473751+00:00
2023-09-28T14:00:24.814526+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-28T09:15:12.857000+00:00
2023-09-28T13:48:59.413000+00:00
```
### Last Data Feed Release
@ -29,22 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
226502
226503
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `1`
* [CVE-2023-43869](CVE-2023/CVE-2023-438xx/CVE-2023-43869.json) (`2023-09-28T13:15:09.850`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `49`
* [CVE-2022-29599](CVE-2022/CVE-2022-295xx/CVE-2022-29599.json) (`2023-09-28T09:15:11.267`)
* [CVE-2023-33934](CVE-2023/CVE-2023-339xx/CVE-2023-33934.json) (`2023-09-28T09:15:12.597`)
* [CVE-2023-44154](CVE-2023/CVE-2023-441xx/CVE-2023-44154.json) (`2023-09-28T09:15:12.857`)
* [CVE-2023-42818](CVE-2023/CVE-2023-428xx/CVE-2023-42818.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-43651](CVE-2023/CVE-2023-436xx/CVE-2023-43651.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-43656](CVE-2023/CVE-2023-436xx/CVE-2023-43656.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-4066](CVE-2023/CVE-2023-40xx/CVE-2023-4066.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-43192](CVE-2023/CVE-2023-431xx/CVE-2023-43192.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-43660](CVE-2023/CVE-2023-436xx/CVE-2023-43660.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-44080](CVE-2023/CVE-2023-440xx/CVE-2023-44080.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-41445](CVE-2023/CVE-2023-414xx/CVE-2023-41445.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-41448](CVE-2023/CVE-2023-414xx/CVE-2023-41448.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-41449](CVE-2023/CVE-2023-414xx/CVE-2023-41449.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-41451](CVE-2023/CVE-2023-414xx/CVE-2023-41451.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-41452](CVE-2023/CVE-2023-414xx/CVE-2023-41452.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-41453](CVE-2023/CVE-2023-414xx/CVE-2023-41453.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-43191](CVE-2023/CVE-2023-431xx/CVE-2023-43191.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-43233](CVE-2023/CVE-2023-432xx/CVE-2023-43233.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-43314](CVE-2023/CVE-2023-433xx/CVE-2023-43314.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-43320](CVE-2023/CVE-2023-433xx/CVE-2023-43320.json) (`2023-09-28T12:44:13.510`)
* [CVE-2023-33972](CVE-2023/CVE-2023-339xx/CVE-2023-33972.json) (`2023-09-28T12:44:18.717`)
* [CVE-2023-43650](CVE-2023/CVE-2023-436xx/CVE-2023-43650.json) (`2023-09-28T12:44:18.717`)
* [CVE-2023-43652](CVE-2023/CVE-2023-436xx/CVE-2023-43652.json) (`2023-09-28T12:44:18.717`)
* [CVE-2023-4523](CVE-2023/CVE-2023-45xx/CVE-2023-4523.json) (`2023-09-28T12:44:18.717`)
* [CVE-2023-41079](CVE-2023/CVE-2023-410xx/CVE-2023-41079.json) (`2023-09-28T13:18:16.230`)
* [CVE-2023-40605](CVE-2023/CVE-2023-406xx/CVE-2023-40605.json) (`2023-09-28T13:29:56.727`)
* [CVE-2023-40604](CVE-2023/CVE-2023-406xx/CVE-2023-40604.json) (`2023-09-28T13:37:57.513`)
* [CVE-2023-41241](CVE-2023/CVE-2023-412xx/CVE-2023-41241.json) (`2023-09-28T13:48:59.413`)
## Download and Usage