Auto-Update: 2023-10-12T06:00:25.597780+00:00

This commit is contained in:
cad-safe-bot 2023-10-12 06:02:51 +00:00
parent b0b2c28f22
commit 76ff54fc7b
5 changed files with 69 additions and 31 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-40829",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T05:15:46.863",
"lastModified": "2023-10-12T05:15:46.863",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is an interface unauthorized access vulnerability in the background of Tencent Enterprise Wechat Privatization 2.5.x and 2.6.930000."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/wwwziziyu/85bdf8d56b415974c4827a5668f493e9",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42298",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T04:15:13.053",
"lastModified": "2023-10-12T04:15:13.053",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to cause a denial of service via the Q_DecCoordOnUnitSphere function of file src/bifs/unquantize.c."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gpac/gpac/issues/2567",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-43641",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-09T22:15:12.707",
"lastModified": "2023-10-12T03:15:09.680",
"lastModified": "2023-10-12T04:15:13.200",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -75,6 +75,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57JEYTRFG4PVGZZ7HIEFTX5I7OONFFMI/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGQOMFDBXGM3DOICCXKCUS76OTKTSPMN/",
"source": "security-advisories@github.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5524",
"source": "security-advisories@github.com"

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2023-44793",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T05:15:46.967",
"lastModified": "2023-10-12T05:15:46.967",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-10-12T04:00:25.389610+00:00
2023-10-12T06:00:25.597780+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-10-12T03:15:09.680000+00:00
2023-10-12T05:15:46.967000+00:00
```
### Last Data Feed Release
@ -29,44 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
227631
227634
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `3`
* [CVE-2023-42298](CVE-2023/CVE-2023-422xx/CVE-2023-42298.json) (`2023-10-12T04:15:13.053`)
* [CVE-2023-40829](CVE-2023/CVE-2023-408xx/CVE-2023-40829.json) (`2023-10-12T05:15:46.863`)
* [CVE-2023-44793](CVE-2023/CVE-2023-447xx/CVE-2023-44793.json) (`2023-10-12T05:15:46.967`)
### CVEs modified in the last Commit
Recently modified CVEs: `60`
Recently modified CVEs: `1`
* [CVE-2023-40541](CVE-2023/CVE-2023-405xx/CVE-2023-40541.json) (`2023-10-12T02:32:07.413`)
* [CVE-2023-41063](CVE-2023/CVE-2023-410xx/CVE-2023-41063.json) (`2023-10-12T02:32:25.927`)
* [CVE-2023-41065](CVE-2023/CVE-2023-410xx/CVE-2023-41065.json) (`2023-10-12T02:35:43.833`)
* [CVE-2023-41066](CVE-2023/CVE-2023-410xx/CVE-2023-41066.json) (`2023-10-12T02:36:20.743`)
* [CVE-2023-41067](CVE-2023/CVE-2023-410xx/CVE-2023-41067.json) (`2023-10-12T02:37:44.647`)
* [CVE-2023-41068](CVE-2023/CVE-2023-410xx/CVE-2023-41068.json) (`2023-10-12T02:38:01.330`)
* [CVE-2023-41070](CVE-2023/CVE-2023-410xx/CVE-2023-41070.json) (`2023-10-12T02:38:53.627`)
* [CVE-2023-41071](CVE-2023/CVE-2023-410xx/CVE-2023-41071.json) (`2023-10-12T02:40:02.397`)
* [CVE-2023-41073](CVE-2023/CVE-2023-410xx/CVE-2023-41073.json) (`2023-10-12T02:40:29.053`)
* [CVE-2023-41074](CVE-2023/CVE-2023-410xx/CVE-2023-41074.json) (`2023-10-12T02:40:54.100`)
* [CVE-2023-41993](CVE-2023/CVE-2023-419xx/CVE-2023-41993.json) (`2023-10-12T02:42:54.773`)
* [CVE-2023-41992](CVE-2023/CVE-2023-419xx/CVE-2023-41992.json) (`2023-10-12T02:44:38.967`)
* [CVE-2023-41991](CVE-2023/CVE-2023-419xx/CVE-2023-41991.json) (`2023-10-12T02:45:00.457`)
* [CVE-2023-5187](CVE-2023/CVE-2023-51xx/CVE-2023-5187.json) (`2023-10-12T02:45:40.760`)
* [CVE-2023-5186](CVE-2023/CVE-2023-51xx/CVE-2023-5186.json) (`2023-10-12T02:46:12.913`)
* [CVE-2023-44464](CVE-2023/CVE-2023-444xx/CVE-2023-44464.json) (`2023-10-12T02:47:15.840`)
* [CVE-2023-44488](CVE-2023/CVE-2023-444xx/CVE-2023-44488.json) (`2023-10-12T02:48:57.420`)
* [CVE-2023-5171](CVE-2023/CVE-2023-51xx/CVE-2023-5171.json) (`2023-10-12T02:52:09.820`)
* [CVE-2023-5169](CVE-2023/CVE-2023-51xx/CVE-2023-5169.json) (`2023-10-12T02:53:26.827`)
* [CVE-2023-5176](CVE-2023/CVE-2023-51xx/CVE-2023-5176.json) (`2023-10-12T02:56:05.727`)
* [CVE-2023-4354](CVE-2023/CVE-2023-43xx/CVE-2023-4354.json) (`2023-10-12T02:56:56.870`)
* [CVE-2023-20588](CVE-2023/CVE-2023-205xx/CVE-2023-20588.json) (`2023-10-12T03:15:09.277`)
* [CVE-2023-22338](CVE-2023/CVE-2023-223xx/CVE-2023-22338.json) (`2023-10-12T03:15:09.490`)
* [CVE-2023-22840](CVE-2023/CVE-2023-228xx/CVE-2023-22840.json) (`2023-10-12T03:15:09.590`)
* [CVE-2023-43641](CVE-2023/CVE-2023-436xx/CVE-2023-43641.json) (`2023-10-12T03:15:09.680`)
* [CVE-2023-43641](CVE-2023/CVE-2023-436xx/CVE-2023-43641.json) (`2023-10-12T04:15:13.200`)
## Download and Usage