mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2023-05-20 16:00:26.176141+00:00
This commit is contained in:
parent
94467d4ffc
commit
a8a640207a
24
CVE-2023/CVE-2023-16xx/CVE-2023-1692.json
Normal file
24
CVE-2023/CVE-2023-16xx/CVE-2023-1692.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-1692",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-05-20T15:15:08.717",
|
||||
"lastModified": "2023-05-20T15:15:08.717",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The window management module lacks permission verification.Successful exploitation of this vulnerability may affect confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-16xx/CVE-2023-1693.json
Normal file
24
CVE-2023/CVE-2023-16xx/CVE-2023-1693.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-1693",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-05-20T15:15:08.767",
|
||||
"lastModified": "2023-05-20T15:15:08.767",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-16xx/CVE-2023-1694.json
Normal file
24
CVE-2023/CVE-2023-16xx/CVE-2023-1694.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-1694",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-05-20T15:15:08.810",
|
||||
"lastModified": "2023-05-20T15:15:08.810",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-16xx/CVE-2023-1696.json
Normal file
24
CVE-2023/CVE-2023-16xx/CVE-2023-1696.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-1696",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-05-20T15:15:08.847",
|
||||
"lastModified": "2023-05-20T15:15:08.847",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The multimedia video module has a vulnerability in data processing.Successful exploitation of this vulnerability may affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/4/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32784",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-15T06:15:10.427",
|
||||
"lastModified": "2023-05-15T12:54:34.183",
|
||||
"lastModified": "2023-05-20T15:15:08.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -12,6 +12,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/keepassxreboot/keepassxc/discussions/9433",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vdohney/keepass-password-dumper",
|
||||
"source": "cve@mitre.org"
|
||||
|
31
README.md
31
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-05-20T12:00:28.680702+00:00
|
||||
2023-05-20T16:00:26.176141+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-05-20T11:31:57.830000+00:00
|
||||
2023-05-20T15:15:08.893000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,35 +29,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
215686
|
||||
215690
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2023-2713](CVE-2023/CVE-2023-27xx/CVE-2023-2713.json) (`2023-05-20T10:15:09.583`)
|
||||
* [CVE-2023-2712](CVE-2023/CVE-2023-27xx/CVE-2023-2712.json) (`2023-05-20T10:15:09.203`)
|
||||
* [CVE-2023-1692](CVE-2023/CVE-2023-16xx/CVE-2023-1692.json) (`2023-05-20T15:15:08.717`)
|
||||
* [CVE-2023-1693](CVE-2023/CVE-2023-16xx/CVE-2023-1693.json) (`2023-05-20T15:15:08.767`)
|
||||
* [CVE-2023-1694](CVE-2023/CVE-2023-16xx/CVE-2023-1694.json) (`2023-05-20T15:15:08.810`)
|
||||
* [CVE-2023-1696](CVE-2023/CVE-2023-16xx/CVE-2023-1696.json) (`2023-05-20T15:15:08.847`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `14`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
* [CVE-2023-32675](CVE-2023/CVE-2023-326xx/CVE-2023-32675.json) (`2023-05-20T11:31:57.830`)
|
||||
* [CVE-2023-32679](CVE-2023/CVE-2023-326xx/CVE-2023-32679.json) (`2023-05-20T11:31:57.830`)
|
||||
* [CVE-2023-32677](CVE-2023/CVE-2023-326xx/CVE-2023-32677.json) (`2023-05-20T11:31:57.830`)
|
||||
* [CVE-2023-28623](CVE-2023/CVE-2023-286xx/CVE-2023-28623.json) (`2023-05-20T11:31:57.830`)
|
||||
* [CVE-2023-2714](CVE-2023/CVE-2023-27xx/CVE-2023-2714.json) (`2023-05-20T11:31:57.830`)
|
||||
* [CVE-2023-2715](CVE-2023/CVE-2023-27xx/CVE-2023-2715.json) (`2023-05-20T11:31:57.830`)
|
||||
* [CVE-2023-2716](CVE-2023/CVE-2023-27xx/CVE-2023-2716.json) (`2023-05-20T11:31:57.830`)
|
||||
* [CVE-2023-2717](CVE-2023/CVE-2023-27xx/CVE-2023-2717.json) (`2023-05-20T11:31:57.830`)
|
||||
* [CVE-2023-2735](CVE-2023/CVE-2023-27xx/CVE-2023-2735.json) (`2023-05-20T11:31:57.830`)
|
||||
* [CVE-2023-2736](CVE-2023/CVE-2023-27xx/CVE-2023-2736.json) (`2023-05-20T11:31:57.830`)
|
||||
* [CVE-2023-2276](CVE-2023/CVE-2023-22xx/CVE-2023-2276.json) (`2023-05-20T11:31:57.830`)
|
||||
* [CVE-2023-2822](CVE-2023/CVE-2023-28xx/CVE-2023-2822.json) (`2023-05-20T11:31:57.830`)
|
||||
* [CVE-2023-2823](CVE-2023/CVE-2023-28xx/CVE-2023-2823.json) (`2023-05-20T11:31:57.830`)
|
||||
* [CVE-2023-2824](CVE-2023/CVE-2023-28xx/CVE-2023-2824.json) (`2023-05-20T11:31:57.830`)
|
||||
* [CVE-2023-32784](CVE-2023/CVE-2023-327xx/CVE-2023-32784.json) (`2023-05-20T15:15:08.893`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user