Auto-Update: 2023-10-31T11:35:57.336304+00:00

This commit is contained in:
cad-safe-bot 2023-10-31 11:36:01 +00:00
parent b6fb9f6711
commit 944b50280a
2 changed files with 7 additions and 30 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-45160",
"sourceIdentifier": "security@1e.com",
"published": "2023-10-05T16:15:12.167",
"lastModified": "2023-10-19T13:15:10.200",
"lastModified": "2023-10-31T11:15:08.773",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "\nIn the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.\n\n\n\nResolution: This has been fixed in patch Q23094\u00a0"
"value": "\nIn the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.\n\n\n\nResolution: This has been fixed in patch Q23094\u00a0\n\nThis has also been fixed in Mac Client releases v8.1.2.121 and v9.0.1.121.\n\n"
},
{
"lang": "es",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-10-31T11:00:25.503776+00:00
2023-10-31T11:35:57.336304+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-10-31T10:15:08.940000+00:00
2023-10-31T11:15:08.773000+00:00
```
### Last Data Feed Release
@ -34,38 +34,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `20`
Recently added CVEs: `0`
* [CVE-2015-0897](CVE-2015/CVE-2015-08xx/CVE-2015-0897.json) (`2023-10-31T10:15:08.450`)
* [CVE-2015-2968](CVE-2015/CVE-2015-29xx/CVE-2015-2968.json) (`2023-10-31T10:15:08.567`)
* [CVE-2023-5412](CVE-2023/CVE-2023-54xx/CVE-2023-5412.json) (`2023-10-31T09:15:08.407`)
* [CVE-2023-5428](CVE-2023/CVE-2023-54xx/CVE-2023-5428.json) (`2023-10-31T09:15:08.497`)
* [CVE-2023-5429](CVE-2023/CVE-2023-54xx/CVE-2023-5429.json) (`2023-10-31T09:15:08.570`)
* [CVE-2023-5430](CVE-2023/CVE-2023-54xx/CVE-2023-5430.json) (`2023-10-31T09:15:08.637`)
* [CVE-2023-5431](CVE-2023/CVE-2023-54xx/CVE-2023-5431.json) (`2023-10-31T09:15:08.707`)
* [CVE-2023-5433](CVE-2023/CVE-2023-54xx/CVE-2023-5433.json) (`2023-10-31T09:15:08.780`)
* [CVE-2023-5434](CVE-2023/CVE-2023-54xx/CVE-2023-5434.json) (`2023-10-31T09:15:08.857`)
* [CVE-2023-5435](CVE-2023/CVE-2023-54xx/CVE-2023-5435.json) (`2023-10-31T09:15:08.930`)
* [CVE-2023-5436](CVE-2023/CVE-2023-54xx/CVE-2023-5436.json) (`2023-10-31T09:15:09.003`)
* [CVE-2023-5437](CVE-2023/CVE-2023-54xx/CVE-2023-5437.json) (`2023-10-31T09:15:09.077`)
* [CVE-2023-5438](CVE-2023/CVE-2023-54xx/CVE-2023-5438.json) (`2023-10-31T09:15:09.147`)
* [CVE-2023-5439](CVE-2023/CVE-2023-54xx/CVE-2023-5439.json) (`2023-10-31T09:15:09.217`)
* [CVE-2023-5464](CVE-2023/CVE-2023-54xx/CVE-2023-5464.json) (`2023-10-31T09:15:09.290`)
* [CVE-2023-5873](CVE-2023/CVE-2023-58xx/CVE-2023-5873.json) (`2023-10-31T09:15:09.363`)
* [CVE-2023-40681](CVE-2023/CVE-2023-406xx/CVE-2023-40681.json) (`2023-10-31T10:15:08.710`)
* [CVE-2023-46312](CVE-2023/CVE-2023-463xx/CVE-2023-46312.json) (`2023-10-31T10:15:08.793`)
* [CVE-2023-46313](CVE-2023/CVE-2023-463xx/CVE-2023-46313.json) (`2023-10-31T10:15:08.867`)
* [CVE-2023-46622](CVE-2023/CVE-2023-466xx/CVE-2023-46622.json) (`2023-10-31T10:15:08.940`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `1`
* [CVE-2023-35838](CVE-2023/CVE-2023-358xx/CVE-2023-35838.json) (`2023-10-31T09:15:08.123`)
* [CVE-2023-36671](CVE-2023/CVE-2023-366xx/CVE-2023-36671.json) (`2023-10-31T09:15:08.210`)
* [CVE-2023-36672](CVE-2023/CVE-2023-366xx/CVE-2023-36672.json) (`2023-10-31T09:15:08.277`)
* [CVE-2023-36673](CVE-2023/CVE-2023-366xx/CVE-2023-36673.json) (`2023-10-31T09:15:08.337`)
* [CVE-2023-45160](CVE-2023/CVE-2023-451xx/CVE-2023-45160.json) (`2023-10-31T11:15:08.773`)
## Download and Usage