mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-10-31T11:35:57.336304+00:00
This commit is contained in:
parent
b6fb9f6711
commit
944b50280a
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-45160",
|
||||
"sourceIdentifier": "security@1e.com",
|
||||
"published": "2023-10-05T16:15:12.167",
|
||||
"lastModified": "2023-10-19T13:15:10.200",
|
||||
"lastModified": "2023-10-31T11:15:08.773",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nIn the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.\n\n\n\nResolution: This has been fixed in patch Q23094\u00a0"
|
||||
"value": "\nIn the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.\n\n\n\nResolution: This has been fixed in patch Q23094\u00a0\n\nThis has also been fixed in Mac Client releases v8.1.2.121 and v9.0.1.121.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
33
README.md
33
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-10-31T11:00:25.503776+00:00
|
||||
2023-10-31T11:35:57.336304+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-10-31T10:15:08.940000+00:00
|
||||
2023-10-31T11:15:08.773000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -34,38 +34,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `20`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
* [CVE-2015-0897](CVE-2015/CVE-2015-08xx/CVE-2015-0897.json) (`2023-10-31T10:15:08.450`)
|
||||
* [CVE-2015-2968](CVE-2015/CVE-2015-29xx/CVE-2015-2968.json) (`2023-10-31T10:15:08.567`)
|
||||
* [CVE-2023-5412](CVE-2023/CVE-2023-54xx/CVE-2023-5412.json) (`2023-10-31T09:15:08.407`)
|
||||
* [CVE-2023-5428](CVE-2023/CVE-2023-54xx/CVE-2023-5428.json) (`2023-10-31T09:15:08.497`)
|
||||
* [CVE-2023-5429](CVE-2023/CVE-2023-54xx/CVE-2023-5429.json) (`2023-10-31T09:15:08.570`)
|
||||
* [CVE-2023-5430](CVE-2023/CVE-2023-54xx/CVE-2023-5430.json) (`2023-10-31T09:15:08.637`)
|
||||
* [CVE-2023-5431](CVE-2023/CVE-2023-54xx/CVE-2023-5431.json) (`2023-10-31T09:15:08.707`)
|
||||
* [CVE-2023-5433](CVE-2023/CVE-2023-54xx/CVE-2023-5433.json) (`2023-10-31T09:15:08.780`)
|
||||
* [CVE-2023-5434](CVE-2023/CVE-2023-54xx/CVE-2023-5434.json) (`2023-10-31T09:15:08.857`)
|
||||
* [CVE-2023-5435](CVE-2023/CVE-2023-54xx/CVE-2023-5435.json) (`2023-10-31T09:15:08.930`)
|
||||
* [CVE-2023-5436](CVE-2023/CVE-2023-54xx/CVE-2023-5436.json) (`2023-10-31T09:15:09.003`)
|
||||
* [CVE-2023-5437](CVE-2023/CVE-2023-54xx/CVE-2023-5437.json) (`2023-10-31T09:15:09.077`)
|
||||
* [CVE-2023-5438](CVE-2023/CVE-2023-54xx/CVE-2023-5438.json) (`2023-10-31T09:15:09.147`)
|
||||
* [CVE-2023-5439](CVE-2023/CVE-2023-54xx/CVE-2023-5439.json) (`2023-10-31T09:15:09.217`)
|
||||
* [CVE-2023-5464](CVE-2023/CVE-2023-54xx/CVE-2023-5464.json) (`2023-10-31T09:15:09.290`)
|
||||
* [CVE-2023-5873](CVE-2023/CVE-2023-58xx/CVE-2023-5873.json) (`2023-10-31T09:15:09.363`)
|
||||
* [CVE-2023-40681](CVE-2023/CVE-2023-406xx/CVE-2023-40681.json) (`2023-10-31T10:15:08.710`)
|
||||
* [CVE-2023-46312](CVE-2023/CVE-2023-463xx/CVE-2023-46312.json) (`2023-10-31T10:15:08.793`)
|
||||
* [CVE-2023-46313](CVE-2023/CVE-2023-463xx/CVE-2023-46313.json) (`2023-10-31T10:15:08.867`)
|
||||
* [CVE-2023-46622](CVE-2023/CVE-2023-466xx/CVE-2023-46622.json) (`2023-10-31T10:15:08.940`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
* [CVE-2023-35838](CVE-2023/CVE-2023-358xx/CVE-2023-35838.json) (`2023-10-31T09:15:08.123`)
|
||||
* [CVE-2023-36671](CVE-2023/CVE-2023-366xx/CVE-2023-36671.json) (`2023-10-31T09:15:08.210`)
|
||||
* [CVE-2023-36672](CVE-2023/CVE-2023-366xx/CVE-2023-36672.json) (`2023-10-31T09:15:08.277`)
|
||||
* [CVE-2023-36673](CVE-2023/CVE-2023-366xx/CVE-2023-36673.json) (`2023-10-31T09:15:08.337`)
|
||||
* [CVE-2023-45160](CVE-2023/CVE-2023-451xx/CVE-2023-45160.json) (`2023-10-31T11:15:08.773`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user