mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-10-01T04:00:25.355123+00:00
This commit is contained in:
parent
5e275c71dc
commit
5acad1d742
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4956",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-30T17:15:39.323",
|
||||
"lastModified": "2023-09-30T17:15:39.323",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43712",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T21:15:09.850",
|
||||
"lastModified": "2023-09-30T21:15:09.850",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43713",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T21:15:09.947",
|
||||
"lastModified": "2023-09-30T21:15:09.947",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43714",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T21:15:10.010",
|
||||
"lastModified": "2023-09-30T21:15:10.010",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43715",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T21:15:10.077",
|
||||
"lastModified": "2023-09-30T21:15:10.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43716",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T21:15:10.140",
|
||||
"lastModified": "2023-09-30T21:15:10.140",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43717",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:10.347",
|
||||
"lastModified": "2023-09-30T22:15:10.347",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43718",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:10.410",
|
||||
"lastModified": "2023-09-30T22:15:10.410",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43719",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:10.467",
|
||||
"lastModified": "2023-09-30T22:15:10.467",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43720",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:10.533",
|
||||
"lastModified": "2023-09-30T22:15:10.533",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43721",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:10.597",
|
||||
"lastModified": "2023-09-30T22:15:10.597",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43722",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:10.657",
|
||||
"lastModified": "2023-09-30T22:15:10.657",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43723",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:10.717",
|
||||
"lastModified": "2023-09-30T22:15:10.717",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43724",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:10.777",
|
||||
"lastModified": "2023-09-30T22:15:10.777",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43725",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:10.843",
|
||||
"lastModified": "2023-09-30T22:15:10.843",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43726",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:10.903",
|
||||
"lastModified": "2023-09-30T22:15:10.903",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43727",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:10.967",
|
||||
"lastModified": "2023-09-30T22:15:10.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43728",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:11.027",
|
||||
"lastModified": "2023-09-30T22:15:11.027",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43729",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:11.097",
|
||||
"lastModified": "2023-09-30T22:15:11.097",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43730",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:11.163",
|
||||
"lastModified": "2023-09-30T22:15:11.163",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43731",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T22:15:11.227",
|
||||
"lastModified": "2023-09-30T22:15:11.227",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43732",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T23:15:40.127",
|
||||
"lastModified": "2023-09-30T23:15:40.127",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43733",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T23:15:40.203",
|
||||
"lastModified": "2023-09-30T23:15:40.203",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43734",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T23:15:40.260",
|
||||
"lastModified": "2023-09-30T23:15:40.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43735",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T23:15:40.320",
|
||||
"lastModified": "2023-09-30T23:15:40.320",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43907",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-01T01:15:24.947",
|
||||
"lastModified": "2023-10-01T01:15:24.947",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44488",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-30T20:15:10.200",
|
||||
"lastModified": "2023-10-01T00:15:09.803",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5111",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T23:15:40.377",
|
||||
"lastModified": "2023-09-30T23:15:40.377",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5112",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-09-30T23:15:40.433",
|
||||
"lastModified": "2023-09-30T23:15:40.433",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-5207",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-09-30T09:15:14.933",
|
||||
"lastModified": "2023-09-30T09:15:14.933",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was discovered in GitLab CE and EE affecting all versions starting 16.0 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. An authenticated attacker could perform arbitrary pipeline execution under the context of another user."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad en GitLab CE y EE que afecta a todas las versiones desde 16.0 anteriores a 16.2.8, 16.3 anteriores a 16.3.5 y 16.4 anteriores a 16.4.1. Un atacante autenticado podr\u00eda realizar una ejecuci\u00f3n del pipeline arbitrario en el contexto de otro usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5217",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-28T16:15:10.980",
|
||||
"lastModified": "2023-10-01T00:15:09.863",
|
||||
"lastModified": "2023-10-01T03:15:09.517",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -175,6 +175,10 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/09/30/4",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/09/30/5",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-5298",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-30T06:15:11.483",
|
||||
"lastModified": "2023-09-30T06:15:11.483",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tongda OA 2017. It has been rated as critical. Affected by this issue is some unknown functionality of the file general/hr/recruit/requirements/delete.php. The manipulation of the argument REQUIREMENTS_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-240938 is the identifier assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en Tongda OA 2017 y ha sido calificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo general/hr/recruit/requirements/delete.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento REQUIREMENTS_ID conduce a la inyecci\u00f3n SQL. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 11.10 puede solucionar este problema. Se recomienda actualizar el componente afectado. VDB-240938 es el identificador asignado a esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-5300",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-30T10:15:10.517",
