Auto-Update: 2023-11-22T07:00:17.940178+00:00

This commit is contained in:
cad-safe-bot 2023-11-22 07:00:21 +00:00
parent 6512eb4108
commit b657b3da65
3 changed files with 51 additions and 31 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-46814",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-22T05:15:07.837",
"lastModified": "2023-11-22T05:15:07.837",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A binary hijacking vulnerability exists within the VideoLAN VLC media player before 3.0.19 on Windows. The uninstaller attempts to execute code with elevated privileges out of a standard user writable location. Standard users may use this to gain arbitrary code execution as SYSTEM."
}
],
"metrics": {},
"references": [
{
"url": "https://www.videolan.org/security/sb-vlc3019.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-48161",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-22T06:15:43.123",
"lastModified": "2023-11-22T06:15:43.123",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in GifLib Project GifLib v.5.2.1 allows a local attacker to obtain sensitive information via the DumpSCreen2RGB function in gif2rgb.c"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/tacetool/TACE#cve-2023-48161",
"source": "cve@mitre.org"
},
{
"url": "https://sourceforge.net/p/giflib/bugs/167/",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-22T05:00:23.202185+00:00
2023-11-22T07:00:17.940178+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-22T04:23:52.063000+00:00
2023-11-22T06:15:43.123000+00:00
```
### Last Data Feed Release
@ -29,45 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
231260
231262
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `2`
* [CVE-2022-35638](CVE-2022/CVE-2022-356xx/CVE-2022-35638.json) (`2023-11-22T04:15:07.237`)
* [CVE-2023-46814](CVE-2023/CVE-2023-468xx/CVE-2023-46814.json) (`2023-11-22T05:15:07.837`)
* [CVE-2023-48161](CVE-2023/CVE-2023-481xx/CVE-2023-48161.json) (`2023-11-22T06:15:43.123`)
### CVEs modified in the last Commit
Recently modified CVEs: `41`
Recently modified CVEs: `0`
* [CVE-2022-45382](CVE-2022/CVE-2022-453xx/CVE-2022-45382.json) (`2023-11-22T04:23:37.247`)
* [CVE-2022-45381](CVE-2022/CVE-2022-453xx/CVE-2022-45381.json) (`2023-11-22T04:23:46.943`)
* [CVE-2022-45380](CVE-2022/CVE-2022-453xx/CVE-2022-45380.json) (`2023-11-22T04:23:52.063`)
* [CVE-2023-48304](CVE-2023/CVE-2023-483xx/CVE-2023-48304.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-49103](CVE-2023/CVE-2023-491xx/CVE-2023-49103.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-49104](CVE-2023/CVE-2023-491xx/CVE-2023-49104.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-49105](CVE-2023/CVE-2023-491xx/CVE-2023-49105.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-6248](CVE-2023/CVE-2023-62xx/CVE-2023-6248.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-48305](CVE-2023/CVE-2023-483xx/CVE-2023-48305.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-48306](CVE-2023/CVE-2023-483xx/CVE-2023-48306.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-48307](CVE-2023/CVE-2023-483xx/CVE-2023-48307.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-48699](CVE-2023/CVE-2023-486xx/CVE-2023-48699.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-48700](CVE-2023/CVE-2023-487xx/CVE-2023-48700.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-48701](CVE-2023/CVE-2023-487xx/CVE-2023-48701.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-35127](CVE-2023/CVE-2023-351xx/CVE-2023-35127.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-40152](CVE-2023/CVE-2023-401xx/CVE-2023-40152.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-5299](CVE-2023/CVE-2023-52xx/CVE-2023-5299.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-48228](CVE-2023/CVE-2023-482xx/CVE-2023-48228.json) (`2023-11-22T03:36:44.963`)
* [CVE-2023-48230](CVE-2023/CVE-2023-482xx/CVE-2023-48230.json) (`2023-11-22T03:36:44.963`)
* [CVE-2023-48239](CVE-2023/CVE-2023-482xx/CVE-2023-48239.json) (`2023-11-22T03:36:44.963`)
* [CVE-2023-48299](CVE-2023/CVE-2023-482xx/CVE-2023-48299.json) (`2023-11-22T03:36:44.963`)
* [CVE-2023-6238](CVE-2023/CVE-2023-62xx/CVE-2023-6238.json) (`2023-11-22T03:36:44.963`)
* [CVE-2023-48301](CVE-2023/CVE-2023-483xx/CVE-2023-48301.json) (`2023-11-22T03:36:44.963`)
* [CVE-2023-48302](CVE-2023/CVE-2023-483xx/CVE-2023-48302.json) (`2023-11-22T03:36:44.963`)
* [CVE-2023-48303](CVE-2023/CVE-2023-483xx/CVE-2023-48303.json) (`2023-11-22T03:36:44.963`)
## Download and Usage