mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-08-28T06:00:39.893906+00:00
This commit is contained in:
parent
85d6530ab2
commit
b151709954
88
CVE-2016/CVE-2016-150xx/CVE-2016-15035.json
Normal file
88
CVE-2016/CVE-2016-150xx/CVE-2016-15035.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2016-15035",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-28T04:15:08.573",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Doc2k RE-Chat 1.0. It has been classified as problematic. This affects an unknown part of the file js_on_radio-emergency.de_/re_chat.js. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named bd17d497ddd3bab4ef9c6831c747c37cc016c570. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-238155."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Doc2k/re-chat/commit/bd17d497ddd3bab4ef9c6831c747c37cc016c570",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.238155",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.238155",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43904",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-28T00:15:07.610",
|
||||
"lastModified": "2023-08-28T00:15:07.610",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43907",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-27T23:15:28.737",
|
||||
"lastModified": "2023-08-27T23:15:28.737",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:07.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43909",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-27T23:15:33.633",
|
||||
"lastModified": "2023-08-27T23:15:33.633",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:07.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20197",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2023-08-16T22:15:10.510",
|
||||
"lastModified": "2023-08-27T03:15:12.413",
|
||||
"lastModified": "2023-08-28T04:15:11.803",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -125,6 +125,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00033.html",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IISWNZUBAQL4MNBRKLDYG3SHTEGP5KEO/",
|
||||
"source": "ykramarz@cisco.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22877",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-28T01:15:07.663",
|
||||
"lastModified": "2023-08-28T01:15:07.663",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23473",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-28T01:15:08.807",
|
||||
"lastModified": "2023-08-28T01:15:08.807",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24959",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-28T01:15:08.973",
|
||||
"lastModified": "2023-08-28T01:15:08.973",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26270",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-28T01:15:09.117",
|
||||
"lastModified": "2023-08-28T01:15:09.117",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26271",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-28T01:15:09.263",
|
||||
"lastModified": "2023-08-28T01:15:09.263",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26272",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-28T01:15:09.413",
|
||||
"lastModified": "2023-08-28T01:15:09.413",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30435",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-27T23:15:33.813",
|
||||
"lastModified": "2023-08-27T23:15:33.813",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:07.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30436",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-27T23:15:33.973",
|
||||
"lastModified": "2023-08-27T23:15:33.973",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:07.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30437",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-27T23:15:34.117",
|
||||
"lastModified": "2023-08-27T23:15:34.117",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:07.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33852",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-27T23:15:34.230",
|
||||
"lastModified": "2023-08-27T23:15:34.230",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-380xx/CVE-2023-38024.json
Normal file
55
CVE-2023/CVE-2023-380xx/CVE-2023-38024.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-38024",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2023-08-28T04:15:14.783",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nSpotCam Co., Ltd. SpotCam FHD 2\u2019s hidden Telnet function has a vulnerability of using hard-coded Telnet credentials. An remote unauthenticated attacker can exploit this vulnerability to access the system to perform arbitrary system operations or disrupt service.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7331-9099e-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-380xx/CVE-2023-38025.json
Normal file
43
