mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-09-28T14:00:24.814526+00:00
This commit is contained in:
parent
8230061c5a
commit
3f6b2bffde
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26145",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2023-09-28T05:15:45.843",
|
||||
"lastModified": "2023-09-28T05:15:45.843",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26149",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2023-09-28T05:15:46.023",
|
||||
"lastModified": "2023-09-28T05:15:46.023",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33972",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-09-27T19:15:11.497",
|
||||
"lastModified": "2023-09-27T19:15:11.497",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:18.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38870",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T04:15:11.893",
|
||||
"lastModified": "2023-09-28T04:15:11.893",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38871",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T04:15:12.003",
|
||||
"lastModified": "2023-09-28T04:15:12.003",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38872",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T04:15:12.067",
|
||||
"lastModified": "2023-09-28T04:15:12.067",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38873",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T04:15:12.123",
|
||||
"lastModified": "2023-09-28T04:15:12.123",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38874",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T04:15:12.223",
|
||||
"lastModified": "2023-09-28T04:15:12.223",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38877",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T04:15:12.280",
|
||||
"lastModified": "2023-09-28T04:15:12.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40026",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-09-27T21:15:09.713",
|
||||
"lastModified": "2023-09-27T21:15:09.713",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40604",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-09-27T15:19:20.223",
|
||||
"lastModified": "2023-09-27T15:41:47.123",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-28T13:37:57.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jesmadsen:cookies_by_jm:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0",
|
||||
"matchCriteriaId": "FB2DEAA0-2EAC-4085-8327-FC73F255559B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/cookies-by-jm/wordpress-cookies-by-jm-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40605",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-09-27T15:19:20.697",
|
||||
"lastModified": "2023-09-27T15:41:47.123",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-28T13:29:56.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:93digital:typing_effect:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.3.6",
|
||||
"matchCriteriaId": "F127DC86-DBB0-4176-8C90-9A433C43B34E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/animated-typing-effect/wordpress-typing-effect-plugin-1-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4066",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-09-27T21:15:10.550",
|
||||
"lastModified": "2023-09-27T21:15:10.550",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,19 +2,80 @@
|
||||
"id": "CVE-2023-41079",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-09-27T15:19:26.773",
|
||||
"lastModified": "2023-09-27T15:41:07.967",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-28T13:18:16.230",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved permissions logic. This issue is fixed in macOS Sonoma 14. An app may be able to bypass Privacy preferences."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con una l\u00f3gica de permisos mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14. Es posible que una aplicaci\u00f3n pueda saltarse los ajustes de Privacidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14.0",
|
||||
"matchCriteriaId": "7A5DD3D5-FB4F-4313-B873-DCED87FC4605"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213940",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41241",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-09-27T15:19:28.200",
|
||||
"lastModified": "2023-09-27T15:41:47.123",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-28T13:48:59.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:surecart:surecart:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.5.0",
|
||||
"matchCriteriaId": "861CE0E7-0A07-43B3-8FF1-F9E9C925083F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/surecart/wordpress-surecart-plugin-2-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41444",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T03:15:11.193",
|
||||
"lastModified": "2023-09-28T03:15:11.193",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41445",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-27T23:15:10.150",
|
||||
"lastModified": "2023-09-27T23:15:10.150",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41446",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T03:15:11.387",
|
||||
"lastModified": "2023-09-28T03:15:11.387",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41447",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T03:15:11.480",
|
||||
"lastModified": "2023-09-28T03:15:11.480",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41448",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-27T23:15:11.667",
|
||||
"lastModified": "2023-09-27T23:15:11.667",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41449",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-27T23:15:11.730",
|
||||
"lastModified": "2023-09-27T23:15:11.730",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41450",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T03:15:11.563",
|
||||
"lastModified": "2023-09-28T03:15:11.563",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41451",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-27T23:15:11.787",
|
||||
"lastModified": "2023-09-27T23:15:11.787",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41452",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-27T23:15:11.843",
|
||||
"lastModified": "2023-09-27T23:15:11.843",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41453",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-27T23:15:11.900",
|
||||
"lastModified": "2023-09-27T23:15:11.900",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42222",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T03:15:11.643",
|
||||
"lastModified": "2023-09-28T03:15:11.643",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42818",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-09-27T21:15:10.173",
|
||||
"lastModified": "2023-09-27T21:15:10.173",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43191",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-27T23:15:11.960",
|
||||
"lastModified": "2023-09-27T23:15:11.960",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43192",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-27T22:15:09.700",
|
||||
"lastModified": "2023-09-27T22:15:09.700",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43233",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-27T23:15:12.007",
|
||||
"lastModified": "2023-09-27T23:15:12.007",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43314",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-27T23:15:12.057",
|
||||
"lastModified": "2023-09-27T23:15:12.057",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43320",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-27T23:15:12.113",
