mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2023-09-05T10:00:23.957522+00:00
This commit is contained in:
parent
76bd8b4b0c
commit
4aedee51a3
24
CVE-2023/CVE-2023-385xx/CVE-2023-38574.json
Normal file
24
CVE-2023/CVE-2023-385xx/CVE-2023-38574.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-38574",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-05T09:15:08.037",
|
||||
"lastModified": "2023-09-05T09:15:08.037",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Open redirect vulnerability in VI Web Client prior to 7.9.6 allows a remote unauthenticated attacker to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://downloadvi.com/downloads/IPServer/v7.9/796232/v796232RN.pdf",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN60140221/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-394xx/CVE-2023-39448.json
Normal file
24
CVE-2023/CVE-2023-394xx/CVE-2023-39448.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-39448",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-05T09:15:08.803",
|
||||
"lastModified": "2023-09-05T09:15:08.803",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Path traversal vulnerability in SHIRASAGI prior to v1.18.0 allows a remote authenticated attacker to alter or create arbitrary files on the server, resulting in arbitrary code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN82758000/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ss-proj.org/support/954.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-399xx/CVE-2023-39938.json
Normal file
24
CVE-2023/CVE-2023-399xx/CVE-2023-39938.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-39938",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-05T09:15:09.053",
|
||||
"lastModified": "2023-09-05T09:15:09.053",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Reflected cross-site scripting vulnerability in VI Web Client prior to 7.9.6 allows a remote unauthenticated attacker to inject an arbitrary script."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://downloadvi.com/downloads/IPServer/v7.9/796232/v796232RN.pdf",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN60140221/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-405xx/CVE-2023-40535.json
Normal file
24
CVE-2023/CVE-2023-405xx/CVE-2023-40535.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-40535",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-05T09:15:09.213",
|
||||
"lastModified": "2023-09-05T09:15:09.213",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stored cross-site scripting vulnerability in View setting page of VI Web Client prior to 7.9.6 allows a remote authenticated attacker to inject an arbitrary script."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://downloadvi.com/downloads/IPServer/v7.9/796232/v796232RN.pdf",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN60140221/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-407xx/CVE-2023-40705.json
Normal file
24
CVE-2023/CVE-2023-407xx/CVE-2023-40705.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-40705",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-05T09:15:09.340",
|
||||
"lastModified": "2023-09-05T09:15:09.340",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stored cross-site scripting vulnerability in Map setting page of VI Web Client prior to 7.9.6 allows a remote authenticated attacker to inject an arbitrary script."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://downloadvi.com/downloads/IPServer/v7.9/796232/v796232RN.pdf",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN60140221/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-45xx/CVE-2023-4540.json
Normal file
32
CVE-2023/CVE-2023-45xx/CVE-2023-4540.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-4540",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2023-09-05T08:15:40.017",
|
||||
"lastModified": "2023-09-05T08:15:40.017",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Handling of Exceptional Conditions vulnerability in Daurnimator HTTP Library for Lua allows Excessive Allocation.This issue affects HTTP Library for Lua: before commit ddab283.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/daurnimator/lua-http/commit/ddab2835c583d45dec62680ca8d3cbde55e0bae6",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
66
README.md
66
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-09-05T08:00:25.999709+00:00
|
||||
2023-09-05T10:00:23.957522+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-09-05T07:15:14.927000+00:00
|
||||
2023-09-05T09:15:09.340000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,69 +29,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
224181
|
||||
224187
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `39`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
* [CVE-2023-21667](CVE-2023/CVE-2023-216xx/CVE-2023-21667.json) (`2023-09-05T07:15:13.020`)
|
||||
* [CVE-2023-28538](CVE-2023/CVE-2023-285xx/CVE-2023-28538.json) (`2023-09-05T07:15:13.113`)
|
||||
* [CVE-2023-28543](CVE-2023/CVE-2023-285xx/CVE-2023-28543.json) (`2023-09-05T07:15:13.197`)
|
||||
* [CVE-2023-28544](CVE-2023/CVE-2023-285xx/CVE-2023-28544.json) (`2023-09-05T07:15:13.280`)
|
||||
