Auto-Update: 2023-08-20T08:00:25.735974+00:00

This commit is contained in:
cad-safe-bot 2023-08-20 08:00:29 +00:00
parent 72f43360b3
commit 9f3dcdbe16
2 changed files with 30 additions and 28 deletions

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-37369",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-20T07:15:08.963",
"lastModified": "2023-08-20T07:15:08.963",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2, there can be an application crash in QXmlStreamReader via a crafted XML string that triggers a situation in which a prefix is greater than a length."
}
],
"metrics": {},
"references": [
{
"url": "https://bugreports.qt.io/browse/QTBUG-114829",
"source": "cve@mitre.org"
},
{
"url": "https://codereview.qt-project.org/c/qt/qtbase/+/455027",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-20T04:00:27.931597+00:00
2023-08-20T08:00:25.735974+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-20T03:15:20.517000+00:00
2023-08-20T07:15:08.963000+00:00
```
### Last Data Feed Release
@ -29,42 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
223012
223013
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `1`
* [CVE-2023-37369](CVE-2023/CVE-2023-373xx/CVE-2023-37369.json) (`2023-08-20T07:15:08.963`)
### CVEs modified in the last Commit
Recently modified CVEs: `23`
Recently modified CVEs: `0`
* [CVE-2023-2312](CVE-2023/CVE-2023-23xx/CVE-2023-2312.json) (`2023-08-20T03:15:09.170`)
* [CVE-2023-35390](CVE-2023/CVE-2023-353xx/CVE-2023-35390.json) (`2023-08-20T03:15:12.087`)
* [CVE-2023-38180](CVE-2023/CVE-2023-381xx/CVE-2023-38180.json) (`2023-08-20T03:15:14.037`)
* [CVE-2023-4349](CVE-2023/CVE-2023-43xx/CVE-2023-4349.json) (`2023-08-20T03:15:14.887`)
* [CVE-2023-4350](CVE-2023/CVE-2023-43xx/CVE-2023-4350.json) (`2023-08-20T03:15:15.703`)
* [CVE-2023-4351](CVE-2023/CVE-2023-43xx/CVE-2023-4351.json) (`2023-08-20T03:15:15.870`)
* [CVE-2023-4352](CVE-2023/CVE-2023-43xx/CVE-2023-4352.json) (`2023-08-20T03:15:16.283`)
* [CVE-2023-4353](CVE-2023/CVE-2023-43xx/CVE-2023-4353.json) (`2023-08-20T03:15:16.470`)
* [CVE-2023-4354](CVE-2023/CVE-2023-43xx/CVE-2023-4354.json) (`2023-08-20T03:15:16.833`)
* [CVE-2023-4355](CVE-2023/CVE-2023-43xx/CVE-2023-4355.json) (`2023-08-20T03:15:17.210`)
* [CVE-2023-4356](CVE-2023/CVE-2023-43xx/CVE-2023-4356.json) (`2023-08-20T03:15:17.737`)
* [CVE-2023-4357](CVE-2023/CVE-2023-43xx/CVE-2023-4357.json) (`2023-08-20T03:15:18.023`)
* [CVE-2023-4358](CVE-2023/CVE-2023-43xx/CVE-2023-4358.json) (`2023-08-20T03:15:18.197`)
* [CVE-2023-4359](CVE-2023/CVE-2023-43xx/CVE-2023-4359.json) (`2023-08-20T03:15:18.473`)
* [CVE-2023-4360](CVE-2023/CVE-2023-43xx/CVE-2023-4360.json) (`2023-08-20T03:15:18.630`)
* [CVE-2023-4361](CVE-2023/CVE-2023-43xx/CVE-2023-4361.json) (`2023-08-20T03:15:19.067`)
* [CVE-2023-4362](CVE-2023/CVE-2023-43xx/CVE-2023-4362.json) (`2023-08-20T03:15:19.327`)
* [CVE-2023-4363](CVE-2023/CVE-2023-43xx/CVE-2023-4363.json) (`2023-08-20T03:15:19.690`)
* [CVE-2023-4364](CVE-2023/CVE-2023-43xx/CVE-2023-4364.json) (`2023-08-20T03:15:19.933`)
* [CVE-2023-4365](CVE-2023/CVE-2023-43xx/CVE-2023-4365.json) (`2023-08-20T03:15:20.097`)
* [CVE-2023-4366](CVE-2023/CVE-2023-43xx/CVE-2023-4366.json) (`2023-08-20T03:15:20.187`)
* [CVE-2023-4367](CVE-2023/CVE-2023-43xx/CVE-2023-4367.json) (`2023-08-20T03:15:20.297`)
* [CVE-2023-4368](CVE-2023/CVE-2023-43xx/CVE-2023-4368.json) (`2023-08-20T03:15:20.517`)
## Download and Usage