CVE-2023/CVE-2023-380xx/CVE-2023-38025.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-38025",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2023-08-28T04:15:16.477",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nSpotCam Co., Ltd. SpotCam FHD 2\u2019s hidden Telnet function has a vulnerability of OS command injection. An remote unauthenticated attacker can exploit this vulnerability to execute command injection attack to arbitrary system commands or disrupt service.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7332-ee011-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-380xx/CVE-2023-38026.json
Normal file
55
CVE-2023/CVE-2023-380xx/CVE-2023-38026.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-38026",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2023-08-28T04:15:16.807",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nSpotCam Co., Ltd. SpotCam FHD 2 has a vulnerability of using hard-coded uBoot credentials. An remote attacker can exploit this vulnerability to access the system to perform arbitrary system operations or disrupt service.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7333-972ca-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-380xx/CVE-2023-38027.json
Normal file
43
CVE-2023/CVE-2023-380xx/CVE-2023-38027.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-38027",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2023-08-28T04:15:17.160",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nSpotCam Co., Ltd. SpotCam Sense\u2019s hidden Telnet function has a vulnerability of OS command injection. An remote unauthenticated attacker can exploit this vulnerability to execute command injection attack to perform arbitrary system commands or disrupt service.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7334-351fb-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-380xx/CVE-2023-38028.json
Normal file
55
CVE-2023/CVE-2023-380xx/CVE-2023-38028.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-38028",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2023-08-28T05:15:07.667",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nSaho\u2019s attendance devices ADM100 and ADM-100FP have insufficient authentication. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication to read system information and operate user's data, but can\u2019t control system or disrupt service.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7335-d300a-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38730",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-27T23:15:34.383",
|
||||
"lastModified": "2023-08-27T23:15:34.383",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4544",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-26T05:15:49.630",
|
||||
"lastModified": "2023-08-26T05:15:49.630",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:07.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4545",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-26T07:15:10.067",
|
||||
"lastModified": "2023-08-26T07:15:10.067",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:07.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4546",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-26T08:15:08.047",
|
||||
"lastModified": "2023-08-26T08:15:08.047",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:07.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4547",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-26T09:15:09.057",
|
||||
"lastModified": "2023-08-26T09:15:09.057",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:07.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4548",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-26T10:15:11.277",
|
||||
"lastModified": "2023-08-26T10:15:11.277",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:07.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4555",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-27T07:15:07.370",
|
||||
"lastModified": "2023-08-27T07:15:07.370",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:07.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4556",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-27T07:15:13.950",
|
||||
"lastModified": "2023-08-27T07:15:13.950",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:07.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4557",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-27T23:15:35.040",
|
||||
"lastModified": "2023-08-27T23:15:35.040",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4558",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-27T23:15:36.730",
|
||||
"lastModified": "2023-08-27T23:15:36.730",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4559",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-27T23:15:36.837",
|
||||
"lastModified": "2023-08-27T23:15:36.837",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4560",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-08-28T01:15:10.793",
|
||||
