Auto-Update: 2023-08-14T02:00:28.192433+00:00

This commit is contained in:
cad-safe-bot 2023-08-14 02:00:32 +00:00
parent f0572c2986
commit e387b88147
38 changed files with 130 additions and 78 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-46895",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:10.030",
"lastModified": "2023-08-13T13:15:10.030",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-23123",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-28T19:15:10.340",
"lastModified": "2023-05-17T01:15:09.223",
"lastModified": "2023-08-14T01:15:46.987",
"vulnStatus": "Modified",
"descriptions": [
{
@ -91,6 +91,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00016.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html",
"source": "zdi-disclosures@trendmicro.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22955",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-11T20:15:14.607",
"lastModified": "2023-08-11T20:15:14.607",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22956",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-11T20:15:14.703",
"lastModified": "2023-08-11T20:15:14.703",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22957",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-11T20:15:14.787",
"lastModified": "2023-08-11T20:15:14.787",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23208",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-13T21:15:09.067",
"lastModified": "2023-08-13T21:15:09.067",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3452",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-08-12T03:15:09.330",
"lastModified": "2023-08-12T03:15:09.330",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39380",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T12:15:43.647",
"lastModified": "2023-08-13T12:15:43.647",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39381",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T12:15:44.950",
"lastModified": "2023-08-13T12:15:44.950",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39382",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T12:15:45.167",
"lastModified": "2023-08-13T12:15:45.167",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39383",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T12:15:45.327",
"lastModified": "2023-08-13T12:15:45.327",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39384",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T12:15:45.513",
"lastModified": "2023-08-13T12:15:45.513",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39385",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:10.333",
"lastModified": "2023-08-13T13:15:10.333",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39386",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:10.597",
"lastModified": "2023-08-13T13:15:10.597",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39387",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:10.807",
"lastModified": "2023-08-13T13:15:10.807",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39388",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T12:15:45.667",
"lastModified": "2023-08-13T12:15:45.667",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39389",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T12:15:45.877",
"lastModified": "2023-08-13T12:15:45.877",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39390",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:11.090",
"lastModified": "2023-08-13T13:15:11.090",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39391",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:11.273",
"lastModified": "2023-08-13T13:15:11.273",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39392",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T12:15:46.083",
"lastModified": "2023-08-13T12:15:46.083",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39393",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T12:15:46.180",
"lastModified": "2023-08-13T12:15:46.180",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39394",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:11.457",
"lastModified": "2023-08-13T13:15:11.457",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39395",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:11.770",
"lastModified": "2023-08-13T13:15:11.770",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39396",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T12:15:46.247",
"lastModified": "2023-08-13T12:15:46.247",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39397",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:11.863",
"lastModified": "2023-08-13T13:15:11.863",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39398",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:11.933",
"lastModified": "2023-08-13T13:15:11.933",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39399",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:12.157",
"lastModified": "2023-08-13T13:15:12.157",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39400",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:12.467",
"lastModified": "2023-08-13T13:15:12.467",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39401",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:12.757",