|
||||
"lastModified": "2023-09-27T23:15:12.113",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43650",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-09-27T19:15:11.927",
|
||||
"lastModified": "2023-09-27T19:15:11.927",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:18.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43651",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-09-27T21:15:10.347",
|
||||
"lastModified": "2023-09-27T21:15:10.347",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43652",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-09-27T19:15:12.133",
|
||||
"lastModified": "2023-09-27T19:15:12.133",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:18.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43656",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-09-27T21:15:10.443",
|
||||
"lastModified": "2023-09-27T21:15:10.443",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43660",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-09-27T22:15:10.730",
|
||||
"lastModified": "2023-09-27T22:15:10.730",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
24
CVE-2023/CVE-2023-438xx/CVE-2023-43869.json
Normal file
24
CVE-2023/CVE-2023-438xx/CVE-2023-43869.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-43869",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T13:15:09.850",
|
||||
"lastModified": "2023-09-28T13:15:09.850",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard56 Function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44047",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-27T20:15:09.850",
|
||||
"lastModified": "2023-09-27T22:15:11.283",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44048",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-27T20:15:13.493",
|
||||
"lastModified": "2023-09-27T22:15:11.513",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44080",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-27T22:15:11.783",
|
||||
"lastModified": "2023-09-27T22:15:11.783",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:13.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44273",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T04:15:12.493",
|
||||
"lastModified": "2023-09-28T04:15:12.493",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44275",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T05:15:46.243",
|
||||
"lastModified": "2023-09-28T05:15:46.243",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44276",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-28T05:15:46.290",
|
||||
"lastModified": "2023-09-28T05:15:46.290",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4523",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-09-27T19:15:12.373",
|
||||
"lastModified": "2023-09-27T19:15:12.373",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:18.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4863",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-12T15:15:24.327",
|
||||
"lastModified": "2023-09-27T20:15:14.377",
|
||||
"lastModified": "2023-09-28T12:15:09.650",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2023-09-13",
|
||||
"cisaActionDue": "2023-10-04",
|
||||
@ -237,6 +237,10 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/09/26/7",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/09/28/1",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5230",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-09-28T05:15:46.337",
|
||||
"lastModified": "2023-09-28T05:15:46.337",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5232",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-09-28T05:15:46.437",
|
||||
"lastModified": "2023-09-28T05:15:46.437",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5233",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-09-28T05:15:46.513",
|
||||
"lastModified": "2023-09-28T05:15:46.513",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5244",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-09-28T01:15:09.060",
|
||||
"lastModified": "2023-09-28T01:15:09.060",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-28T12:44:04.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
39
README.md
39
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-09-28T12:00:25.473751+00:00
|
||||
2023-09-28T14:00:24.814526+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-09-28T09:15:12.857000+00:00
|
||||
2023-09-28T13:48:59.413000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,22 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
226502
|
||||
226503
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
* [CVE-2023-43869](CVE-2023/CVE-2023-438xx/CVE-2023-43869.json) (`2023-09-28T13:15:09.850`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
Recently modified CVEs: `49`
|
||||
|
||||
* [CVE-2022-29599](CVE-2022/CVE-2022-295xx/CVE-2022-29599.json) (`2023-09-28T09:15:11.267`)
|
||||
* [CVE-2023-33934](CVE-2023/CVE-2023-339xx/CVE-2023-33934.json) (`2023-09-28T09:15:12.597`)
|
||||
* [CVE-2023-44154](CVE-2023/CVE-2023-441xx/CVE-2023-44154.json) (`2023-09-28T09:15:12.857`)
|
||||
* [CVE-2023-42818](CVE-2023/CVE-2023-428xx/CVE-2023-42818.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-43651](CVE-2023/CVE-2023-436xx/CVE-2023-43651.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-43656](CVE-2023/CVE-2023-436xx/CVE-2023-43656.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-4066](CVE-2023/CVE-2023-40xx/CVE-2023-4066.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-43192](CVE-2023/CVE-2023-431xx/CVE-2023-43192.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-43660](CVE-2023/CVE-2023-436xx/CVE-2023-43660.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-44080](CVE-2023/CVE-2023-440xx/CVE-2023-44080.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-41445](CVE-2023/CVE-2023-414xx/CVE-2023-41445.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-41448](CVE-2023/CVE-2023-414xx/CVE-2023-41448.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-41449](CVE-2023/CVE-2023-414xx/CVE-2023-41449.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-41451](CVE-2023/CVE-2023-414xx/CVE-2023-41451.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-41452](CVE-2023/CVE-2023-414xx/CVE-2023-41452.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-41453](CVE-2023/CVE-2023-414xx/CVE-2023-41453.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-43191](CVE-2023/CVE-2023-431xx/CVE-2023-43191.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-43233](CVE-2023/CVE-2023-432xx/CVE-2023-43233.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-43314](CVE-2023/CVE-2023-433xx/CVE-2023-43314.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-43320](CVE-2023/CVE-2023-433xx/CVE-2023-43320.json) (`2023-09-28T12:44:13.510`)
|
||||
* [CVE-2023-33972](CVE-2023/CVE-2023-339xx/CVE-2023-33972.json) (`2023-09-28T12:44:18.717`)
|
||||
* [CVE-2023-43650](CVE-2023/CVE-2023-436xx/CVE-2023-43650.json) (`2023-09-28T12:44:18.717`)
|
||||
* [CVE-2023-43652](CVE-2023/CVE-2023-436xx/CVE-2023-43652.json) (`2023-09-28T12:44:18.717`)
|
||||
* [CVE-2023-4523](CVE-2023/CVE-2023-45xx/CVE-2023-4523.json) (`2023-09-28T12:44:18.717`)
|
||||
* [CVE-2023-41079](CVE-2023/CVE-2023-410xx/CVE-2023-41079.json) (`2023-09-28T13:18:16.230`)
|
||||
* [CVE-2023-40605](CVE-2023/CVE-2023-406xx/CVE-2023-40605.json) (`2023-09-28T13:29:56.727`)
|
||||
* [CVE-2023-40604](CVE-2023/CVE-2023-406xx/CVE-2023-40604.json) (`2023-09-28T13:37:57.513`)
|
||||
* [CVE-2023-41241](CVE-2023/CVE-2023-412xx/CVE-2023-41241.json) (`2023-09-28T13:48:59.413`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user