mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2023-09-23T02:00:24.902133+00:00
This commit is contained in:
parent
571063b329
commit
5606d95bd2
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20593",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-07-24T20:15:10.237",
|
||||
"lastModified": "2023-09-22T21:15:09.800",
|
||||
"lastModified": "2023-09-23T00:15:09.960",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -2084,6 +2084,10 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/08/16/5",
|
||||
"source": "psirt@amd.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/11",
|
||||
"source": "psirt@amd.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/9",
|
||||
"source": "psirt@amd.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-38408",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-20T03:15:10.170",
|
||||
"lastModified": "2023-09-22T21:15:16.973",
|
||||
"lastModified": "2023-09-23T00:15:16.653",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -121,6 +121,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/11",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/9",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3817",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-07-31T16:15:10.497",
|
||||
"lastModified": "2023-09-22T21:15:20.033",
|
||||
"lastModified": "2023-09-23T00:15:19.610",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -428,6 +428,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/11",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/9",
|
||||
"source": "openssl-security@openssl.org"
|
||||
|
20
CVE-2023/CVE-2023-433xx/CVE-2023-43338.json
Normal file
20
CVE-2023/CVE-2023-433xx/CVE-2023-43338.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-43338",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-23T00:15:20.170",
|
||||
"lastModified": "2023-09-23T00:15:20.170",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cesanta mjs v2.20.0 was discovered to contain a function pointer hijacking vulnerability via the function mjs_get_ptr(). This vulnerability allows attackers to execute arbitrary code via a crafted input."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cesanta/mjs/issues/250",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-434xx/CVE-2023-43468.json
Normal file
28
CVE-2023/CVE-2023-434xx/CVE-2023-43468.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-43468",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-23T00:15:20.303",
|
||||
"lastModified": "2023-09-23T00:15:20.303",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in janobe Online Job Portal v.2020 allows a remote attacker to execute arbitrary code via the login.php component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/ae6e361b/30d56c116d9f727b91c418d044f42fd3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ae6e361b/Online-Job-Portal",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/php/14518/online-job-portal-php-full-source-code-2020.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-434xx/CVE-2023-43469.json
Normal file
28
CVE-2023/CVE-2023-434xx/CVE-2023-43469.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-43469",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-23T00:15:20.387",
|
||||
"lastModified": "2023-09-23T00:15:20.387",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in janobe Online Job Portal v.2020 allows a remote attacker to execute arbitrary code via the ForPass.php component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/ae6e361b/28ffc44d39e406ce1bc627c0c5c3a7de",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ae6e361b/Online-Job-Portal-Forget",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/php/14518/online-job-portal-php-full-source-code-2020.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-434xx/CVE-2023-43470.json
Normal file
28
CVE-2023/CVE-2023-434xx/CVE-2023-43470.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-43470",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-23T00:15:20.470",
|
||||
"lastModified": "2023-09-23T00:15:20.470",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in janobe Online Voting System v.1.0 allows a remote attacker to execute arbitrary code via the checklogin.php component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/ae6e361b/1ed56fbfbbfd368835b8a8089f8ee64a",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ae6e361b/Online-Voting-System",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/php/14690/online-voting-system-phpmysqli-full-source-code.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
33
README.md
33
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-09-22T23:55:24.946774+00:00
|
||||
2023-09-23T02:00:24.902133+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-09-22T23:21:39.633000+00:00
|
||||
2023-09-23T00:15:20.470000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -23,39 +23,32 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2023-09-22T00:00:13.541260+00:00
|
||||
2023-09-23T00:00:13.567925+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
226063
|
||||
226067
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2023-43129](CVE-2023/CVE-2023-431xx/CVE-2023-43129.json) (`2023-09-22T23:15:09.483`)
|
||||
* [CVE-2023-43130](CVE-2023/CVE-2023-431xx/CVE-2023-43130.json) (`2023-09-22T23:15:10.050`)
|
||||
* [CVE-2023-43338](CVE-2023/CVE-2023-433xx/CVE-2023-43338.json) (`2023-09-23T00:15:20.170`)
|
||||
* [CVE-2023-43468](CVE-2023/CVE-2023-434xx/CVE-2023-43468.json) (`2023-09-23T00:15:20.303`)
|
||||
* [CVE-2023-43469](CVE-2023/CVE-2023-434xx/CVE-2023-43469.json) (`2023-09-23T00:15:20.387`)
|
||||
* [CVE-2023-43470](CVE-2023/CVE-2023-434xx/CVE-2023-43470.json) (`2023-09-23T00:15:20.470`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `12`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
* [CVE-2015-5467](CVE-2015/CVE-2015-54xx/CVE-2015-5467.json) (`2023-09-22T22:51:53.840`)
|
||||
* [CVE-2023-20597](CVE-2023/CVE-2023-205xx/CVE-2023-20597.json) (`2023-09-22T22:35:09.617`)
|
||||
* [CVE-2023-37410](CVE-2023/CVE-2023-374xx/CVE-2023-37410.json) (`2023-09-22T22:39:50.127`)
|
||||
* [CVE-2023-39041](CVE-2023/CVE-2023-390xx/CVE-2023-39041.json) (`2023-09-22T22:46:09.727`)
|
||||
* [CVE-2023-38875](CVE-2023/CVE-2023-388xx/CVE-2023-38875.json) (`2023-09-22T22:55:59.380`)
|
||||
* [CVE-2023-39052](CVE-2023/CVE-2023-390xx/CVE-2023-39052.json) (`2023-09-22T23:03:03.047`)
|
||||
* [CVE-2023-39045](CVE-2023/CVE-2023-390xx/CVE-2023-39045.json) (`2023-09-22T23:04:32.703`)
|
||||
* [CVE-2023-0118](CVE-2023/CVE-2023-01xx/CVE-2023-0118.json) (`2023-09-22T23:10:25.823`)
|
||||
* [CVE-2023-0462](CVE-2023/CVE-2023-04xx/CVE-2023-0462.json) (`2023-09-22T23:12:15.907`)
|
||||
* [CVE-2023-5016](CVE-2023/CVE-2023-50xx/CVE-2023-5016.json) (`2023-09-22T23:16:06.000`)
|
||||
* [CVE-2023-41614](CVE-2023/CVE-2023-416xx/CVE-2023-41614.json) (`2023-09-22T23:20:38.557`)
|
||||
* [CVE-2023-41616](CVE-2023/CVE-2023-416xx/CVE-2023-41616.json) (`2023-09-22T23:21:39.633`)
|
||||
* [CVE-2023-20593](CVE-2023/CVE-2023-205xx/CVE-2023-20593.json) (`2023-09-23T00:15:09.960`)
|
||||
* [CVE-2023-38408](CVE-2023/CVE-2023-384xx/CVE-2023-38408.json) (`2023-09-23T00:15:16.653`)
|
||||
* [CVE-2023-3817](CVE-2023/CVE-2023-38xx/CVE-2023-3817.json) (`2023-09-23T00:15:19.610`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user