mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-09-11T06:00:26.345558+00:00
This commit is contained in:
parent
9ceff4453f
commit
e59d445525
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20867",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2023-06-13T17:15:14.070",
|
||||
"lastModified": "2023-08-17T19:15:10.463",
|
||||
"lastModified": "2023-09-11T04:15:09.557",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2023-06-23",
|
||||
"cisaActionDue": "2023-07-14",
|
||||
@ -108,6 +108,10 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230725-0001/",
|
||||
"source": "security@vmware.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5493",
|
||||
"source": "security@vmware.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vmware.com/security/advisories/VMSA-2023-0013.html",
|
||||
"source": "security@vmware.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20900",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2023-08-31T10:15:08.247",
|
||||
"lastModified": "2023-09-06T13:37:21.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-11T04:15:10.330",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -164,6 +164,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5493",
|
||||
"source": "security@vmware.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vmware.com/security/advisories/VMSA-2023-0019.html",
|
||||
"source": "security@vmware.com",
|
||||
|
24
CVE-2023/CVE-2023-424xx/CVE-2023-42467.json
Normal file
24
CVE-2023/CVE-2023-424xx/CVE-2023-42467.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-42467",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-11T04:15:10.720",
|
||||
"lastModified": "2023-09-11T04:15:10.720",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s->qdev.blocksize from being 256. This stops QEMU and the guest immediately."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/qemu-project/qemu/-/issues/1813",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/thuth/qemu/-/commit/3f91104484e5bf55b56d7e1b039a4a5a17d0c1a7",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4874",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-09-09T15:15:34.623",
|
||||
"lastModified": "2023-09-10T19:45:57.130",
|
||||
"lastModified": "2023-09-11T04:15:10.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -54,6 +54,10 @@
|
||||
{
|
||||
"url": "https://gitlab.com/muttmua/mutt/-/commit/a4752eb0ae0a521eec02e59e51ae5daedf74fda0.patch",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5494",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4875",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-09-09T15:15:35.500",
|
||||
"lastModified": "2023-09-10T19:45:57.130",
|
||||
"lastModified": "2023-09-11T04:15:11.010",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -54,6 +54,10 @@
|
||||
{
|
||||
"url": "https://gitlab.com/muttmua/mutt/-/commit/4cc3128abdf52c615911589394a03271fddeefc6.patch",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5494",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
44
README.md
44
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-09-10T20:00:24.868411+00:00
|
||||
2023-09-11T06:00:26.345558+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-09-10T19:45:57.130000+00:00
|
||||
2023-09-11T04:15:11.010000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -23,52 +23,30 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2023-09-10T00:00:13.544140+00:00
|
||||
2023-09-11T00:00:13.562919+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
224567
|
||||
224568
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
* [CVE-2023-4878](CVE-2023/CVE-2023-48xx/CVE-2023-4878.json) (`2023-09-10T18:15:07.537`)
|
||||
* [CVE-2023-4879](CVE-2023/CVE-2023-48xx/CVE-2023-4879.json) (`2023-09-10T18:15:08.003`)
|
||||
* [CVE-2023-42467](CVE-2023/CVE-2023-424xx/CVE-2023-42467.json) (`2023-09-11T04:15:10.720`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `47`
|
||||
Recently modified CVEs: `4`
|
||||
|
||||
* [CVE-2023-41564](CVE-2023/CVE-2023-415xx/CVE-2023-41564.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4838](CVE-2023/CVE-2023-48xx/CVE-2023-4838.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4845](CVE-2023/CVE-2023-48xx/CVE-2023-4845.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4846](CVE-2023/CVE-2023-48xx/CVE-2023-4846.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4847](CVE-2023/CVE-2023-48xx/CVE-2023-4847.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4848](CVE-2023/CVE-2023-48xx/CVE-2023-4848.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4849](CVE-2023/CVE-2023-48xx/CVE-2023-4849.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4850](CVE-2023/CVE-2023-48xx/CVE-2023-4850.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4851](CVE-2023/CVE-2023-48xx/CVE-2023-4851.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4852](CVE-2023/CVE-2023-48xx/CVE-2023-4852.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4874](CVE-2023/CVE-2023-48xx/CVE-2023-4874.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4875](CVE-2023/CVE-2023-48xx/CVE-2023-4875.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4864](CVE-2023/CVE-2023-48xx/CVE-2023-4864.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-41915](CVE-2023/CVE-2023-419xx/CVE-2023-41915.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4865](CVE-2023/CVE-2023-48xx/CVE-2023-4865.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4866](CVE-2023/CVE-2023-48xx/CVE-2023-4866.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4867](CVE-2023/CVE-2023-48xx/CVE-2023-4867.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4868](CVE-2023/CVE-2023-48xx/CVE-2023-4868.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4869](CVE-2023/CVE-2023-48xx/CVE-2023-4869.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4876](CVE-2023/CVE-2023-48xx/CVE-2023-4876.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4877](CVE-2023/CVE-2023-48xx/CVE-2023-4877.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4870](CVE-2023/CVE-2023-48xx/CVE-2023-4870.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4871](CVE-2023/CVE-2023-48xx/CVE-2023-4871.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4872](CVE-2023/CVE-2023-48xx/CVE-2023-4872.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-4873](CVE-2023/CVE-2023-48xx/CVE-2023-4873.json) (`2023-09-10T19:45:57.130`)
|
||||
* [CVE-2023-20867](CVE-2023/CVE-2023-208xx/CVE-2023-20867.json) (`2023-09-11T04:15:09.557`)
|
||||
* [CVE-2023-20900](CVE-2023/CVE-2023-209xx/CVE-2023-20900.json) (`2023-09-11T04:15:10.330`)
|
||||
* [CVE-2023-4874](CVE-2023/CVE-2023-48xx/CVE-2023-4874.json) (`2023-09-11T04:15:10.833`)
|
||||
* [CVE-2023-4875](CVE-2023/CVE-2023-48xx/CVE-2023-4875.json) (`2023-09-11T04:15:11.010`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user