Auto-Update: 2023-11-20T00:55:18.475355+00:00

This commit is contained in:
cad-safe-bot 2023-11-20 00:55:22 +00:00
parent 6c36cf0021
commit da40b67d12
33 changed files with 98 additions and 70 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25985",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T23:15:07.870",
"lastModified": "2023-11-18T23:15:07.870",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28780",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T23:15:08.043",
"lastModified": "2023-11-18T23:15:08.043",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31075",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T23:15:08.233",
"lastModified": "2023-11-18T23:15:08.233",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31089",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T23:15:08.423",
"lastModified": "2023-11-18T23:15:08.423",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-31102",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T04:15:20.793",
"lastModified": "2023-11-13T15:18:08.407",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-20T00:15:06.277",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "7-Zip through 22.01 on Linux allows an integer underflow and code execution via a crafted 7Z archive."
"value": "Ppmd7.c in 7-Zip before 23.00 allows an integer underflow and invalid read operation via a crafted 7Z archive."
},
{
"lang": "es",
@ -101,6 +101,10 @@
}
],
"references": [
{
"url": "https://ds-security.com/post/integer-overflow-in-7-zip-cve-2023-31102/",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231110-0007/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32245",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T23:15:08.610",
"lastModified": "2023-11-18T23:15:08.610",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32504",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T23:15:08.797",
"lastModified": "2023-11-18T23:15:08.797",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32514",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T23:15:08.997",
"lastModified": "2023-11-18T23:15:08.997",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38361",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-11-18T18:15:07.370",
"lastModified": "2023-11-18T18:15:07.370",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:59.753",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40363",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-11-18T18:15:08.197",
"lastModified": "2023-11-18T18:15:08.197",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:59.753",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41129",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T23:15:09.187",
"lastModified": "2023-11-18T23:15:09.187",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-47243",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T22:15:07.100",
"lastModified": "2023-11-18T22:15:07.100",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:59.753",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in CodeMShop \ucf54\ub4dc\uc5e0\uc0f5 \ub9c8\uc774\uc0ac\uc774\ud2b8 \u2013 MSHOP MY SITE.This issue affects \ucf54\ub4dc\uc5e0\uc0f5 \ub9c8\uc774\uc0ac\uc774\ud2b8 \u2013 MSHOP MY SITE: from n/a through 1.1.6.\n\n"
"value": "Cross-Site Request Forgery (CSRF) vulnerability in CodeMShop ???? ????? \u2013 MSHOP MY SITE.This issue affects ???? ????? \u2013 MSHOP MY SITE: from n/a through 1.1.6.\n\n"
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47519",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T22:15:07.297",
"lastModified": "2023-11-18T22:15:07.297",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47531",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T22:15:07.477",
"lastModified": "2023-11-18T22:15:07.477",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47551",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T22:15:07.670",
"lastModified": "2023-11-18T22:15:07.670",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47552",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T22:15:07.857",
"lastModified": "2023-11-18T22:15:07.857",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47553",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T22:15:08.037",
"lastModified": "2023-11-18T22:15:08.037",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47556",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T22:15:08.217",
"lastModified": "2023-11-18T22:15:08.217",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47644",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T22:15:08.403",
"lastModified": "2023-11-18T22:15:08.403",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47649",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T22:15:08.583",
"lastModified": "2023-11-18T22:15:08.583",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47650",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T22:15:08.760",
"lastModified": "2023-11-18T22:15:08.760",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47651",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T22:15:08.943",
