diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3348.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3348.json index c4be5cddbe7..e49c05e8ed9 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3348.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3348.json @@ -2,12 +2,12 @@ "id": "CVE-2023-3348", "sourceIdentifier": "cna@cloudflare.com", "published": "2023-08-03T15:15:30.227", - "lastModified": "2023-08-08T17:40:55.623", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-29T10:15:08.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "The Wrangler command line tool (<=wrangler@3.1.0) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server.\n\n\n\n" + "value": "The Wrangler command line tool\u00a0 (<=wrangler@3.1.0 or <=wrangler@2.20.1)\u00a0was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server.\n\n\n\n" } ], "metrics": { diff --git a/README.md b/README.md index 6bbaeed2acf..efea673fdef 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-29T10:00:25.142317+00:00 +2023-08-29T12:00:25.255134+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-29T09:15:09.403000+00:00 +2023-08-29T10:15:08.697000+00:00 ``` ### Last Data Feed Release @@ -34,20 +34,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `0` -* [CVE-2023-32457](CVE-2023/CVE-2023-324xx/CVE-2023-32457.json) (`2023-08-29T08:15:34.120`) -* [CVE-2023-23770](CVE-2023/CVE-2023-237xx/CVE-2023-23770.json) (`2023-08-29T09:15:07.993`) -* [CVE-2023-23771](CVE-2023/CVE-2023-237xx/CVE-2023-23771.json) (`2023-08-29T09:15:08.910`) -* [CVE-2023-23772](CVE-2023/CVE-2023-237xx/CVE-2023-23772.json) (`2023-08-29T09:15:09.193`) -* [CVE-2023-23773](CVE-2023/CVE-2023-237xx/CVE-2023-23773.json) (`2023-08-29T09:15:09.330`) -* [CVE-2023-23774](CVE-2023/CVE-2023-237xx/CVE-2023-23774.json) (`2023-08-29T09:15:09.403`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +* [CVE-2023-3348](CVE-2023/CVE-2023-33xx/CVE-2023-3348.json) (`2023-08-29T10:15:08.697`) ## Download and Usage