Auto-Update: 2023-09-02T16:00:24.908410+00:00

This commit is contained in:
cad-safe-bot 2023-09-02 16:00:28 +00:00
parent aad951a32d
commit 7193a4d10b
8 changed files with 51 additions and 21 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-2207",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2021-04-22T22:15:14.420",
"lastModified": "2021-04-23T23:55:44.163",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-02T15:15:26.770",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -108,6 +108,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174448/Oracle-RMAN-Missing-Auditing.html",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html",
"source": "secalert_us@oracle.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-44898",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-14T15:15:10.657",
"lastModified": "2022-12-16T20:37:37.120",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-02T15:15:27.300",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -65,6 +65,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174447/MsIo64-LOLDriver-Memory-Corruption.html",
"source": "cve@mitre.org"
},
{
"url": "https://heegong.github.io/posts/ASUS-AuraSync-Kernel-Stack-Based-Buffer-Overflow-Local-Privilege-Escalation/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34039",
"sourceIdentifier": "security@vmware.com",
"published": "2023-08-29T18:15:08.680",
"lastModified": "2023-08-31T18:32:56.680",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-02T15:15:27.437",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -86,6 +86,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174452/VMWare-Aria-Operations-For-Networks-Remote-Code-Execution.html",
"source": "security@vmware.com"
},
{
"url": "https://www.vmware.com/security/advisories/VMSA-2023-0018.html",
"source": "security@vmware.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35382",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:13.010",
"lastModified": "2023-08-10T18:20:07.697",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-02T15:15:27.537",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -99,6 +99,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174450/Microsoft-Windows-Kernel-Use-After-Free.html",
"source": "secure@microsoft.com"
},
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35382",
"source": "secure@microsoft.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4707",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-01T18:15:07.793",
"lastModified": "2023-09-01T21:15:30.513",
"lastModified": "2023-09-02T15:15:27.653",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
@ -72,6 +72,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174444/Clcknshop-1.0.0-Cross-Site-Scripting.html",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.238570",
"source": "cna@vuldb.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4708",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-01T18:15:07.893",
"lastModified": "2023-09-01T21:15:30.513",
"lastModified": "2023-09-02T15:15:27.787",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
@ -72,6 +72,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174445/Clcknshop-1.0.0-SQL-Injection.html",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.238571",
"source": "cna@vuldb.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4714",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-01T20:15:08.890",
"lastModified": "2023-09-01T21:15:30.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-02T15:15:27.907",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -72,6 +72,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174446/PlayTube-3.0.1-Information-Disclosure.html",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.238577",
"source": "cna@vuldb.com"

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-02T14:00:25.009909+00:00
2023-09-02T16:00:24.908410+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-02T13:15:45.427000+00:00
2023-09-02T15:15:27.907000+00:00
```
### Last Data Feed Release
@ -34,19 +34,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `0`
* [CVE-2023-39979](CVE-2023/CVE-2023-399xx/CVE-2023-39979.json) (`2023-09-02T13:15:44.733`)
* [CVE-2023-39980](CVE-2023/CVE-2023-399xx/CVE-2023-39980.json) (`2023-09-02T13:15:45.173`)
* [CVE-2023-39981](CVE-2023/CVE-2023-399xx/CVE-2023-39981.json) (`2023-09-02T13:15:45.257`)
* [CVE-2023-39982](CVE-2023/CVE-2023-399xx/CVE-2023-39982.json) (`2023-09-02T13:15:45.347`)
* [CVE-2023-39983](CVE-2023/CVE-2023-399xx/CVE-2023-39983.json) (`2023-09-02T13:15:45.427`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `7`
* [CVE-2021-2207](CVE-2021/CVE-2021-22xx/CVE-2021-2207.json) (`2023-09-02T15:15:26.770`)
* [CVE-2022-44898](CVE-2022/CVE-2022-448xx/CVE-2022-44898.json) (`2023-09-02T15:15:27.300`)
* [CVE-2023-34039](CVE-2023/CVE-2023-340xx/CVE-2023-34039.json) (`2023-09-02T15:15:27.437`)
* [CVE-2023-35382](CVE-2023/CVE-2023-353xx/CVE-2023-35382.json) (`2023-09-02T15:15:27.537`)
* [CVE-2023-4707](CVE-2023/CVE-2023-47xx/CVE-2023-4707.json) (`2023-09-02T15:15:27.653`)
* [CVE-2023-4708](CVE-2023/CVE-2023-47xx/CVE-2023-4708.json) (`2023-09-02T15:15:27.787`)
* [CVE-2023-4714](CVE-2023/CVE-2023-47xx/CVE-2023-4714.json) (`2023-09-02T15:15:27.907`)
## Download and Usage