Auto-Update: 2023-07-24T22:00:30.445946+00:00

This commit is contained in:
cad-safe-bot 2023-07-24 22:00:33 +00:00
parent ab4cdcf7e8
commit cb2992854f
4 changed files with 57 additions and 19 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-39421",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-24T20:15:10.087",
"lastModified": "2023-07-24T20:15:10.087",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in SeedDMS v6.0.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@rohitgautam26/cve-2021-39421-76fa68817cd",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-20593",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-07-24T20:15:10.237",
"lastModified": "2023-07-24T21:15:09.990",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nAn issue in \u201cZen 2\u201d CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n"
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/07/24/3",
"source": "psirt@amd.com"
},
{
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008",
"source": "psirt@amd.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34478",
"sourceIdentifier": "security@apache.org",
"published": "2023-07-24T19:15:10.630",
"lastModified": "2023-07-24T19:15:10.630",
"lastModified": "2023-07-24T21:15:10.157",
"vulnStatus": "Received",
"descriptions": [
{
@ -24,6 +24,10 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/07/24/4",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/mbv26onkgw9o35rldh7vmq11wpv2t2qk",
"source": "security@apache.org"

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-07-24T20:00:40.735505+00:00
2023-07-24T22:00:30.445946+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-07-24T19:15:10.717000+00:00
2023-07-24T21:15:10.157000+00:00
```
### Last Data Feed Release
@ -29,32 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
220929
220931
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `2`
* [CVE-2023-26077](CVE-2023/CVE-2023-260xx/CVE-2023-26077.json) (`2023-07-24T18:15:23.377`)
* [CVE-2023-3321](CVE-2023/CVE-2023-33xx/CVE-2023-3321.json) (`2023-07-24T18:15:23.453`)
* [CVE-2023-3322](CVE-2023/CVE-2023-33xx/CVE-2023-3322.json) (`2023-07-24T18:15:23.543`)
* [CVE-2023-3323](CVE-2023/CVE-2023-33xx/CVE-2023-3323.json) (`2023-07-24T18:15:23.627`)
* [CVE-2023-3324](CVE-2023/CVE-2023-33xx/CVE-2023-3324.json) (`2023-07-24T18:15:23.717`)
* [CVE-2023-34478](CVE-2023/CVE-2023-344xx/CVE-2023-34478.json) (`2023-07-24T19:15:10.630`)
* [CVE-2023-37613](CVE-2023/CVE-2023-376xx/CVE-2023-37613.json) (`2023-07-24T19:15:10.717`)
* [CVE-2021-39421](CVE-2021/CVE-2021-394xx/CVE-2021-39421.json) (`2023-07-24T20:15:10.087`)
* [CVE-2023-20593](CVE-2023/CVE-2023-205xx/CVE-2023-20593.json) (`2023-07-24T20:15:10.237`)
### CVEs modified in the last Commit
Recently modified CVEs: `6`
Recently modified CVEs: `1`
* [CVE-2023-23540](CVE-2023/CVE-2023-235xx/CVE-2023-23540.json) (`2023-07-24T19:15:10.050`)
* [CVE-2023-28319](CVE-2023/CVE-2023-283xx/CVE-2023-28319.json) (`2023-07-24T19:15:10.150`)
* [CVE-2023-28320](CVE-2023/CVE-2023-283xx/CVE-2023-28320.json) (`2023-07-24T19:15:10.253`)
* [CVE-2023-28321](CVE-2023/CVE-2023-283xx/CVE-2023-28321.json) (`2023-07-24T19:15:10.337`)
* [CVE-2023-28322](CVE-2023/CVE-2023-283xx/CVE-2023-28322.json) (`2023-07-24T19:15:10.433`)
* [CVE-2023-2953](CVE-2023/CVE-2023-29xx/CVE-2023-2953.json) (`2023-07-24T19:15:10.527`)
* [CVE-2023-34478](CVE-2023/CVE-2023-344xx/CVE-2023-34478.json) (`2023-07-24T21:15:10.157`)
## Download and Usage