From d4e81e6ecd75a3813faf0d6fb9bb29b68aef08d7 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 25 May 2023 08:00:31 +0000 Subject: [PATCH] Auto-Update: 2023-05-25T08:00:28.547246+00:00 --- CVE-2022/CVE-2022-469xx/CVE-2022-46907.json | 32 +++++++++++++++++++++ CVE-2023/CVE-2023-28xx/CVE-2023-2870.json | 4 +-- CVE-2023/CVE-2023-28xx/CVE-2023-2871.json | 4 +-- CVE-2023/CVE-2023-28xx/CVE-2023-2872.json | 4 +-- CVE-2023/CVE-2023-28xx/CVE-2023-2873.json | 4 +-- CVE-2023/CVE-2023-28xx/CVE-2023-2874.json | 4 +-- CVE-2023/CVE-2023-28xx/CVE-2023-2875.json | 4 +-- README.md | 19 +++++++----- 8 files changed, 56 insertions(+), 19 deletions(-) create mode 100644 CVE-2022/CVE-2022-469xx/CVE-2022-46907.json diff --git a/CVE-2022/CVE-2022-469xx/CVE-2022-46907.json b/CVE-2022/CVE-2022-469xx/CVE-2022-46907.json new file mode 100644 index 00000000000..2b47554e42d --- /dev/null +++ b/CVE-2022/CVE-2022-469xx/CVE-2022-46907.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2022-46907", + "sourceIdentifier": "security@apache.org", + "published": "2023-05-25T07:15:08.620", + "lastModified": "2023-05-25T07:15:08.620", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.0 or later.\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/1m0mkq2nttx8tn94m11mytn4f0tv1504", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2870.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2870.json index dda2c213a29..b2e30a57532 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2870.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2870.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2870", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-24T18:15:10.217", - "lastModified": "2023-05-24T18:15:10.217", + "lastModified": "2023-05-25T06:15:09.130", "vulnStatus": "Received", "descriptions": [ { @@ -77,7 +77,7 @@ "source": "cna@vuldb.com" }, { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned47", + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2870", "source": "cna@vuldb.com" }, { diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2871.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2871.json index 1c979b5e388..8c284949307 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2871.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2871.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2871", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-24T18:15:10.337", - "lastModified": "2023-05-24T18:15:10.337", + "lastModified": "2023-05-25T06:15:10.130", "vulnStatus": "Received", "descriptions": [ { @@ -77,7 +77,7 @@ "source": "cna@vuldb.com" }, { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned46", + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2871", "source": "cna@vuldb.com" }, { diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2872.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2872.json index 5511a88e6ed..9481b5ca770 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2872.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2872.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2872", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-24T18:15:10.413", - "lastModified": "2023-05-24T18:15:10.413", + "lastModified": "2023-05-25T06:15:10.420", "vulnStatus": "Received", "descriptions": [ { @@ -77,7 +77,7 @@ "source": "cna@vuldb.com" }, { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned45", + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2872", "source": "cna@vuldb.com" }, { diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2873.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2873.json index cd594230e65..8ddf1636cf0 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2873.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2873.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2873", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-24T18:15:10.493", - "lastModified": "2023-05-24T18:15:10.493", + "lastModified": "2023-05-25T06:15:10.723", "vulnStatus": "Received", "descriptions": [ { @@ -77,7 +77,7 @@ "source": "cna@vuldb.com" }, { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned44", + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2873", "source": "cna@vuldb.com" }, { diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2874.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2874.json index 8c8d519bce2..2e53dc09a05 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2874.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2874.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2874", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-24T19:15:09.443", - "lastModified": "2023-05-24T19:15:09.443", + "lastModified": "2023-05-25T06:15:11.033", "vulnStatus": "Received", "descriptions": [ { @@ -77,7 +77,7 @@ "source": "cna@vuldb.com" }, { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned43", + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2874", "source": "cna@vuldb.com" }, { diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2875.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2875.json index 130ed964949..c9db2ca9973 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2875.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2875.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2875", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-24T19:15:09.517", - "lastModified": "2023-05-24T19:15:09.517", + "lastModified": "2023-05-25T06:15:11.317", "vulnStatus": "Received", "descriptions": [ { @@ -77,7 +77,7 @@ "source": "cna@vuldb.com" }, { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned48", + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2875", "source": "cna@vuldb.com" }, { diff --git a/README.md b/README.md index 22fb6eacf7b..fdadfdb4ee6 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-25T06:00:26.281997+00:00 +2023-05-25T08:00:28.547246+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-25T04:15:10.313000+00:00 +2023-05-25T07:15:08.620000+00:00 ``` ### Last Data Feed Release @@ -29,21 +29,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -215979 +215980 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `1` +* [CVE-2022-46907](CVE-2022/CVE-2022-469xx/CVE-2022-46907.json) (`2023-05-25T07:15:08.620`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `6` -* [CVE-2022-30256](CVE-2022/CVE-2022-302xx/CVE-2022-30256.json) (`2023-05-25T04:15:10.027`) -* [CVE-2023-31137](CVE-2023/CVE-2023-311xx/CVE-2023-31137.json) (`2023-05-25T04:15:10.313`) +* [CVE-2023-2870](CVE-2023/CVE-2023-28xx/CVE-2023-2870.json) (`2023-05-25T06:15:09.130`) +* [CVE-2023-2871](CVE-2023/CVE-2023-28xx/CVE-2023-2871.json) (`2023-05-25T06:15:10.130`) +* [CVE-2023-2872](CVE-2023/CVE-2023-28xx/CVE-2023-2872.json) (`2023-05-25T06:15:10.420`) +* [CVE-2023-2873](CVE-2023/CVE-2023-28xx/CVE-2023-2873.json) (`2023-05-25T06:15:10.723`) +* [CVE-2023-2874](CVE-2023/CVE-2023-28xx/CVE-2023-2874.json) (`2023-05-25T06:15:11.033`) +* [CVE-2023-2875](CVE-2023/CVE-2023-28xx/CVE-2023-2875.json) (`2023-05-25T06:15:11.317`) ## Download and Usage