Auto-Update: 2023-09-01T08:00:24.795939+00:00

This commit is contained in:
cad-safe-bot 2023-09-01 08:00:28 +00:00
parent 3e06bbfde6
commit 57a3b858a7
42 changed files with 125 additions and 85 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46869",
"sourceIdentifier": "security@acronis.com",
"published": "2023-08-31T20:15:08.027",
"lastModified": "2023-08-31T20:15:08.027",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0804",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-02-13T23:15:12.667",
"lastModified": "2023-05-30T06:16:13.943",
"lastModified": "2023-09-01T06:15:41.807",
"vulnStatus": "Modified",
"descriptions": [
{
@ -113,6 +113,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html",
"source": "cve@gitlab.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FBF3UUFSB6NB3NFTQSKOOIZGXJP3T34Z/",
"source": "cve@gitlab.com"
},
{
"url": "https://security.gentoo.org/glsa/202305-31",
"source": "cve@gitlab.com"

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-20900",
"sourceIdentifier": "security@vmware.com",
"published": "2023-08-31T10:15:08.247",
"lastModified": "2023-08-31T15:15:08.420",
"lastModified": "2023-09-01T07:15:09.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "VMware Tools contains a SAML token signature bypass vulnerability.\u00a0A malicious actor with man-in-the-middle (MITM) network positioning between vCenter server and the virtual machine may be able to bypass SAML token signature verification, to perform VMware Tools Guest Operations.\n\n\n\n\n\n\n\n\n\n\n\n"
"value": "VMware Tools contains a SAML token signature bypass vulnerability.\u00a0A malicious actor with man-in-the-middle (MITM) network positioning in the virtual machine network may be able to bypass SAML token signature verification, to perform VMware Tools Guest Operations.\n\n\n\n\n\n\n\n\n\n\n\n"
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22652",
"sourceIdentifier": "meissner@suse.de",
"published": "2023-06-01T12:15:09.557",
"lastModified": "2023-06-08T18:29:14.603",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-01T06:15:42.900",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -99,6 +99,10 @@
"tags": [
"Broken Link"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMG5256D5I3GFA3RBAJQ2WYPJDYAIL74/",
"source": "meissner@suse.de"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30079",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:36.190",
"lastModified": "2023-08-26T02:24:07.070",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-01T06:15:43.760",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -79,6 +79,10 @@
"Exploit"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMG5256D5I3GFA3RBAJQ2WYPJDYAIL74/",
"source": "cve@mitre.org"
},
{
"url": "https://raw.githubusercontent.com/yangjiageng/PoC/master/libeconf-PoC/tst-logindefs1.c",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3899",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-23T11:15:07.573",
"lastModified": "2023-08-30T17:19:03.907",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-01T06:15:44.377",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -462,6 +462,10 @@
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJHKSBBZRDFOBNDU35FUKMYQIQYT6UJQ/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39350",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T20:15:08.170",
"lastModified": "2023-08-31T20:15:08.170",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39351",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T20:15:08.280",
"lastModified": "2023-08-31T20:15:08.280",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39352",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T21:15:07.873",
"lastModified": "2023-08-31T21:15:07.873",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39353",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T21:15:08.213",
"lastModified": "2023-08-31T21:15:08.213",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39354",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T20:15:08.367",
"lastModified": "2023-08-31T20:15:08.367",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39355",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T20:15:08.457",
"lastModified": "2023-08-31T20:15:08.457",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39356",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T21:15:08.390",
"lastModified": "2023-08-31T21:15:08.390",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39912",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-31T23:15:26.297",
"lastModified": "2023-08-31T23:15:26.297",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40181",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T22:15:07.860",
"lastModified": "2023-08-31T22:15:07.860",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40186",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T22:15:08.303",
"lastModified": "2023-08-31T22:15:08.303",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40187",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T22:15:08.417",
"lastModified": "2023-08-31T22:15:08.417",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40188",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T22:15:08.523",
"lastModified": "2023-08-31T22:15:08.523",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40567",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T22:15:08.613",
"lastModified": "2023-08-31T22:15:08.613",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40569",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T22:15:08.707",
"lastModified": "2023-08-31T22:15:08.707",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40574",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T22:15:08.793",
"lastModified": "2023-08-31T22:15:08.793",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40575",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T22:15:08.877",
"lastModified": "2023-08-31T22:15:08.877",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40576",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T22:15:08.970",
