mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-11-22T07:00:17.940178+00:00
This commit is contained in:
parent
6512eb4108
commit
b657b3da65
20
CVE-2023/CVE-2023-468xx/CVE-2023-46814.json
Normal file
20
CVE-2023/CVE-2023-468xx/CVE-2023-46814.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-46814",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-22T05:15:07.837",
|
||||
"lastModified": "2023-11-22T05:15:07.837",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A binary hijacking vulnerability exists within the VideoLAN VLC media player before 3.0.19 on Windows. The uninstaller attempts to execute code with elevated privileges out of a standard user writable location. Standard users may use this to gain arbitrary code execution as SYSTEM."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.videolan.org/security/sb-vlc3019.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-481xx/CVE-2023-48161.json
Normal file
24
CVE-2023/CVE-2023-481xx/CVE-2023-48161.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-48161",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-22T06:15:43.123",
|
||||
"lastModified": "2023-11-22T06:15:43.123",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in GifLib Project GifLib v.5.2.1 allows a local attacker to obtain sensitive information via the DumpSCreen2RGB function in gif2rgb.c"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/tacetool/TACE#cve-2023-48161",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/p/giflib/bugs/167/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
38
README.md
38
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-11-22T05:00:23.202185+00:00
|
||||
2023-11-22T07:00:17.940178+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-11-22T04:23:52.063000+00:00
|
||||
2023-11-22T06:15:43.123000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,45 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
231260
|
||||
231262
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
* [CVE-2022-35638](CVE-2022/CVE-2022-356xx/CVE-2022-35638.json) (`2023-11-22T04:15:07.237`)
|
||||
* [CVE-2023-46814](CVE-2023/CVE-2023-468xx/CVE-2023-46814.json) (`2023-11-22T05:15:07.837`)
|
||||
* [CVE-2023-48161](CVE-2023/CVE-2023-481xx/CVE-2023-48161.json) (`2023-11-22T06:15:43.123`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `41`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2022-45382](CVE-2022/CVE-2022-453xx/CVE-2022-45382.json) (`2023-11-22T04:23:37.247`)
|
||||
* [CVE-2022-45381](CVE-2022/CVE-2022-453xx/CVE-2022-45381.json) (`2023-11-22T04:23:46.943`)
|
||||
* [CVE-2022-45380](CVE-2022/CVE-2022-453xx/CVE-2022-45380.json) (`2023-11-22T04:23:52.063`)
|
||||
* [CVE-2023-48304](CVE-2023/CVE-2023-483xx/CVE-2023-48304.json) (`2023-11-22T03:36:37.770`)
|
||||
* [CVE-2023-49103](CVE-2023/CVE-2023-491xx/CVE-2023-49103.json) (`2023-11-22T03:36:37.770`)
|
||||
* [CVE-2023-49104](CVE-2023/CVE-2023-491xx/CVE-2023-49104.json) (`2023-11-22T03:36:37.770`)
|
||||
* [CVE-2023-49105](CVE-2023/CVE-2023-491xx/CVE-2023-49105.json) (`2023-11-22T03:36:37.770`)
|
||||
* [CVE-2023-6248](CVE-2023/CVE-2023-62xx/CVE-2023-6248.json) (`2023-11-22T03:36:37.770`)
|
||||
* [CVE-2023-48305](CVE-2023/CVE-2023-483xx/CVE-2023-48305.json) (`2023-11-22T03:36:37.770`)
|
||||
* [CVE-2023-48306](CVE-2023/CVE-2023-483xx/CVE-2023-48306.json) (`2023-11-22T03:36:37.770`)
|
||||
* [CVE-2023-48307](CVE-2023/CVE-2023-483xx/CVE-2023-48307.json) (`2023-11-22T03:36:37.770`)
|
||||
* [CVE-2023-48699](CVE-2023/CVE-2023-486xx/CVE-2023-48699.json) (`2023-11-22T03:36:37.770`)
|
||||
* [CVE-2023-48700](CVE-2023/CVE-2023-487xx/CVE-2023-48700.json) (`2023-11-22T03:36:37.770`)
|
||||
* [CVE-2023-48701](CVE-2023/CVE-2023-487xx/CVE-2023-48701.json) (`2023-11-22T03:36:37.770`)
|
||||
* [CVE-2023-35127](CVE-2023/CVE-2023-351xx/CVE-2023-35127.json) (`2023-11-22T03:36:37.770`)
|
||||
* [CVE-2023-40152](CVE-2023/CVE-2023-401xx/CVE-2023-40152.json) (`2023-11-22T03:36:37.770`)
|
||||
* [CVE-2023-5299](CVE-2023/CVE-2023-52xx/CVE-2023-5299.json) (`2023-11-22T03:36:37.770`)
|
||||
* [CVE-2023-48228](CVE-2023/CVE-2023-482xx/CVE-2023-48228.json) (`2023-11-22T03:36:44.963`)
|
||||
* [CVE-2023-48230](CVE-2023/CVE-2023-482xx/CVE-2023-48230.json) (`2023-11-22T03:36:44.963`)
|
||||
* [CVE-2023-48239](CVE-2023/CVE-2023-482xx/CVE-2023-48239.json) (`2023-11-22T03:36:44.963`)
|
||||
* [CVE-2023-48299](CVE-2023/CVE-2023-482xx/CVE-2023-48299.json) (`2023-11-22T03:36:44.963`)
|
||||
* [CVE-2023-6238](CVE-2023/CVE-2023-62xx/CVE-2023-6238.json) (`2023-11-22T03:36:44.963`)
|
||||
* [CVE-2023-48301](CVE-2023/CVE-2023-483xx/CVE-2023-48301.json) (`2023-11-22T03:36:44.963`)
|
||||
* [CVE-2023-48302](CVE-2023/CVE-2023-483xx/CVE-2023-48302.json) (`2023-11-22T03:36:44.963`)
|
||||
* [CVE-2023-48303](CVE-2023/CVE-2023-483xx/CVE-2023-48303.json) (`2023-11-22T03:36:44.963`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user