Auto-Update: 2023-08-28T16:00:24.617354+00:00

This commit is contained in:
cad-safe-bot 2023-08-28 16:00:28 +00:00
parent 66be59f10c
commit d450576399
5 changed files with 68 additions and 56 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22815",
"sourceIdentifier": "psirt@wdc.com",
"published": "2023-06-30T22:15:09.817",
"lastModified": "2023-08-25T19:15:08.300",
"vulnStatus": "Modified",
"lastModified": "2023-08-28T14:49:34.977",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,20 +17,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
"exploitabilityScore": 1.2,
"impactScore": 5.5
},
{
"source": "psirt@wdc.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2234",
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2023-07-10T16:15:51.060",
"lastModified": "2023-07-17T14:08:28.037",
"lastModified": "2023-08-28T15:32:49.990",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -99,7 +99,7 @@
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx9g-8fr2-q899",
"source": "vulnerabilities@zephyrproject.org",
"tags": [
"Vendor Advisory"
"Not Applicable"
]
}
]

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-39708",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T14:15:09.033",
"lastModified": "2023-08-28T14:15:09.033",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in Free and Open Source Inventory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Add New parameter under the New Buy section."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/Arajawat007/6c544ae8bebd2a36926fd3fdc8d4d5c2#file-cve-2023-39708",
"source": "cve@mitre.org"
},
{
"url": "https://www.sourcecodester.com",
"source": "cve@mitre.org"
},
{
"url": "https://www.sourcecodester.com/php/16741/free-and-open-source-inventory-management-system-php-source-code.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-40846",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T14:15:09.197",
"lastModified": "2023-08-28T14:15:09.197",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function sub_90998."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/9/9.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-28T14:00:30.677955+00:00
2023-08-28T16:00:24.617354+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-28T13:59:41.827000+00:00
2023-08-28T15:32:49.990000+00:00
```
### Last Data Feed Release
@ -29,59 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
223557
223559
```
### CVEs added in the last Commit
Recently added CVEs: `26`
Recently added CVEs: `2`
* [CVE-2018-25089](CVE-2018/CVE-2018-250xx/CVE-2018-25089.json) (`2023-08-28T13:15:09.100`)
* [CVE-2022-46783](CVE-2022/CVE-2022-467xx/CVE-2022-46783.json) (`2023-08-28T12:15:08.817`)
* [CVE-2023-26095](CVE-2023/CVE-2023-260xx/CVE-2023-26095.json) (`2023-08-28T12:15:08.940`)
* [CVE-2023-34758](CVE-2023/CVE-2023-347xx/CVE-2023-34758.json) (`2023-08-28T12:15:09.007`)
* [CVE-2023-36481](CVE-2023/CVE-2023-364xx/CVE-2023-36481.json) (`2023-08-28T12:15:09.093`)
* [CVE-2023-40748](CVE-2023/CVE-2023-407xx/CVE-2023-40748.json) (`2023-08-28T13:15:09.397`)
* [CVE-2023-40749](CVE-2023/CVE-2023-407xx/CVE-2023-40749.json) (`2023-08-28T13:15:09.477`)
* [CVE-2023-40750](CVE-2023/CVE-2023-407xx/CVE-2023-40750.json) (`2023-08-28T13:15:09.557`)
* [CVE-2023-40751](CVE-2023/CVE-2023-407xx/CVE-2023-40751.json) (`2023-08-28T13:15:09.630`)
