mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-06-05T12:00:28.900504+00:00
This commit is contained in:
parent
14547b10a0
commit
73d80dceff
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-45853",
|
"id": "CVE-2022-45853",
|
||||||
"sourceIdentifier": "security@zyxel.com.tw",
|
"sourceIdentifier": "security@zyxel.com.tw",
|
||||||
"published": "2023-05-30T11:15:09.237",
|
"published": "2023-05-30T11:15:09.237",
|
||||||
"lastModified": "2023-05-30T11:15:09.237",
|
"lastModified": "2023-06-05T11:15:09.357",
|
||||||
"vulnStatus": "Rejected",
|
"vulnStatus": "Rejected",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
"value": "** REJECT ** The privilege escalation vulnerability in the Zyxel GS1900-8HP firmware version\u00a0V2.70(AAHI.3) could allow an authenticated, local attacker with administrator privileges to execute some system commands as the \u201croot\u201d user on a vulnerable device via SSH."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
|
14
README.md
14
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2023-06-05T10:00:24.311561+00:00
|
2023-06-05T12:00:28.900504+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2023-06-05T09:15:09.593000+00:00
|
2023-06-05T11:15:09.357000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -34,19 +34,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `5`
|
Recently added CVEs: `0`
|
||||||
|
|
||||||
* [CVE-2015-10112](CVE-2015/CVE-2015-101xx/CVE-2015-10112.json) (`2023-06-05T08:15:09.380`)
|
|
||||||
* [CVE-2023-3100](CVE-2023/CVE-2023-31xx/CVE-2023-3100.json) (`2023-06-05T08:15:09.667`)
|
|
||||||
* [CVE-2023-3064](CVE-2023/CVE-2023-30xx/CVE-2023-3064.json) (`2023-06-05T09:15:09.413`)
|
|
||||||
* [CVE-2023-3065](CVE-2023/CVE-2023-30xx/CVE-2023-3065.json) (`2023-06-05T09:15:09.530`)
|
|
||||||
* [CVE-2023-3066](CVE-2023/CVE-2023-30xx/CVE-2023-3066.json) (`2023-06-05T09:15:09.593`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `0`
|
Recently modified CVEs: `1`
|
||||||
|
|
||||||
|
* [CVE-2022-45853](CVE-2022/CVE-2022-458xx/CVE-2022-45853.json) (`2023-06-05T11:15:09.357`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
Loading…
x
Reference in New Issue
Block a user