mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
Auto-Update: 2023-10-11T12:00:25.741739+00:00
This commit is contained in:
parent
025eee83d3
commit
5147259a3c
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43551",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2022-12-23T15:15:15.777",
|
||||
"lastModified": "2023-04-27T15:15:09.903",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-11T11:15:09.723",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -107,6 +107,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "support@hackerone.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43552",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-02-09T20:15:10.950",
|
||||
"lastModified": "2023-03-28T05:15:08.013",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-11T11:15:10.070",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -88,6 +88,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230214-0002/",
|
||||
"source": "support@hackerone.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23914",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-02-23T20:15:13.637",
|
||||
"lastModified": "2023-03-09T19:15:11.020",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-11T11:15:10.340",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -84,6 +84,10 @@
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230309-0006/",
|
||||
"source": "support@hackerone.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23915",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-02-23T20:15:13.703",
|
||||
"lastModified": "2023-03-09T19:15:11.417",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-11T11:15:10.793",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -83,6 +83,10 @@
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230309-0006/",
|
||||
"source": "support@hackerone.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23916",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-02-23T20:15:13.777",
|
||||
"lastModified": "2023-04-18T16:49:14.370",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-11T11:15:10.960",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -58,7 +58,6 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -76,7 +75,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -92,7 +90,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -221,7 +218,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -262,6 +258,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230309-0006/",
|
||||
"source": "support@hackerone.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27533",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-03-30T20:15:07.373",
|
||||
"lastModified": "2023-04-21T23:15:19.880",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-11T11:15:11.197",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230420-0011/",
|
||||
"source": "support@hackerone.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27534",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-03-30T20:15:07.427",
|
||||
"lastModified": "2023-04-20T09:15:09.820",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-11T11:15:11.447",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230420-0012/",
|
||||
"source": "support@hackerone.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27535",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-03-30T20:15:07.483",
|
||||
"lastModified": "2023-06-29T19:29:03.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-11T11:15:11.530",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -58,7 +58,6 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -76,7 +75,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -92,7 +90,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -108,7 +105,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -262,6 +258,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
|
||||
"source": "support@hackerone.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27536",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-03-30T20:15:07.547",
|
||||
"lastModified": "2023-06-06T20:34:24.683",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-11T11:15:11.643",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -58,7 +58,6 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -76,7 +75,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -92,7 +90,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -108,7 +105,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -232,7 +228,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -273,6 +268,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
|
||||
"source": "support@hackerone.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27537",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-03-30T20:15:07.617",
|
||||
"lastModified": "2023-04-20T09:15:10.027",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-11T11:15:11.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -87,6 +87,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
|
||||
"source": "support@hackerone.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27538",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-03-30T20:15:07.677",
|
||||
"lastModified": "2023-04-21T23:15:20.127",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-11T11:15:11.977",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -103,6 +103,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
|
||||
"source": "support@hackerone.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28319",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-05-26T21:15:10.020",
|
||||
"lastModified": "2023-08-02T16:47:10.673",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-11T11:15:12.140",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -58,7 +58,6 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -75,7 +74,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -107,7 +105,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -267,6 +264,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
|
||||
"source": "support@hackerone.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28320",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-05-26T21:15:15.937",
|
||||
"lastModified": "2023-08-02T16:46:55.257",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-11T11:15:12.517",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -62,7 +62,6 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -79,7 +78,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -111,7 +109,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -271,6 +268,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
|
||||
