mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-09-01T08:00:24.795939+00:00
This commit is contained in:
parent
3e06bbfde6
commit
57a3b858a7
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-46869",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2023-08-31T20:15:08.027",
|
||||
"lastModified": "2023-08-31T20:15:08.027",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0804",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-02-13T23:15:12.667",
|
||||
"lastModified": "2023-05-30T06:16:13.943",
|
||||
"lastModified": "2023-09-01T06:15:41.807",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -113,6 +113,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FBF3UUFSB6NB3NFTQSKOOIZGXJP3T34Z/",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202305-31",
|
||||
"source": "cve@gitlab.com"
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-20900",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2023-08-31T10:15:08.247",
|
||||
"lastModified": "2023-08-31T15:15:08.420",
|
||||
"lastModified": "2023-09-01T07:15:09.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VMware Tools contains a SAML token signature bypass vulnerability.\u00a0A malicious actor with man-in-the-middle (MITM) network positioning between vCenter server and the virtual machine may be able to bypass SAML token signature verification, to perform VMware Tools Guest Operations.\n\n\n\n\n\n\n\n\n\n\n\n"
|
||||
"value": "VMware Tools contains a SAML token signature bypass vulnerability.\u00a0A malicious actor with man-in-the-middle (MITM) network positioning in the virtual machine network may be able to bypass SAML token signature verification, to perform VMware Tools Guest Operations.\n\n\n\n\n\n\n\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22652",
|
||||
"sourceIdentifier": "meissner@suse.de",
|
||||
"published": "2023-06-01T12:15:09.557",
|
||||
"lastModified": "2023-06-08T18:29:14.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-01T06:15:42.900",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -99,6 +99,10 @@
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMG5256D5I3GFA3RBAJQ2WYPJDYAIL74/",
|
||||
"source": "meissner@suse.de"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30079",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:36.190",
|
||||
"lastModified": "2023-08-26T02:24:07.070",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-01T06:15:43.760",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -79,6 +79,10 @@
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMG5256D5I3GFA3RBAJQ2WYPJDYAIL74/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://raw.githubusercontent.com/yangjiageng/PoC/master/libeconf-PoC/tst-logindefs1.c",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3899",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-08-23T11:15:07.573",
|
||||
"lastModified": "2023-08-30T17:19:03.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-01T06:15:44.377",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -462,6 +462,10 @@
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJHKSBBZRDFOBNDU35FUKMYQIQYT6UJQ/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39350",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T20:15:08.170",
|
||||
"lastModified": "2023-08-31T20:15:08.170",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39351",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T20:15:08.280",
|
||||
"lastModified": "2023-08-31T20:15:08.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39352",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T21:15:07.873",
|
||||
"lastModified": "2023-08-31T21:15:07.873",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39353",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T21:15:08.213",
|
||||
"lastModified": "2023-08-31T21:15:08.213",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39354",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T20:15:08.367",
|
||||
"lastModified": "2023-08-31T20:15:08.367",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39355",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T20:15:08.457",
|
||||
"lastModified": "2023-08-31T20:15:08.457",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39356",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T21:15:08.390",
|
||||
"lastModified": "2023-08-31T21:15:08.390",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39912",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-31T23:15:26.297",
|
||||
"lastModified": "2023-08-31T23:15:26.297",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40181",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T22:15:07.860",
|
||||
"lastModified": "2023-08-31T22:15:07.860",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40186",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T22:15:08.303",
|
||||
"lastModified": "2023-08-31T22:15:08.303",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40187",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T22:15:08.417",
|
||||
"lastModified": "2023-08-31T22:15:08.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40188",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T22:15:08.523",
|
||||
"lastModified": "2023-08-31T22:15:08.523",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40567",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T22:15:08.613",
|
||||
"lastModified": "2023-08-31T22:15:08.613",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40569",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T22:15:08.707",
|
||||
"lastModified": "2023-08-31T22:15:08.707",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40574",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T22:15:08.793",
|
||||
"lastModified": "2023-08-31T22:15:08.793",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40575",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T22:15:08.877",
|
||||
"lastModified": "2023-08-31T22:15:08.877",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40576",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T22:15:08.970",
|
||||
"lastModified": "2023-08-31T22:15:08.970",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40589",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T19:15:11.360",
|
||||