"lastModified": "2023-08-13T13:15:12.757",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39402",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:13.020",
"lastModified": "2023-08-13T13:15:13.020",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39403",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:13.197",
"lastModified": "2023-08-13T13:15:13.197",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39404",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:13.267",
"lastModified": "2023-08-13T13:15:13.267",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39405",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T12:15:46.467",
"lastModified": "2023-08-13T12:15:46.467",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39406",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-08-13T13:15:13.560",
"lastModified": "2023-08-13T13:15:13.560",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:52.173",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40274",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-14T01:15:47.307",
"lastModified": "2023-08-14T01:15:47.307",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in zola 0.13.0 through 0.17.2. The custom implementation of a web server, available via the \"zola serve\" command, allows directory traversal. The handle_request function, used by the server to process HTTP requests, does not account for sequences of special path control characters (../) in the URL when serving a file, which allows one to escape the webroot of the server and read arbitrary files from the filesystem."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/getzola/zola/issues/2257",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/getzola/zola/pull/2258",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4265",
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2023-08-12T23:15:08.567",
"lastModified": "2023-08-12T23:15:08.567",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4293",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-08-12T08:15:09.240",
"lastModified": "2023-08-12T08:15:09.240",
"vulnStatus": "Received",
"lastModified": "2023-08-14T00:36:59.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-13T22:00:29.126548+00:00
2023-08-14T02:00:28.192433+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-13T21:15:09.067000+00:00
2023-08-14T01:15:47.307000+00:00
```
### Last Data Feed Release
@ -23,27 +23,51 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2023-08-13T00:00:13.581200+00:00
2023-08-14T00:00:13.604970+00:00
```
### Total Number of included CVEs
```plain
222535
222536
```
### CVEs added in the last Commit
Recently added CVEs: `1`
* [CVE-2023-23208](CVE-2023/CVE-2023-232xx/CVE-2023-23208.json) (`2023-08-13T21:15:09.067`)
* [CVE-2023-40274](CVE-2023/CVE-2023-402xx/CVE-2023-40274.json) (`2023-08-14T01:15:47.307`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `36`
* [CVE-2020-13654](CVE-2020/CVE-2020-136xx/CVE-2020-13654.json) (`2023-08-13T21:15:08.360`)
* [CVE-2023-39397](CVE-2023/CVE-2023-393xx/CVE-2023-39397.json) (`2023-08-14T00:36:52.173`)
* [CVE-2023-39398](CVE-2023/CVE-2023-393xx/CVE-2023-39398.json) (`2023-08-14T00:36:52.173`)
* [CVE-2023-39399](CVE-2023/CVE-2023-393xx/CVE-2023-39399.json) (`2023-08-14T00:36:52.173`)
* [CVE-2023-39400](CVE-2023/CVE-2023-394xx/CVE-2023-39400.json) (`2023-08-14T00:36:52.173`)
* [CVE-2023-39401](CVE-2023/CVE-2023-394xx/CVE-2023-39401.json) (`2023-08-14T00:36:52.173`)
* [CVE-2023-39402](CVE-2023/CVE-2023-394xx/CVE-2023-39402.json) (`2023-08-14T00:36:52.173`)
* [CVE-2023-39403](CVE-2023/CVE-2023-394xx/CVE-2023-39403.json) (`2023-08-14T00:36:52.173`)
* [CVE-2023-39404](CVE-2023/CVE-2023-394xx/CVE-2023-39404.json) (`2023-08-14T00:36:52.173`)
* [CVE-2023-39406](CVE-2023/CVE-2023-394xx/CVE-2023-39406.json) (`2023-08-14T00:36:52.173`)
* [CVE-2023-23208](CVE-2023/CVE-2023-232xx/CVE-2023-23208.json) (`2023-08-14T00:36:52.173`)
* [CVE-2023-22955](CVE-2023/CVE-2023-229xx/CVE-2023-22955.json) (`2023-08-14T00:36:59.677`)
* [CVE-2023-22956](CVE-2023/CVE-2023-229xx/CVE-2023-22956.json) (`2023-08-14T00:36:59.677`)
* [CVE-2023-22957](CVE-2023/CVE-2023-229xx/CVE-2023-22957.json) (`2023-08-14T00:36:59.677`)
* [CVE-2023-3452](CVE-2023/CVE-2023-34xx/CVE-2023-3452.json) (`2023-08-14T00:36:59.677`)
* [CVE-2023-4293](CVE-2023/CVE-2023-42xx/CVE-2023-4293.json) (`2023-08-14T00:36:59.677`)
* [CVE-2023-4265](CVE-2023/CVE-2023-42xx/CVE-2023-4265.json) (`2023-08-14T00:36:59.677`)
* [CVE-2023-39380](CVE-2023/CVE-2023-393xx/CVE-2023-39380.json) (`2023-08-14T00:36:59.677`)
* [CVE-2023-39381](CVE-2023/CVE-2023-393xx/CVE-2023-39381.json) (`2023-08-14T00:36:59.677`)
* [CVE-2023-39382](CVE-2023/CVE-2023-393xx/CVE-2023-39382.json) (`2023-08-14T00:36:59.677`)
* [CVE-2023-39383](CVE-2023/CVE-2023-393xx/CVE-2023-39383.json) (`2023-08-14T00:36:59.677`)
* [CVE-2023-39384](CVE-2023/CVE-2023-393xx/CVE-2023-39384.json) (`2023-08-14T00:36:59.677`)
* [CVE-2023-39388](CVE-2023/CVE-2023-393xx/CVE-2023-39388.json) (`2023-08-14T00:36:59.677`)
* [CVE-2023-39389](CVE-2023/CVE-2023-393xx/CVE-2023-39389.json) (`2023-08-14T00:36:59.677`)
* [CVE-2023-39392](CVE-2023/CVE-2023-393xx/CVE-2023-39392.json) (`2023-08-14T00:36:59.677`)
* [CVE-2023-39393](CVE-2023/CVE-2023-393xx/CVE-2023-39393.json) (`2023-08-14T00:36:59.677`)
## Download and Usage