"source": "support@hackerone.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28321",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-05-26T21:15:16.020",
|
||||
"lastModified": "2023-08-02T16:46:39.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-11T11:15:12.713",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -58,7 +58,6 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -75,7 +74,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -96,7 +94,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -225,7 +222,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -304,6 +300,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
|
||||
"source": "support@hackerone.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28322",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-05-26T21:15:16.153",
|
||||
"lastModified": "2023-08-02T16:46:27.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-11T11:15:12.940",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -58,7 +58,6 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -75,7 +74,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -96,7 +94,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -128,7 +125,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -304,6 +300,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
|
||||
"source": "support@hackerone.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38039",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-09-15T04:15:10.127",
|
||||
"lastModified": "2023-09-27T15:18:55.227",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-11T11:15:13.127",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -109,6 +109,10 @@
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-12",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-440xx/CVE-2023-44093.json
Normal file
24
CVE-2023/CVE-2023-440xx/CVE-2023-44093.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-44093",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T11:15:13.423",
|
||||
"lastModified": "2023-10-11T11:15:13.423",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of package names' public keys not being verified in the security module.Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-440xx/CVE-2023-44094.json
Normal file
36
CVE-2023/CVE-2023-440xx/CVE-2023-44094.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-44094",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T11:15:13.577",
|
||||
"lastModified": "2023-10-11T11:15:13.577",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-440xx/CVE-2023-44096.json
Normal file
36
CVE-2023/CVE-2023-440xx/CVE-2023-44096.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-44096",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T11:15:13.833",
|
||||
"lastModified": "2023-10-11T11:15:13.833",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": " Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-441xx/CVE-2023-44109.json
Normal file
36
CVE-2023/CVE-2023-441xx/CVE-2023-44109.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-44109",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T11:15:14.120",
|
||||
"lastModified": "2023-10-11T11:15:14.120",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Clone vulnerability in the huks ta module.Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
39
README.md
39
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-10-11T10:00:25.885887+00:00
|
||||
2023-10-11T12:00:25.741739+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-10-11T09:15:10.773000+00:00
|
||||
2023-10-11T11:15:14.120000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,28 +29,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
227533
|
||||
227537
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2023-44997](CVE-2023/CVE-2023-449xx/CVE-2023-44997.json) (`2023-10-11T08:15:08.883`)
|
||||
* [CVE-2023-4990](CVE-2023/CVE-2023-49xx/CVE-2023-4990.json) (`2023-10-11T08:15:09.053`)
|
||||
* [CVE-2023-42138](CVE-2023/CVE-2023-421xx/CVE-2023-42138.json) (`2023-10-11T09:15:10.417`)
|
||||
* [CVE-2023-44093](CVE-2023/CVE-2023-440xx/CVE-2023-44093.json) (`2023-10-11T11:15:13.423`)
|
||||
* [CVE-2023-44094](CVE-2023/CVE-2023-440xx/CVE-2023-44094.json) (`2023-10-11T11:15:13.577`)
|
||||
* [CVE-2023-44096](CVE-2023/CVE-2023-440xx/CVE-2023-44096.json) (`2023-10-11T11:15:13.833`)
|
||||
* [CVE-2023-44109](CVE-2023/CVE-2023-441xx/CVE-2023-44109.json) (`2023-10-11T11:15:14.120`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `6`
|
||||
Recently modified CVEs: `16`
|
||||
|
||||
* [CVE-2023-2718](CVE-2023/CVE-2023-27xx/CVE-2023-2718.json) (`2023-10-11T09:15:09.813`)
|
||||
* [CVE-2023-3134](CVE-2023/CVE-2023-31xx/CVE-2023-3134.json) (`2023-10-11T09:15:10.097`)
|
||||
* [CVE-2023-3575](CVE-2023/CVE-2023-35xx/CVE-2023-3575.json) (`2023-10-11T09:15:10.320`)
|
||||
* [CVE-2023-5391](CVE-2023/CVE-2023-53xx/CVE-2023-5391.json) (`2023-10-11T09:15:10.483`)
|
||||
* [CVE-2023-5399](CVE-2023/CVE-2023-53xx/CVE-2023-5399.json) (`2023-10-11T09:15:10.597`)
|
||||
* [CVE-2023-5402](CVE-2023/CVE-2023-54xx/CVE-2023-5402.json) (`2023-10-11T09:15:10.773`)
|
||||
* [CVE-2022-43551](CVE-2022/CVE-2022-435xx/CVE-2022-43551.json) (`2023-10-11T11:15:09.723`)
|
||||
* [CVE-2022-43552](CVE-2022/CVE-2022-435xx/CVE-2022-43552.json) (`2023-10-11T11:15:10.070`)
|
||||
* [CVE-2023-23914](CVE-2023/CVE-2023-239xx/CVE-2023-23914.json) (`2023-10-11T11:15:10.340`)
|
||||
* [CVE-2023-23915](CVE-2023/CVE-2023-239xx/CVE-2023-23915.json) (`2023-10-11T11:15:10.793`)
|
||||
* [CVE-2023-23916](CVE-2023/CVE-2023-239xx/CVE-2023-23916.json) (`2023-10-11T11:15:10.960`)
|
||||
* [CVE-2023-27533](CVE-2023/CVE-2023-275xx/CVE-2023-27533.json) (`2023-10-11T11:15:11.197`)
|
||||
* [CVE-2023-27534](CVE-2023/CVE-2023-275xx/CVE-2023-27534.json) (`2023-10-11T11:15:11.447`)
|
||||
* [CVE-2023-27535](CVE-2023/CVE-2023-275xx/CVE-2023-27535.json) (`2023-10-11T11:15:11.530`)
|
||||
* [CVE-2023-27536](CVE-2023/CVE-2023-275xx/CVE-2023-27536.json) (`2023-10-11T11:15:11.643`)
|
||||
* [CVE-2023-27537](CVE-2023/CVE-2023-275xx/CVE-2023-27537.json) (`2023-10-11T11:15:11.753`)
|
||||
* [CVE-2023-27538](CVE-2023/CVE-2023-275xx/CVE-2023-27538.json) (`2023-10-11T11:15:11.977`)
|
||||
* [CVE-2023-28319](CVE-2023/CVE-2023-283xx/CVE-2023-28319.json) (`2023-10-11T11:15:12.140`)
|
||||
* [CVE-2023-28320](CVE-2023/CVE-2023-283xx/CVE-2023-28320.json) (`2023-10-11T11:15:12.517`)
|
||||
* [CVE-2023-28321](CVE-2023/CVE-2023-283xx/CVE-2023-28321.json) (`2023-10-11T11:15:12.713`)
|
||||
* [CVE-2023-28322](CVE-2023/CVE-2023-283xx/CVE-2023-28322.json) (`2023-10-11T11:15:12.940`)
|
||||
* [CVE-2023-38039](CVE-2023/CVE-2023-380xx/CVE-2023-38039.json) (`2023-10-11T11:15:13.127`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user