mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-09-08T06:00:25.613057+00:00
This commit is contained in:
parent
386499a068
commit
bee9fd5dd8
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-33546",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-01T13:15:10.743",
|
||||
"lastModified": "2023-06-08T18:49:27.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-08T05:15:43.073",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow."
|
||||
"value": "** DISPUTED ** Janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. NOTE: this is disputed by multiple parties because Janino is not intended for use with untrusted input."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -73,6 +73,10 @@
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://janino-compiler.github.io/janino/#security",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4761",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-05T22:15:09.583",
|
||||
"lastModified": "2023-09-07T01:10:21.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-08T04:15:10.137",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -19,6 +19,10 @@
|
||||
{
|
||||
"url": "https://crbug.com/1476403",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5491",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4762",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-05T22:15:09.677",
|
||||
"lastModified": "2023-09-07T01:10:21.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-08T04:15:11.017",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -19,6 +19,10 @@
|
||||
{
|
||||
"url": "https://crbug.com/1473247",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5491",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4763",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-05T22:15:09.777",
|
||||
"lastModified": "2023-09-07T01:10:21.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-08T04:15:11.350",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -19,6 +19,10 @@
|
||||
{
|
||||
"url": "https://crbug.com/1469928",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5491",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4764",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-05T22:15:09.883",
|
||||
"lastModified": "2023-09-07T01:10:21.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-08T04:15:11.677",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -19,6 +19,10 @@
|
||||
{
|
||||
"url": "https://crbug.com/1447237",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5491",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
30
README.md
30
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-09-08T04:00:24.840438+00:00
|
||||
2023-09-08T06:00:25.613057+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-09-08T03:15:09.060000+00:00
|
||||
2023-09-08T05:15:43.073000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -34,31 +34,19 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `16`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
* [CVE-2014-5329](CVE-2014/CVE-2014-53xx/CVE-2014-5329.json) (`2023-09-08T03:15:07.387`)
|
||||
* [CVE-2021-33834](CVE-2021/CVE-2021-338xx/CVE-2021-33834.json) (`2023-09-08T02:15:07.503`)
|
||||
* [CVE-2021-45811](CVE-2021/CVE-2021-458xx/CVE-2021-45811.json) (`2023-09-08T02:15:07.877`)
|
||||
* [CVE-2021-27715](CVE-2021/CVE-2021-277xx/CVE-2021-27715.json) (`2023-09-08T03:15:07.823`)
|
||||
* [CVE-2022-27599](CVE-2022/CVE-2022-275xx/CVE-2022-27599.json) (`2023-09-08T02:15:07.940`)
|
||||
* [CVE-2023-36184](CVE-2023/CVE-2023-361xx/CVE-2023-36184.json) (`2023-09-08T02:15:08.080`)
|
||||
* [CVE-2023-40271](CVE-2023/CVE-2023-402xx/CVE-2023-40271.json) (`2023-09-08T02:15:08.133`)
|
||||
* [CVE-2023-37367](CVE-2023/CVE-2023-373xx/CVE-2023-37367.json) (`2023-09-08T03:15:08.330`)
|
||||
* [CVE-2023-37368](CVE-2023/CVE-2023-373xx/CVE-2023-37368.json) (`2023-09-08T03:15:08.560`)
|
||||
* [CVE-2023-37377](CVE-2023/CVE-2023-373xx/CVE-2023-37377.json) (`2023-09-08T03:15:08.643`)
|
||||
* [CVE-2023-37759](CVE-2023/CVE-2023-377xx/CVE-2023-37759.json) (`2023-09-08T03:15:08.727`)
|
||||
* [CVE-2023-39620](CVE-2023/CVE-2023-396xx/CVE-2023-39620.json) (`2023-09-08T03:15:08.787`)
|
||||
* [CVE-2023-40353](CVE-2023/CVE-2023-403xx/CVE-2023-40353.json) (`2023-09-08T03:15:08.853`)
|
||||
* [CVE-2023-40953](CVE-2023/CVE-2023-409xx/CVE-2023-40953.json) (`2023-09-08T03:15:08.930`)
|
||||
* [CVE-2023-41594](CVE-2023/CVE-2023-415xx/CVE-2023-41594.json) (`2023-09-08T03:15:08.997`)
|
||||
* [CVE-2023-41615](CVE-2023/CVE-2023-416xx/CVE-2023-41615.json) (`2023-09-08T03:15:09.060`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `5`
|
||||
|
||||
* [CVE-2023-35785](CVE-2023/CVE-2023-357xx/CVE-2023-35785.json) (`2023-09-08T03:15:08.017`)
|
||||
* [CVE-2023-4761](CVE-2023/CVE-2023-47xx/CVE-2023-4761.json) (`2023-09-08T04:15:10.137`)
|
||||
* [CVE-2023-4762](CVE-2023/CVE-2023-47xx/CVE-2023-4762.json) (`2023-09-08T04:15:11.017`)
|
||||
* [CVE-2023-4763](CVE-2023/CVE-2023-47xx/CVE-2023-4763.json) (`2023-09-08T04:15:11.350`)
|
||||
* [CVE-2023-4764](CVE-2023/CVE-2023-47xx/CVE-2023-4764.json) (`2023-09-08T04:15:11.677`)
|
||||
* [CVE-2023-33546](CVE-2023/CVE-2023-335xx/CVE-2023-33546.json) (`2023-09-08T05:15:43.073`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user