"lastModified": "2023-08-31T22:15:08.970",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40589",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T19:15:11.360",
"lastModified": "2023-08-31T19:15:11.360",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41034",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T18:15:09.020",
"lastModified": "2023-08-31T18:15:09.020",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41044",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T18:15:09.187",
"lastModified": "2023-08-31T18:15:09.187",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41045",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T18:15:09.280",
"lastModified": "2023-08-31T18:15:09.280",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41745",
"sourceIdentifier": "security@acronis.com",
"published": "2023-08-31T18:15:09.373",
"lastModified": "2023-08-31T18:15:09.373",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41746",
"sourceIdentifier": "security@acronis.com",
"published": "2023-08-31T18:15:09.453",
"lastModified": "2023-08-31T18:15:09.453",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41747",
"sourceIdentifier": "security@acronis.com",
"published": "2023-08-31T18:15:09.523",
"lastModified": "2023-08-31T18:15:09.523",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41748",
"sourceIdentifier": "security@acronis.com",
"published": "2023-08-31T18:15:09.587",
"lastModified": "2023-08-31T18:15:09.587",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41749",
"sourceIdentifier": "security@acronis.com",
"published": "2023-08-31T21:15:08.583",
"lastModified": "2023-08-31T21:15:08.583",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41750",
"sourceIdentifier": "security@acronis.com",
"published": "2023-08-31T21:15:08.790",
"lastModified": "2023-08-31T21:15:08.790",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41751",
"sourceIdentifier": "security@acronis.com",
"published": "2023-08-31T21:15:08.963",
"lastModified": "2023-08-31T21:15:08.963",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4299",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-08-31T21:15:09.183",
"lastModified": "2023-08-31T21:15:09.183",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4481",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-09-01T00:15:08.703",
"lastModified": "2023-09-01T00:15:08.703",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4688",
"sourceIdentifier": "security@acronis.com",
"published": "2023-08-31T21:15:09.417",
"lastModified": "2023-08-31T21:15:09.417",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4695",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-01T01:15:07.877",
"lastModified": "2023-09-01T01:15:07.877",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4696",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-01T01:15:08.400",
"lastModified": "2023-09-01T01:15:08.400",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4697",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-01T01:15:09.320",
"lastModified": "2023-09-01T01:15:09.320",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4698",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-01T01:15:09.437",
"lastModified": "2023-09-01T01:15:09.437",
"vulnStatus": "Received",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-01T06:00:25.980595+00:00
2023-09-01T08:00:24.795939+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-01T04:15:10.927000+00:00
2023-09-01T07:32:13.003000+00:00
```
### Last Data Feed Release
@ -40,9 +40,33 @@ Recently added CVEs: `0`
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `41`
* [CVE-2023-4572](CVE-2023/CVE-2023-45xx/CVE-2023-4572.json) (`2023-09-01T04:15:10.927`)
* [CVE-2023-39354](CVE-2023/CVE-2023-393xx/CVE-2023-39354.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-39355](CVE-2023/CVE-2023-393xx/CVE-2023-39355.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-39352](CVE-2023/CVE-2023-393xx/CVE-2023-39352.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-39353](CVE-2023/CVE-2023-393xx/CVE-2023-39353.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-39356](CVE-2023/CVE-2023-393xx/CVE-2023-39356.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-41749](CVE-2023/CVE-2023-417xx/CVE-2023-41749.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-41750](CVE-2023/CVE-2023-417xx/CVE-2023-41750.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-41751](CVE-2023/CVE-2023-417xx/CVE-2023-41751.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-4299](CVE-2023/CVE-2023-42xx/CVE-2023-4299.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-4688](CVE-2023/CVE-2023-46xx/CVE-2023-4688.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-40181](CVE-2023/CVE-2023-401xx/CVE-2023-40181.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-40186](CVE-2023/CVE-2023-401xx/CVE-2023-40186.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-40187](CVE-2023/CVE-2023-401xx/CVE-2023-40187.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-40188](CVE-2023/CVE-2023-401xx/CVE-2023-40188.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-40567](CVE-2023/CVE-2023-405xx/CVE-2023-40567.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-40569](CVE-2023/CVE-2023-405xx/CVE-2023-40569.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-40574](CVE-2023/CVE-2023-405xx/CVE-2023-40574.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-40575](CVE-2023/CVE-2023-405xx/CVE-2023-40575.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-40576](CVE-2023/CVE-2023-405xx/CVE-2023-40576.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-39912](CVE-2023/CVE-2023-399xx/CVE-2023-39912.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-4481](CVE-2023/CVE-2023-44xx/CVE-2023-4481.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-4695](CVE-2023/CVE-2023-46xx/CVE-2023-4695.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-4696](CVE-2023/CVE-2023-46xx/CVE-2023-4696.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-4697](CVE-2023/CVE-2023-46xx/CVE-2023-4697.json) (`2023-09-01T07:32:13.003`)
* [CVE-2023-4698](CVE-2023/CVE-2023-46xx/CVE-2023-4698.json) (`2023-09-01T07:32:13.003`)
## Download and Usage