|
||||
"lastModified": "2023-09-30T10:15:10.517",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in TTSPlanning up to 20230925. This affects an unknown part. The manipulation of the argument uid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240939."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad ha sido encontrada en TTSPlanning hasta 20230925 y clasificada como cr\u00edtica. La manipulaci\u00f3n del argumento uid conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-240939."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-5301",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-30T11:15:15.333",
|
||||
"lastModified": "2023-09-30T11:15:15.333",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in DedeCMS 5.7.111. This vulnerability affects the function AddMyAddon of the file album_add.php. The manipulation of the argument albumUploadFiles leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240940."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en DedeCMS 5.7.111 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n AddMyAddon del archivo album_add.php. La manipulaci\u00f3n del argumento albumUploadFiles conduce a la inyecci\u00f3n de comandos del sistema operativo. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-240940."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-5302",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-30T12:15:09.963",
|
||||
"lastModified": "2023-09-30T12:15:09.963",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Best Courier Management System 1.0. This issue affects some unknown processing of the component Manage Account Page. The manipulation of the argument First Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240941 was assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Best Courier Management System 1.0. Este problema afecta a un procesamiento desconocido del componente Manage Account Page. La manipulaci\u00f3n del argumento First Name conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede usarse. El identificador VDB-240941 fue asignado a esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5303",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-30T14:15:15.737",
|
||||
"lastModified": "2023-09-30T14:15:15.737",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5304",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-30T15:15:10.180",
|
||||
"lastModified": "2023-09-30T15:15:10.180",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5305",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-30T15:15:10.260",
|
||||
"lastModified": "2023-09-30T15:15:10.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5313",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-09-30T15:15:10.337",
|
||||
"lastModified": "2023-09-30T15:15:10.337",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5321",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-09-30T14:15:15.843",
|
||||
"lastModified": "2023-09-30T14:15:15.843",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5323",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-10-01T01:15:24.997",
|
||||
"lastModified": "2023-10-01T01:15:24.997",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-01T03:02:09.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
37
README.md
37
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-10-01T02:00:25.366534+00:00
|
||||
2023-10-01T04:00:25.355123+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-10-01T01:15:24.997000+00:00
|
||||
2023-10-01T03:15:09.517000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -34,18 +34,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
* [CVE-2023-43907](CVE-2023/CVE-2023-439xx/CVE-2023-43907.json) (`2023-10-01T01:15:24.947`)
|
||||
* [CVE-2023-5323](CVE-2023/CVE-2023-53xx/CVE-2023-5323.json) (`2023-10-01T01:15:24.997`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `41`
|
||||
|
||||
* [CVE-2023-44488](CVE-2023/CVE-2023-444xx/CVE-2023-44488.json) (`2023-10-01T00:15:09.803`)
|
||||
* [CVE-2023-5217](CVE-2023/CVE-2023-52xx/CVE-2023-5217.json) (`2023-10-01T00:15:09.863`)
|
||||
* [CVE-2023-43716](CVE-2023/CVE-2023-437xx/CVE-2023-43716.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43717](CVE-2023/CVE-2023-437xx/CVE-2023-43717.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43718](CVE-2023/CVE-2023-437xx/CVE-2023-43718.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43719](CVE-2023/CVE-2023-437xx/CVE-2023-43719.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43720](CVE-2023/CVE-2023-437xx/CVE-2023-43720.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43721](CVE-2023/CVE-2023-437xx/CVE-2023-43721.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43722](CVE-2023/CVE-2023-437xx/CVE-2023-43722.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43723](CVE-2023/CVE-2023-437xx/CVE-2023-43723.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43724](CVE-2023/CVE-2023-437xx/CVE-2023-43724.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43725](CVE-2023/CVE-2023-437xx/CVE-2023-43725.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43726](CVE-2023/CVE-2023-437xx/CVE-2023-43726.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43727](CVE-2023/CVE-2023-437xx/CVE-2023-43727.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43728](CVE-2023/CVE-2023-437xx/CVE-2023-43728.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43729](CVE-2023/CVE-2023-437xx/CVE-2023-43729.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43730](CVE-2023/CVE-2023-437xx/CVE-2023-43730.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43731](CVE-2023/CVE-2023-437xx/CVE-2023-43731.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43732](CVE-2023/CVE-2023-437xx/CVE-2023-43732.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43733](CVE-2023/CVE-2023-437xx/CVE-2023-43733.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43734](CVE-2023/CVE-2023-437xx/CVE-2023-43734.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43735](CVE-2023/CVE-2023-437xx/CVE-2023-43735.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-5111](CVE-2023/CVE-2023-51xx/CVE-2023-5111.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-5112](CVE-2023/CVE-2023-51xx/CVE-2023-5112.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-43907](CVE-2023/CVE-2023-439xx/CVE-2023-43907.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-5323](CVE-2023/CVE-2023-53xx/CVE-2023-5323.json) (`2023-10-01T03:02:09.307`)
|
||||
* [CVE-2023-5217](CVE-2023/CVE-2023-52xx/CVE-2023-5217.json) (`2023-10-01T03:15:09.517`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user