diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45160.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45160.json index 3ff3777b145..1309fdc5726 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45160.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45160.json @@ -2,12 +2,12 @@ "id": "CVE-2023-45160", "sourceIdentifier": "security@1e.com", "published": "2023-10-05T16:15:12.167", - "lastModified": "2023-10-19T13:15:10.200", + "lastModified": "2023-10-31T11:15:08.773", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "\nIn the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.\n\n\n\nResolution: This has been fixed in patch Q23094\u00a0" + "value": "\nIn the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.\n\n\n\nResolution: This has been fixed in patch Q23094\u00a0\n\nThis has also been fixed in Mac Client releases v8.1.2.121 and v9.0.1.121.\n\n" }, { "lang": "es", diff --git a/README.md b/README.md index fce13db26ad..718798b8850 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-10-31T11:00:25.503776+00:00 +2023-10-31T11:35:57.336304+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-10-31T10:15:08.940000+00:00 +2023-10-31T11:15:08.773000+00:00 ``` ### Last Data Feed Release @@ -34,38 +34,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `20` +Recently added CVEs: `0` -* [CVE-2015-0897](CVE-2015/CVE-2015-08xx/CVE-2015-0897.json) (`2023-10-31T10:15:08.450`) -* [CVE-2015-2968](CVE-2015/CVE-2015-29xx/CVE-2015-2968.json) (`2023-10-31T10:15:08.567`) -* [CVE-2023-5412](CVE-2023/CVE-2023-54xx/CVE-2023-5412.json) (`2023-10-31T09:15:08.407`) -* [CVE-2023-5428](CVE-2023/CVE-2023-54xx/CVE-2023-5428.json) (`2023-10-31T09:15:08.497`) -* [CVE-2023-5429](CVE-2023/CVE-2023-54xx/CVE-2023-5429.json) (`2023-10-31T09:15:08.570`) -* [CVE-2023-5430](CVE-2023/CVE-2023-54xx/CVE-2023-5430.json) (`2023-10-31T09:15:08.637`) -* [CVE-2023-5431](CVE-2023/CVE-2023-54xx/CVE-2023-5431.json) (`2023-10-31T09:15:08.707`) -* [CVE-2023-5433](CVE-2023/CVE-2023-54xx/CVE-2023-5433.json) (`2023-10-31T09:15:08.780`) -* [CVE-2023-5434](CVE-2023/CVE-2023-54xx/CVE-2023-5434.json) (`2023-10-31T09:15:08.857`) -* [CVE-2023-5435](CVE-2023/CVE-2023-54xx/CVE-2023-5435.json) (`2023-10-31T09:15:08.930`) -* [CVE-2023-5436](CVE-2023/CVE-2023-54xx/CVE-2023-5436.json) (`2023-10-31T09:15:09.003`) -* [CVE-2023-5437](CVE-2023/CVE-2023-54xx/CVE-2023-5437.json) (`2023-10-31T09:15:09.077`) -* [CVE-2023-5438](CVE-2023/CVE-2023-54xx/CVE-2023-5438.json) (`2023-10-31T09:15:09.147`) -* [CVE-2023-5439](CVE-2023/CVE-2023-54xx/CVE-2023-5439.json) (`2023-10-31T09:15:09.217`) -* [CVE-2023-5464](CVE-2023/CVE-2023-54xx/CVE-2023-5464.json) (`2023-10-31T09:15:09.290`) -* [CVE-2023-5873](CVE-2023/CVE-2023-58xx/CVE-2023-5873.json) (`2023-10-31T09:15:09.363`) -* [CVE-2023-40681](CVE-2023/CVE-2023-406xx/CVE-2023-40681.json) (`2023-10-31T10:15:08.710`) -* [CVE-2023-46312](CVE-2023/CVE-2023-463xx/CVE-2023-46312.json) (`2023-10-31T10:15:08.793`) -* [CVE-2023-46313](CVE-2023/CVE-2023-463xx/CVE-2023-46313.json) (`2023-10-31T10:15:08.867`) -* [CVE-2023-46622](CVE-2023/CVE-2023-466xx/CVE-2023-46622.json) (`2023-10-31T10:15:08.940`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `1` -* [CVE-2023-35838](CVE-2023/CVE-2023-358xx/CVE-2023-35838.json) (`2023-10-31T09:15:08.123`) -* [CVE-2023-36671](CVE-2023/CVE-2023-366xx/CVE-2023-36671.json) (`2023-10-31T09:15:08.210`) -* [CVE-2023-36672](CVE-2023/CVE-2023-366xx/CVE-2023-36672.json) (`2023-10-31T09:15:08.277`) -* [CVE-2023-36673](CVE-2023/CVE-2023-366xx/CVE-2023-36673.json) (`2023-10-31T09:15:08.337`) +* [CVE-2023-45160](CVE-2023/CVE-2023-451xx/CVE-2023-45160.json) (`2023-10-31T11:15:08.773`) ## Download and Usage