* [CVE-2023-40752](CVE-2023/CVE-2023-407xx/CVE-2023-40752.json) (`2023-08-28T13:15:09.707`)
* [CVE-2023-40753](CVE-2023/CVE-2023-407xx/CVE-2023-40753.json) (`2023-08-28T13:15:09.797`)
* [CVE-2023-40754](CVE-2023/CVE-2023-407xx/CVE-2023-40754.json) (`2023-08-28T13:15:09.883`)
* [CVE-2023-40755](CVE-2023/CVE-2023-407xx/CVE-2023-40755.json) (`2023-08-28T13:15:09.953`)
* [CVE-2023-40756](CVE-2023/CVE-2023-407xx/CVE-2023-40756.json) (`2023-08-28T13:15:10.033`)
* [CVE-2023-40757](CVE-2023/CVE-2023-407xx/CVE-2023-40757.json) (`2023-08-28T13:15:10.087`)
* [CVE-2023-40758](CVE-2023/CVE-2023-407xx/CVE-2023-40758.json) (`2023-08-28T13:15:10.147`)
* [CVE-2023-40759](CVE-2023/CVE-2023-407xx/CVE-2023-40759.json) (`2023-08-28T13:15:10.207`)
* [CVE-2023-40760](CVE-2023/CVE-2023-407xx/CVE-2023-40760.json) (`2023-08-28T13:15:10.267`)
* [CVE-2023-40761](CVE-2023/CVE-2023-407xx/CVE-2023-40761.json) (`2023-08-28T13:15:10.327`)
* [CVE-2023-40762](CVE-2023/CVE-2023-407xx/CVE-2023-40762.json) (`2023-08-28T13:15:10.387`)
* [CVE-2023-40763](CVE-2023/CVE-2023-407xx/CVE-2023-40763.json) (`2023-08-28T13:15:10.467`)
* [CVE-2023-40764](CVE-2023/CVE-2023-407xx/CVE-2023-40764.json) (`2023-08-28T13:15:10.533`)
* [CVE-2023-40765](CVE-2023/CVE-2023-407xx/CVE-2023-40765.json) (`2023-08-28T13:15:10.593`)
* [CVE-2023-40766](CVE-2023/CVE-2023-407xx/CVE-2023-40766.json) (`2023-08-28T13:15:10.657`)
* [CVE-2023-40767](CVE-2023/CVE-2023-407xx/CVE-2023-40767.json) (`2023-08-28T13:15:10.713`)
* [CVE-2023-39708](CVE-2023/CVE-2023-397xx/CVE-2023-39708.json) (`2023-08-28T14:15:09.033`)
* [CVE-2023-40846](CVE-2023/CVE-2023-408xx/CVE-2023-40846.json) (`2023-08-28T14:15:09.197`)
### CVEs modified in the last Commit
Recently modified CVEs: `15`
Recently modified CVEs: `2`
* [CVE-2023-38029](CVE-2023/CVE-2023-380xx/CVE-2023-38029.json) (`2023-08-28T13:07:56.260`)
* [CVE-2023-38030](CVE-2023/CVE-2023-380xx/CVE-2023-38030.json) (`2023-08-28T13:07:56.260`)
* [CVE-2023-27604](CVE-2023/CVE-2023-276xx/CVE-2023-27604.json) (`2023-08-28T13:07:56.260`)
* [CVE-2023-40195](CVE-2023/CVE-2023-401xx/CVE-2023-40195.json) (`2023-08-28T13:07:56.260`)
* [CVE-2023-20873](CVE-2023/CVE-2023-208xx/CVE-2023-20873.json) (`2023-08-28T13:15:09.267`)
* [CVE-2023-32575](CVE-2023/CVE-2023-325xx/CVE-2023-32575.json) (`2023-08-28T13:34:31.193`)
* [CVE-2023-32595](CVE-2023/CVE-2023-325xx/CVE-2023-32595.json) (`2023-08-28T13:34:38.410`)
* [CVE-2023-32596](CVE-2023/CVE-2023-325xx/CVE-2023-32596.json) (`2023-08-28T13:34:46.660`)
* [CVE-2023-32598](CVE-2023/CVE-2023-325xx/CVE-2023-32598.json) (`2023-08-28T13:34:58.463`)
* [CVE-2023-32603](CVE-2023/CVE-2023-326xx/CVE-2023-32603.json) (`2023-08-28T13:35:12.593`)
* [CVE-2023-32797](CVE-2023/CVE-2023-327xx/CVE-2023-32797.json) (`2023-08-28T13:35:21.060`)
* [CVE-2023-41248](CVE-2023/CVE-2023-412xx/CVE-2023-41248.json) (`2023-08-28T13:35:32.633`)
* [CVE-2023-41249](CVE-2023/CVE-2023-412xx/CVE-2023-41249.json) (`2023-08-28T13:35:45.623`)
* [CVE-2023-41250](CVE-2023/CVE-2023-412xx/CVE-2023-41250.json) (`2023-08-28T13:35:55.523`)
* [CVE-2023-39742](CVE-2023/CVE-2023-397xx/CVE-2023-39742.json) (`2023-08-28T13:59:41.827`)
* [CVE-2023-22815](CVE-2023/CVE-2023-228xx/CVE-2023-22815.json) (`2023-08-28T14:49:34.977`)
* [CVE-2023-2234](CVE-2023/CVE-2023-22xx/CVE-2023-2234.json) (`2023-08-28T15:32:49.990`)
## Download and Usage