mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2023-12-30T09:00:24.641942+00:00
This commit is contained in:
parent
322a934a20
commit
ca808ba107
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-28446",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2021-04-13T20:15:19.890",
|
||||
"lastModified": "2023-12-29T20:16:14.223",
|
||||
"lastModified": "2023-12-30T07:15:07.363",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "<p>N/A</p>\n"
|
||||
"value": "Windows Portmapping Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-43890",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2021-12-15T15:15:11.207",
|
||||
"lastModified": "2023-12-28T00:15:12.093",
|
||||
"lastModified": "2023-12-30T07:15:08.147",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2021-12-15",
|
||||
"cisaActionDue": "2021-12-29",
|
||||
@ -134,6 +134,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ChrisTitusTech/winutil/pull/26",
|
||||
"source": "secure@microsoft.com"
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43890",
|
||||
"source": "secure@microsoft.com",
|
||||
@ -141,6 +145,18 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://thehackernews.com/2023/12/microsoft-disables-msix-app-installer.html",
|
||||
"source": "secure@microsoft.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-msix-protocol-handler-abused-in-malware-attacks/",
|
||||
"source": "secure@microsoft.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.microsoft.com/en-us/security/blog/2023/12/28/financially-motivated-threat-actors-misusing-app-installer/",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-522xx/CVE-2023-52257.json
Normal file
20
CVE-2023/CVE-2023-522xx/CVE-2023-52257.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-52257",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-30T08:15:07.380",
|
||||
"lastModified": "2023-12-30T08:15:07.380",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LogoBee 0.2 allows updates.php?id= XSS."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/174815",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
12
README.md
12
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-12-30T07:00:24.978806+00:00
|
||||
2023-12-30T09:00:24.641942+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-12-30T06:15:43.530000+00:00
|
||||
2023-12-30T08:15:07.380000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,20 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
234548
|
||||
234549
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
|
||||
* [CVE-2023-52252](CVE-2023/CVE-2023-522xx/CVE-2023-52252.json) (`2023-12-30T06:15:43.530`)
|
||||
* [CVE-2023-52257](CVE-2023/CVE-2023-522xx/CVE-2023-52257.json) (`2023-12-30T08:15:07.380`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
* [CVE-2021-28446](CVE-2021/CVE-2021-284xx/CVE-2021-28446.json) (`2023-12-30T07:15:07.363`)
|
||||
* [CVE-2021-43890](CVE-2021/CVE-2021-438xx/CVE-2021-43890.json) (`2023-12-30T07:15:08.147`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user