"lastModified": "2023-08-31T19:15:11.360",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41034",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T18:15:09.020",
|
||||
"lastModified": "2023-08-31T18:15:09.020",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41044",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T18:15:09.187",
|
||||
"lastModified": "2023-08-31T18:15:09.187",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41045",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-31T18:15:09.280",
|
||||
"lastModified": "2023-08-31T18:15:09.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41745",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2023-08-31T18:15:09.373",
|
||||
"lastModified": "2023-08-31T18:15:09.373",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41746",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2023-08-31T18:15:09.453",
|
||||
"lastModified": "2023-08-31T18:15:09.453",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41747",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2023-08-31T18:15:09.523",
|
||||
"lastModified": "2023-08-31T18:15:09.523",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41748",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2023-08-31T18:15:09.587",
|
||||
"lastModified": "2023-08-31T18:15:09.587",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41749",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2023-08-31T21:15:08.583",
|
||||
"lastModified": "2023-08-31T21:15:08.583",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41750",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2023-08-31T21:15:08.790",
|
||||
"lastModified": "2023-08-31T21:15:08.790",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41751",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2023-08-31T21:15:08.963",
|
||||
"lastModified": "2023-08-31T21:15:08.963",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4299",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-08-31T21:15:09.183",
|
||||
"lastModified": "2023-08-31T21:15:09.183",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4481",
|
||||
"sourceIdentifier": "sirt@juniper.net",
|
||||
"published": "2023-09-01T00:15:08.703",
|
||||
"lastModified": "2023-09-01T00:15:08.703",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4688",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2023-08-31T21:15:09.417",
|
||||
"lastModified": "2023-08-31T21:15:09.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4695",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-09-01T01:15:07.877",
|
||||
"lastModified": "2023-09-01T01:15:07.877",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4696",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-09-01T01:15:08.400",
|
||||
"lastModified": "2023-09-01T01:15:08.400",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4697",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-09-01T01:15:09.320",
|
||||
"lastModified": "2023-09-01T01:15:09.320",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4698",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-09-01T01:15:09.437",
|
||||
"lastModified": "2023-09-01T01:15:09.437",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-01T07:32:13.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
32
README.md
32
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-09-01T06:00:25.980595+00:00
|
||||
2023-09-01T08:00:24.795939+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-09-01T04:15:10.927000+00:00
|
||||
2023-09-01T07:32:13.003000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -40,9 +40,33 @@ Recently added CVEs: `0`
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `41`
|
||||
|
||||
* [CVE-2023-4572](CVE-2023/CVE-2023-45xx/CVE-2023-4572.json) (`2023-09-01T04:15:10.927`)
|
||||
* [CVE-2023-39354](CVE-2023/CVE-2023-393xx/CVE-2023-39354.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-39355](CVE-2023/CVE-2023-393xx/CVE-2023-39355.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-39352](CVE-2023/CVE-2023-393xx/CVE-2023-39352.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-39353](CVE-2023/CVE-2023-393xx/CVE-2023-39353.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-39356](CVE-2023/CVE-2023-393xx/CVE-2023-39356.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-41749](CVE-2023/CVE-2023-417xx/CVE-2023-41749.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-41750](CVE-2023/CVE-2023-417xx/CVE-2023-41750.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-41751](CVE-2023/CVE-2023-417xx/CVE-2023-41751.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-4299](CVE-2023/CVE-2023-42xx/CVE-2023-4299.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-4688](CVE-2023/CVE-2023-46xx/CVE-2023-4688.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-40181](CVE-2023/CVE-2023-401xx/CVE-2023-40181.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-40186](CVE-2023/CVE-2023-401xx/CVE-2023-40186.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-40187](CVE-2023/CVE-2023-401xx/CVE-2023-40187.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-40188](CVE-2023/CVE-2023-401xx/CVE-2023-40188.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-40567](CVE-2023/CVE-2023-405xx/CVE-2023-40567.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-40569](CVE-2023/CVE-2023-405xx/CVE-2023-40569.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-40574](CVE-2023/CVE-2023-405xx/CVE-2023-40574.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-40575](CVE-2023/CVE-2023-405xx/CVE-2023-40575.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-40576](CVE-2023/CVE-2023-405xx/CVE-2023-40576.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-39912](CVE-2023/CVE-2023-399xx/CVE-2023-39912.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-4481](CVE-2023/CVE-2023-44xx/CVE-2023-4481.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-4695](CVE-2023/CVE-2023-46xx/CVE-2023-4695.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-4696](CVE-2023/CVE-2023-46xx/CVE-2023-4696.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-4697](CVE-2023/CVE-2023-46xx/CVE-2023-4697.json) (`2023-09-01T07:32:13.003`)
|
||||
* [CVE-2023-4698](CVE-2023/CVE-2023-46xx/CVE-2023-4698.json) (`2023-09-01T07:32:13.003`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user