"lastModified": "2023-11-18T22:15:08.943",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47655",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T22:15:09.130",
"lastModified": "2023-11-18T22:15:09.130",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47664",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T21:15:08.810",
"lastModified": "2023-11-18T21:15:08.810",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:59.753",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47666",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T21:15:09.017",
"lastModified": "2023-11-18T21:15:09.017",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:59.753",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47667",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T21:15:09.240",
"lastModified": "2023-11-18T21:15:09.240",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:59.753",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47670",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T21:15:09.510",
"lastModified": "2023-11-18T21:15:09.510",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:59.753",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47671",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T21:15:09.767",
"lastModified": "2023-11-18T21:15:09.767",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:59.753",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47672",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T21:15:09.960",
"lastModified": "2023-11-18T21:15:09.960",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:59.753",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47685",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T21:15:10.147",
"lastModified": "2023-11-18T21:15:10.147",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:59.753",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48736",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-18T19:15:07.903",
"lastModified": "2023-11-18T19:15:07.903",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:59.753",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5341",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-19T10:15:49.433",
"lastModified": "2023-11-19T10:15:49.433",
"vulnStatus": "Received",
"lastModified": "2023-11-20T00:02:51.467",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-19T23:00:17.714902+00:00
2023-11-20T00:55:18.475355+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-19T22:15:30.800000+00:00
2023-11-20T00:15:06.277000+00:00
```
### Last Data Feed Release
@ -40,9 +40,33 @@ Recently added CVEs: `0`
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `32`
* [CVE-2023-44487](CVE-2023/CVE-2023-444xx/CVE-2023-44487.json) (`2023-11-19T22:15:30.800`)
* [CVE-2023-47649](CVE-2023/CVE-2023-476xx/CVE-2023-47649.json) (`2023-11-20T00:02:51.467`)
* [CVE-2023-47650](CVE-2023/CVE-2023-476xx/CVE-2023-47650.json) (`2023-11-20T00:02:51.467`)
* [CVE-2023-47651](CVE-2023/CVE-2023-476xx/CVE-2023-47651.json) (`2023-11-20T00:02:51.467`)
* [CVE-2023-47655](CVE-2023/CVE-2023-476xx/CVE-2023-47655.json) (`2023-11-20T00:02:51.467`)
* [CVE-2023-25985](CVE-2023/CVE-2023-259xx/CVE-2023-25985.json) (`2023-11-20T00:02:51.467`)
* [CVE-2023-28780](CVE-2023/CVE-2023-287xx/CVE-2023-28780.json) (`2023-11-20T00:02:51.467`)
* [CVE-2023-31075](CVE-2023/CVE-2023-310xx/CVE-2023-31075.json) (`2023-11-20T00:02:51.467`)
* [CVE-2023-31089](CVE-2023/CVE-2023-310xx/CVE-2023-31089.json) (`2023-11-20T00:02:51.467`)
* [CVE-2023-32245](CVE-2023/CVE-2023-322xx/CVE-2023-32245.json) (`2023-11-20T00:02:51.467`)
* [CVE-2023-32504](CVE-2023/CVE-2023-325xx/CVE-2023-32504.json) (`2023-11-20T00:02:51.467`)
* [CVE-2023-32514](CVE-2023/CVE-2023-325xx/CVE-2023-32514.json) (`2023-11-20T00:02:51.467`)
* [CVE-2023-41129](CVE-2023/CVE-2023-411xx/CVE-2023-41129.json) (`2023-11-20T00:02:51.467`)
* [CVE-2023-5341](CVE-2023/CVE-2023-53xx/CVE-2023-5341.json) (`2023-11-20T00:02:51.467`)
* [CVE-2023-38361](CVE-2023/CVE-2023-383xx/CVE-2023-38361.json) (`2023-11-20T00:02:59.753`)
* [CVE-2023-40363](CVE-2023/CVE-2023-403xx/CVE-2023-40363.json) (`2023-11-20T00:02:59.753`)
* [CVE-2023-48736](CVE-2023/CVE-2023-487xx/CVE-2023-48736.json) (`2023-11-20T00:02:59.753`)
* [CVE-2023-47664](CVE-2023/CVE-2023-476xx/CVE-2023-47664.json) (`2023-11-20T00:02:59.753`)
* [CVE-2023-47666](CVE-2023/CVE-2023-476xx/CVE-2023-47666.json) (`2023-11-20T00:02:59.753`)
* [CVE-2023-47667](CVE-2023/CVE-2023-476xx/CVE-2023-47667.json) (`2023-11-20T00:02:59.753`)
* [CVE-2023-47670](CVE-2023/CVE-2023-476xx/CVE-2023-47670.json) (`2023-11-20T00:02:59.753`)
* [CVE-2023-47671](CVE-2023/CVE-2023-476xx/CVE-2023-47671.json) (`2023-11-20T00:02:59.753`)
* [CVE-2023-47672](CVE-2023/CVE-2023-476xx/CVE-2023-47672.json) (`2023-11-20T00:02:59.753`)
* [CVE-2023-47685](CVE-2023/CVE-2023-476xx/CVE-2023-47685.json) (`2023-11-20T00:02:59.753`)
* [CVE-2023-47243](CVE-2023/CVE-2023-472xx/CVE-2023-47243.json) (`2023-11-20T00:02:59.753`)
* [CVE-2023-31102](CVE-2023/CVE-2023-311xx/CVE-2023-31102.json) (`2023-11-20T00:15:06.277`)
## Download and Usage