"lastModified": "2023-08-28T01:15:10.793",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4561",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-08-28T01:15:11.000",
|
||||
"lastModified": "2023-08-28T01:15:11.000",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-28T05:16:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
52
README.md
52
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-08-28T02:00:32.844445+00:00
|
||||
2023-08-28T06:00:39.893906+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-08-28T01:15:11+00:00
|
||||
2023-08-28T05:16:07.333000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,30 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
223521
|
||||
223527
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
* [CVE-2022-43904](CVE-2022/CVE-2022-439xx/CVE-2022-43904.json) (`2023-08-28T00:15:07.610`)
|
||||
* [CVE-2023-22877](CVE-2023/CVE-2023-228xx/CVE-2023-22877.json) (`2023-08-28T01:15:07.663`)
|
||||
* [CVE-2023-23473](CVE-2023/CVE-2023-234xx/CVE-2023-23473.json) (`2023-08-28T01:15:08.807`)
|
||||
* [CVE-2023-24959](CVE-2023/CVE-2023-249xx/CVE-2023-24959.json) (`2023-08-28T01:15:08.973`)
|
||||
* [CVE-2023-26270](CVE-2023/CVE-2023-262xx/CVE-2023-26270.json) (`2023-08-28T01:15:09.117`)
|
||||
* [CVE-2023-26271](CVE-2023/CVE-2023-262xx/CVE-2023-26271.json) (`2023-08-28T01:15:09.263`)
|
||||
* [CVE-2023-26272](CVE-2023/CVE-2023-262xx/CVE-2023-26272.json) (`2023-08-28T01:15:09.413`)
|
||||
* [CVE-2023-4560](CVE-2023/CVE-2023-45xx/CVE-2023-4560.json) (`2023-08-28T01:15:10.793`)
|
||||
* [CVE-2023-4561](CVE-2023/CVE-2023-45xx/CVE-2023-4561.json) (`2023-08-28T01:15:11.000`)
|
||||
* [CVE-2016-15035](CVE-2016/CVE-2016-150xx/CVE-2016-15035.json) (`2023-08-28T04:15:08.573`)
|
||||
* [CVE-2023-38024](CVE-2023/CVE-2023-380xx/CVE-2023-38024.json) (`2023-08-28T04:15:14.783`)
|
||||
* [CVE-2023-38025](CVE-2023/CVE-2023-380xx/CVE-2023-38025.json) (`2023-08-28T04:15:16.477`)
|
||||
* [CVE-2023-38026](CVE-2023/CVE-2023-380xx/CVE-2023-38026.json) (`2023-08-28T04:15:16.807`)
|
||||
* [CVE-2023-38027](CVE-2023/CVE-2023-380xx/CVE-2023-38027.json) (`2023-08-28T04:15:17.160`)
|
||||
* [CVE-2023-38028](CVE-2023/CVE-2023-380xx/CVE-2023-38028.json) (`2023-08-28T05:15:07.667`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `27`
|
||||
|
||||
* [CVE-2023-38633](CVE-2023/CVE-2023-386xx/CVE-2023-38633.json) (`2023-08-28T00:15:08.380`)
|
||||
* [CVE-2023-3330](CVE-2023/CVE-2023-33xx/CVE-2023-3330.json) (`2023-08-28T01:15:09.643`)
|
||||
* [CVE-2022-43909](CVE-2022/CVE-2022-439xx/CVE-2022-43909.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-20197](CVE-2023/CVE-2023-201xx/CVE-2023-20197.json) (`2023-08-28T04:15:11.803`)
|
||||
* [CVE-2023-33852](CVE-2023/CVE-2023-338xx/CVE-2023-33852.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-38730](CVE-2023/CVE-2023-387xx/CVE-2023-38730.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-4557](CVE-2023/CVE-2023-45xx/CVE-2023-4557.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-4558](CVE-2023/CVE-2023-45xx/CVE-2023-4558.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-4559](CVE-2023/CVE-2023-45xx/CVE-2023-4559.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-22877](CVE-2023/CVE-2023-228xx/CVE-2023-22877.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-23473](CVE-2023/CVE-2023-234xx/CVE-2023-23473.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-24959](CVE-2023/CVE-2023-249xx/CVE-2023-24959.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-26270](CVE-2023/CVE-2023-262xx/CVE-2023-26270.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-26271](CVE-2023/CVE-2023-262xx/CVE-2023-26271.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-26272](CVE-2023/CVE-2023-262xx/CVE-2023-26272.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-4560](CVE-2023/CVE-2023-45xx/CVE-2023-4560.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-4561](CVE-2023/CVE-2023-45xx/CVE-2023-4561.json) (`2023-08-28T05:16:01.577`)
|
||||
* [CVE-2023-4544](CVE-2023/CVE-2023-45xx/CVE-2023-4544.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-4545](CVE-2023/CVE-2023-45xx/CVE-2023-4545.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-4546](CVE-2023/CVE-2023-45xx/CVE-2023-4546.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-4547](CVE-2023/CVE-2023-45xx/CVE-2023-4547.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-4548](CVE-2023/CVE-2023-45xx/CVE-2023-4548.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-4555](CVE-2023/CVE-2023-45xx/CVE-2023-4555.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-4556](CVE-2023/CVE-2023-45xx/CVE-2023-4556.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-30435](CVE-2023/CVE-2023-304xx/CVE-2023-30435.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-30436](CVE-2023/CVE-2023-304xx/CVE-2023-30436.json) (`2023-08-28T05:16:07.333`)
|
||||
* [CVE-2023-30437](CVE-2023/CVE-2023-304xx/CVE-2023-30437.json) (`2023-08-28T05:16:07.333`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user