* [CVE-2023-28548](CVE-2023/CVE-2023-285xx/CVE-2023-28548.json) (`2023-09-05T07:15:13.360`)
|
||||
* [CVE-2023-28549](CVE-2023/CVE-2023-285xx/CVE-2023-28549.json) (`2023-09-05T07:15:13.437`)
|
||||
* [CVE-2023-28557](CVE-2023/CVE-2023-285xx/CVE-2023-28557.json) (`2023-09-05T07:15:13.517`)
|
||||
* [CVE-2023-28558](CVE-2023/CVE-2023-285xx/CVE-2023-28558.json) (`2023-09-05T07:15:13.603`)
|
||||
* [CVE-2023-28559](CVE-2023/CVE-2023-285xx/CVE-2023-28559.json) (`2023-09-05T07:15:13.687`)
|
||||
* [CVE-2023-28560](CVE-2023/CVE-2023-285xx/CVE-2023-28560.json) (`2023-09-05T07:15:13.763`)
|
||||
* [CVE-2023-28562](CVE-2023/CVE-2023-285xx/CVE-2023-28562.json) (`2023-09-05T07:15:13.843`)
|
||||
* [CVE-2023-28564](CVE-2023/CVE-2023-285xx/CVE-2023-28564.json) (`2023-09-05T07:15:13.923`)
|
||||
* [CVE-2023-28565](CVE-2023/CVE-2023-285xx/CVE-2023-28565.json) (`2023-09-05T07:15:14.000`)
|
||||
* [CVE-2023-28567](CVE-2023/CVE-2023-285xx/CVE-2023-28567.json) (`2023-09-05T07:15:14.083`)
|
||||
* [CVE-2023-28573](CVE-2023/CVE-2023-285xx/CVE-2023-28573.json) (`2023-09-05T07:15:14.167`)
|
||||
* [CVE-2023-28581](CVE-2023/CVE-2023-285xx/CVE-2023-28581.json) (`2023-09-05T07:15:14.247`)
|
||||
* [CVE-2023-28584](CVE-2023/CVE-2023-285xx/CVE-2023-28584.json) (`2023-09-05T07:15:14.323`)
|
||||
* [CVE-2023-33015](CVE-2023/CVE-2023-330xx/CVE-2023-33015.json) (`2023-09-05T07:15:14.407`)
|
||||
* [CVE-2023-33016](CVE-2023/CVE-2023-330xx/CVE-2023-33016.json) (`2023-09-05T07:15:14.487`)
|
||||
* [CVE-2023-33019](CVE-2023/CVE-2023-330xx/CVE-2023-33019.json) (`2023-09-05T07:15:14.560`)
|
||||
* [CVE-2023-33020](CVE-2023/CVE-2023-330xx/CVE-2023-33020.json) (`2023-09-05T07:15:14.640`)
|
||||
* [CVE-2023-33021](CVE-2023/CVE-2023-330xx/CVE-2023-33021.json) (`2023-09-05T07:15:14.717`)
|
||||
* [CVE-2023-41908](CVE-2023/CVE-2023-419xx/CVE-2023-41908.json) (`2023-09-05T07:15:14.810`)
|
||||
* [CVE-2023-41909](CVE-2023/CVE-2023-419xx/CVE-2023-41909.json) (`2023-09-05T07:15:14.877`)
|
||||
* [CVE-2023-41910](CVE-2023/CVE-2023-419xx/CVE-2023-41910.json) (`2023-09-05T07:15:14.927`)
|
||||
* [CVE-2023-4540](CVE-2023/CVE-2023-45xx/CVE-2023-4540.json) (`2023-09-05T08:15:40.017`)
|
||||
* [CVE-2023-38574](CVE-2023/CVE-2023-385xx/CVE-2023-38574.json) (`2023-09-05T09:15:08.037`)
|
||||
* [CVE-2023-39448](CVE-2023/CVE-2023-394xx/CVE-2023-39448.json) (`2023-09-05T09:15:08.803`)
|
||||
* [CVE-2023-39938](CVE-2023/CVE-2023-399xx/CVE-2023-39938.json) (`2023-09-05T09:15:09.053`)
|
||||
* [CVE-2023-40535](CVE-2023/CVE-2023-405xx/CVE-2023-40535.json) (`2023-09-05T09:15:09.213`)
|
||||
* [CVE-2023-40705](CVE-2023/CVE-2023-407xx/CVE-2023-40705.json) (`2023-09-05T09:15:09.340`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `66`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2023-4284](CVE-2023/CVE-2023-42xx/CVE-2023-4284.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-4298](CVE-2023/CVE-2023-42xx/CVE-2023-4298.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-4587](CVE-2023/CVE-2023-45xx/CVE-2023-4587.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-3221](CVE-2023/CVE-2023-32xx/CVE-2023-3221.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-3222](CVE-2023/CVE-2023-32xx/CVE-2023-3222.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-4733](CVE-2023/CVE-2023-47xx/CVE-2023-4733.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-4750](CVE-2023/CVE-2023-47xx/CVE-2023-4750.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-4752](CVE-2023/CVE-2023-47xx/CVE-2023-4752.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-4755](CVE-2023/CVE-2023-47xx/CVE-2023-4755.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-28072](CVE-2023/CVE-2023-280xx/CVE-2023-28072.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-4758](CVE-2023/CVE-2023-47xx/CVE-2023-4758.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-40015](CVE-2023/CVE-2023-400xx/CVE-2023-40015.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-41052](CVE-2023/CVE-2023-410xx/CVE-2023-41052.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-41054](CVE-2023/CVE-2023-410xx/CVE-2023-41054.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-41055](CVE-2023/CVE-2023-410xx/CVE-2023-41055.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-41057](CVE-2023/CVE-2023-410xx/CVE-2023-41057.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-41058](CVE-2023/CVE-2023-410xx/CVE-2023-41058.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-32338](CVE-2023/CVE-2023-323xx/CVE-2023-32338.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-35892](CVE-2023/CVE-2023-358xx/CVE-2023-35892.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-22870](CVE-2023/CVE-2023-228xx/CVE-2023-22870.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-29261](CVE-2023/CVE-2023-292xx/CVE-2023-29261.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-35906](CVE-2023/CVE-2023-359xx/CVE-2023-35906.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-4636](CVE-2023/CVE-2023-46xx/CVE-2023-4636.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-36308](CVE-2023/CVE-2023-363xx/CVE-2023-36308.json) (`2023-09-05T06:50:39.603`)
|
||||
* [CVE-2023-36307](CVE-2023/CVE-2023-363xx/CVE-2023-36307.json) (`2023-09-05T06:50:39.603`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user