mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 11:07:05 +00:00
Auto-Update: 2023-10-14T18:00:24.634365+00:00
This commit is contained in:
parent
cb75c4bf94
commit
6343466076
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-32755",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-10-14T15:15:09.643",
|
||||
"lastModified": "2023-10-14T15:15:09.643",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-33161",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-10-14T15:15:09.723",
|
||||
"lastModified": "2023-10-14T15:15:09.723",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-33165",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-10-14T15:15:09.797",
|
||||
"lastModified": "2023-10-14T15:15:09.797",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2022/CVE-2022-437xx/CVE-2022-43740.json
Normal file
59
CVE-2022/CVE-2022-437xx/CVE-2022-43740.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2022-43740",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-10-14T16:15:10.503",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Security Verify Access OIDC Provider could allow a remote user to cause a denial of service due to uncontrolled resource consumption. IBM X-Force ID: 238921."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/238921",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7028513",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2022/CVE-2022-438xx/CVE-2022-43868.json
Normal file
59
CVE-2022/CVE-2022-438xx/CVE-2022-43868.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2022-43868",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-10-14T16:15:10.580",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Security Verify Access OIDC Provider could disclose directory information that could aid attackers in further attacks against the system. IBM X-Force ID: 239445."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239445",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7028513",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1259",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-10-14T12:15:09.897",
|
||||
"lastModified": "2023-10-14T12:15:09.897",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26155",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2023-10-14T05:15:55.183",
|
||||
"lastModified": "2023-10-14T05:15:55.183",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:33.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30148",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-14T04:15:10.933",
|
||||
"lastModified": "2023-10-14T04:15:10.933",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:33.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30154",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-14T04:15:11.393",
|
||||
"lastModified": "2023-10-14T04:15:11.393",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:33.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2023/CVE-2023-309xx/CVE-2023-30994.json
Normal file
59
CVE-2023/CVE-2023-309xx/CVE-2023-30994.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-30994",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-10-14T17:15:09.623",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM QRadar SIEM 7.5.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 254138"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/254138",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7049133",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-350xx/CVE-2023-35024.json
Normal file
59
CVE-2023/CVE-2023-350xx/CVE-2023-35024.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-35024",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-10-14T16:15:10.670",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 258349."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/258349",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7047198",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-403xx/CVE-2023-40367.json
Normal file
59
CVE-2023/CVE-2023-403xx/CVE-2023-40367.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-40367",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-10-14T17:15:09.703",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM QRadar SIEM 7.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 263376."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/263376",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7049133",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42663",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-10-14T10:15:09.940",
|
||||
"lastModified": "2023-10-14T10:15:09.940",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42780",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-10-14T10:15:10.303",
|
||||
"lastModified": "2023-10-14T10:15:10.303",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42792",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-10-14T10:15:10.377",
|
||||
"lastModified": "2023-10-14T10:15:10.377",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4257",
|
||||
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
|
||||
"published": "2023-10-13T22:15:10.453",
|
||||
"lastModified": "2023-10-13T22:15:10.453",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:33.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44037",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-14T05:15:55.267",
|
||||
"lastModified": "2023-10-14T05:15:55.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:33.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2023/CVE-2023-451xx/CVE-2023-45176.json
Normal file
59
CVE-2023/CVE-2023-451xx/CVE-2023-45176.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-45176",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-10-14T16:15:10.747",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM App Connect Enterprise 11.0.0.1 through 11.0.0.23, 12.0.1.0 through 12.0.10.0 and IBM Integration Bus 10.1 through 10.1.0.1 are vulnerable to a denial of service for integration nodes on Windows. IBM X-Force ID: 247998."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267998",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7051448",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45348",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-10-14T10:15:10.473",
