mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2023-08-29T04:00:24.796220+00:00
This commit is contained in:
parent
709741e55a
commit
46cf4f453d
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0664",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-29T20:15:07.347",
|
||||
"lastModified": "2023-05-17T20:15:09.687",
|
||||
"lastModified": "2023-08-29T03:15:07.567",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -86,7 +86,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -112,7 +111,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -152,6 +150,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEOC7SRJWLZSXCND2ADFW6C76ZMTZLE4/",
|
||||
"source": "secalert@redhat.com"
|
||||
|
55
CVE-2023/CVE-2023-19xx/CVE-2023-1995.json
Normal file
55
CVE-2023/CVE-2023-19xx/CVE-2023-1995.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-1995",
|
||||
"sourceIdentifier": "hirt@hitachi.co.jp",
|
||||
"published": "2023-08-29T02:15:07.837",
|
||||
"lastModified": "2023-08-29T02:15:07.837",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient Logging vulnerability in Hitachi HiRDB Server, HiRDB Server With Addtional Function, HiRDB Structured Data Access Facility.This issue affects HiRDB Server: before 09-60-39, before 09-65-23, before 10-01-10, before 10-03-12, before 10-04-06, before 10-05-06, before 10-06-02; HiRDB Server With Addtional Function: before 09-60-2M, before 09-65-/W; HiRDB Structured Data Access Facility: before 09-60-39, before 10-03-12, before 10-04-06, before 10-06-02.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "hirt@hitachi.co.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "hirt@hitachi.co.jp",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-778"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-133/index.html",
|
||||
"source": "hirt@hitachi.co.jp"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3180",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-08-03T15:15:29.960",
|
||||
"lastModified": "2023-08-08T16:16:06.530",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-08-29T03:15:08.083",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -99,6 +99,10 @@
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3354",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-11T17:15:13.387",
|
||||
"lastModified": "2023-07-20T12:58:14.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-08-29T03:15:08.197",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -133,6 +133,10 @@
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40251",
|
||||
"sourceIdentifier": "vuln@krcert.or.kr",
|
||||
"published": "2023-08-17T07:15:43.737",
|
||||
"lastModified": "2023-08-23T14:43:45.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-08-29T02:15:08.277",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -121,11 +121,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.genians.co.kr/notice/2023",
|
||||
"source": "vuln@krcert.or.kr",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html",
|
||||
"source": "vuln@krcert.or.kr"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40252",
|
||||
"sourceIdentifier": "vuln@krcert.or.kr",
|
||||
"published": "2023-08-17T07:15:43.847",
|
||||
"lastModified": "2023-08-23T15:13:24.897",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-08-29T02:15:08.503",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -121,11 +121,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.genians.co.kr/notice/2023",
|
||||
"source": "vuln@krcert.or.kr",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html",
|
||||
"source": "vuln@krcert.or.kr"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40253",
|
||||
"sourceIdentifier": "vuln@krcert.or.kr",
|
||||
"published": "2023-08-11T06:15:10.673",
|
||||
"lastModified": "2023-08-23T00:02:47.657",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-08-29T02:15:08.610",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -71,7 +71,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -121,11 +121,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.genians.co.kr/notice/2023",
|
||||
"source": "vuln@krcert.or.kr",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html",
|
||||
"source": "vuln@krcert.or.kr"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40254",
|
||||
"sourceIdentifier": "vuln@krcert.or.kr",
|
||||
"published": "2023-08-11T07:15:09.423",
|
||||
"lastModified": "2023-08-23T00:03:06.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-08-29T02:15:08.737",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -71,7 +71,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-494"
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -121,11 +121,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.genians.co.kr/notice/2023",
|
||||
"source": "vuln@krcert.or.kr",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html",
|
||||
"source": "vuln@krcert.or.kr"
|
||||
}
|
||||
]
|
||||
}
|
19
README.md
19
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-08-29T02:00:24.842621+00:00
|
||||
2023-08-29T04:00:24.796220+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-08-29T00:15:07.593000+00:00
|
||||
2023-08-29T03:15:08.197000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,20 +29,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
223590
|
||||
223591
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
* [CVE-2023-1995](CVE-2023/CVE-2023-19xx/CVE-2023-1995.json) (`2023-08-29T02:15:07.837`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `7`
|
||||
|
||||
* [CVE-2023-28980](CVE-2023/CVE-2023-289xx/CVE-2023-28980.json) (`2023-08-29T00:15:07.593`)
|
||||
* [CVE-2023-40251](CVE-2023/CVE-2023-402xx/CVE-2023-40251.json) (`2023-08-29T02:15:08.277`)
|
||||
* [CVE-2023-40252](CVE-2023/CVE-2023-402xx/CVE-2023-40252.json) (`2023-08-29T02:15:08.503`)
|
||||
* [CVE-2023-40253](CVE-2023/CVE-2023-402xx/CVE-2023-40253.json) (`2023-08-29T02:15:08.610`)
|
||||
* [CVE-2023-40254](CVE-2023/CVE-2023-402xx/CVE-2023-40254.json) (`2023-08-29T02:15:08.737`)
|
||||
* [CVE-2023-0664](CVE-2023/CVE-2023-06xx/CVE-2023-0664.json) (`2023-08-29T03:15:07.567`)
|
||||
* [CVE-2023-3180](CVE-2023/CVE-2023-31xx/CVE-2023-3180.json) (`2023-08-29T03:15:08.083`)
|
||||
* [CVE-2023-3354](CVE-2023/CVE-2023-33xx/CVE-2023-3354.json) (`2023-08-29T03:15:08.197`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user