|
||||
"lastModified": "2023-10-14T10:15:10.473",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45674",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-10-14T00:15:10.143",
|
||||
"lastModified": "2023-10-14T00:15:10.143",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:33.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45852",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-14T02:15:09.270",
|
||||
"lastModified": "2023-10-14T02:15:09.270",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:33.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45853",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-14T02:15:09.323",
|
||||
"lastModified": "2023-10-14T02:15:09.323",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:33.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45855",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-14T05:15:55.313",
|
||||
"lastModified": "2023-10-14T05:15:55.313",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:33.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45856",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-14T05:15:55.360",
|
||||
"lastModified": "2023-10-14T05:15:55.360",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5578",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-10-14T11:15:45.800",
|
||||
"lastModified": "2023-10-14T11:15:45.800",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5579",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-10-14T12:15:10.277",
|
||||
"lastModified": "2023-10-14T12:15:10.277",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5580",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-10-14T12:15:10.353",
|
||||
"lastModified": "2023-10-14T12:15:10.353",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5581",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-10-14T13:15:09.743",
|
||||
"lastModified": "2023-10-14T13:15:09.743",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5582",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-10-14T14:15:10.963",
|
||||
"lastModified": "2023-10-14T14:15:10.963",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-14T17:32:28.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
43
README.md
43
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-10-14T16:00:23.921974+00:00
|
||||
2023-10-14T18:00:24.634365+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-10-14T15:15:09.797000+00:00
|
||||
2023-10-14T17:32:33.483000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,23 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
227805
|
||||
227811
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
* [CVE-2022-32755](CVE-2022/CVE-2022-327xx/CVE-2022-32755.json) (`2023-10-14T15:15:09.643`)
|
||||
* [CVE-2022-33161](CVE-2022/CVE-2022-331xx/CVE-2022-33161.json) (`2023-10-14T15:15:09.723`)
|
||||
* [CVE-2022-33165](CVE-2022/CVE-2022-331xx/CVE-2022-33165.json) (`2023-10-14T15:15:09.797`)
|
||||
* [CVE-2023-5582](CVE-2023/CVE-2023-55xx/CVE-2023-5582.json) (`2023-10-14T14:15:10.963`)
|
||||
* [CVE-2022-43740](CVE-2022/CVE-2022-437xx/CVE-2022-43740.json) (`2023-10-14T16:15:10.503`)
|
||||
* [CVE-2022-43868](CVE-2022/CVE-2022-438xx/CVE-2022-43868.json) (`2023-10-14T16:15:10.580`)
|
||||
* [CVE-2023-35024](CVE-2023/CVE-2023-350xx/CVE-2023-35024.json) (`2023-10-14T16:15:10.670`)
|
||||
* [CVE-2023-45176](CVE-2023/CVE-2023-451xx/CVE-2023-45176.json) (`2023-10-14T16:15:10.747`)
|
||||
* [CVE-2023-30994](CVE-2023/CVE-2023-309xx/CVE-2023-30994.json) (`2023-10-14T17:15:09.623`)
|
||||
* [CVE-2023-40367](CVE-2023/CVE-2023-403xx/CVE-2023-40367.json) (`2023-10-14T17:15:09.703`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `23`
|
||||
|
||||
* [CVE-2022-32755](CVE-2022/CVE-2022-327xx/CVE-2022-32755.json) (`2023-10-14T17:32:28.813`)
|
||||
* [CVE-2022-33161](CVE-2022/CVE-2022-331xx/CVE-2022-33161.json) (`2023-10-14T17:32:28.813`)
|
||||
* [CVE-2022-33165](CVE-2022/CVE-2022-331xx/CVE-2022-33165.json) (`2023-10-14T17:32:28.813`)
|
||||
* [CVE-2023-45856](CVE-2023/CVE-2023-458xx/CVE-2023-45856.json) (`2023-10-14T17:32:28.813`)
|
||||
* [CVE-2023-42663](CVE-2023/CVE-2023-426xx/CVE-2023-42663.json) (`2023-10-14T17:32:28.813`)
|
||||
* [CVE-2023-42780](CVE-2023/CVE-2023-427xx/CVE-2023-42780.json) (`2023-10-14T17:32:28.813`)
|
||||
* [CVE-2023-42792](CVE-2023/CVE-2023-427xx/CVE-2023-42792.json) (`2023-10-14T17:32:28.813`)
|
||||
* [CVE-2023-45348](CVE-2023/CVE-2023-453xx/CVE-2023-45348.json) (`2023-10-14T17:32:28.813`)
|
||||
* [CVE-2023-5578](CVE-2023/CVE-2023-55xx/CVE-2023-5578.json) (`2023-10-14T17:32:28.813`)
|
||||
* [CVE-2023-1259](CVE-2023/CVE-2023-12xx/CVE-2023-1259.json) (`2023-10-14T17:32:28.813`)
|
||||
* [CVE-2023-5579](CVE-2023/CVE-2023-55xx/CVE-2023-5579.json) (`2023-10-14T17:32:28.813`)
|
||||
* [CVE-2023-5580](CVE-2023/CVE-2023-55xx/CVE-2023-5580.json) (`2023-10-14T17:32:28.813`)
|
||||
* [CVE-2023-5581](CVE-2023/CVE-2023-55xx/CVE-2023-5581.json) (`2023-10-14T17:32:28.813`)
|
||||
* [CVE-2023-5582](CVE-2023/CVE-2023-55xx/CVE-2023-5582.json) (`2023-10-14T17:32:28.813`)
|
||||
* [CVE-2023-4257](CVE-2023/CVE-2023-42xx/CVE-2023-4257.json) (`2023-10-14T17:32:33.483`)
|
||||
* [CVE-2023-45674](CVE-2023/CVE-2023-456xx/CVE-2023-45674.json) (`2023-10-14T17:32:33.483`)
|
||||
* [CVE-2023-45852](CVE-2023/CVE-2023-458xx/CVE-2023-45852.json) (`2023-10-14T17:32:33.483`)
|
||||
* [CVE-2023-45853](CVE-2023/CVE-2023-458xx/CVE-2023-45853.json) (`2023-10-14T17:32:33.483`)
|
||||
* [CVE-2023-30148](CVE-2023/CVE-2023-301xx/CVE-2023-30148.json) (`2023-10-14T17:32:33.483`)
|
||||
* [CVE-2023-30154](CVE-2023/CVE-2023-301xx/CVE-2023-30154.json) (`2023-10-14T17:32:33.483`)
|
||||
* [CVE-2023-26155](CVE-2023/CVE-2023-261xx/CVE-2023-26155.json) (`2023-10-14T17:32:33.483`)
|
||||
* [CVE-2023-44037](CVE-2023/CVE-2023-440xx/CVE-2023-44037.json) (`2023-10-14T17:32:33.483`)
|
||||
* [CVE-2023-45855](CVE-2023/CVE-2023-458xx/CVE-2023-45855.json) (`2023-10-14T17:32:33.483`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user