diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40631.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40631.json new file mode 100644 index 00000000000..28cd410e23e --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40631.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40631", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:55.547", + "lastModified": "2023-10-08T04:15:55.547", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Dialer, there is a possible missing permission check. This could lead to local information disclosure with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40632.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40632.json new file mode 100644 index 00000000000..5cbf8c3ca89 --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40632.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40632", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:56.397", + "lastModified": "2023-10-08T04:15:56.397", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In jpg driver, there is a possible use after free due to a logic error. This could lead to remote information disclosure no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40633.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40633.json new file mode 100644 index 00000000000..44af1d565b9 --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40633.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40633", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:56.483", + "lastModified": "2023-10-08T04:15:56.483", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In phasecheckserver, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40634.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40634.json new file mode 100644 index 00000000000..c160387781d --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40634.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40634", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:56.553", + "lastModified": "2023-10-08T04:15:56.553", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In phasechecksercer, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40635.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40635.json new file mode 100644 index 00000000000..a2c05f5805c --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40635.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40635", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:56.630", + "lastModified": "2023-10-08T04:15:56.630", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In linkturbo, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40636.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40636.json new file mode 100644 index 00000000000..51bfcb384b4 --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40636.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40636", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:56.700", + "lastModified": "2023-10-08T04:15:56.700", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In telecom service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40637.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40637.json new file mode 100644 index 00000000000..ca9e543a85a --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40637.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40637", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:56.773", + "lastModified": "2023-10-08T04:15:56.773", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In telecom service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40638.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40638.json new file mode 100644 index 00000000000..3e7b7d4e03f --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40638.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40638", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:56.833", + "lastModified": "2023-10-08T04:15:56.833", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Telecom service, there is a possible missing permission check. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40639.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40639.json new file mode 100644 index 00000000000..fc981ac105a --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40639.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40639", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:56.897", + "lastModified": "2023-10-08T04:15:56.897", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In SoundRecorder service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40640.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40640.json new file mode 100644 index 00000000000..ce03a54b2aa --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40640.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40640", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:56.957", + "lastModified": "2023-10-08T04:15:56.957", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In SoundRecorder service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40641.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40641.json new file mode 100644 index 00000000000..43a532b923a --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40641.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40641", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:57.027", + "lastModified": "2023-10-08T04:15:57.027", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40642.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40642.json new file mode 100644 index 00000000000..999749e4a08 --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40642.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40642", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:57.087", + "lastModified": "2023-10-08T04:15:57.087", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40643.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40643.json new file mode 100644 index 00000000000..8a4d46df896 --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40643.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40643", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:57.147", + "lastModified": "2023-10-08T04:15:57.147", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40644.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40644.json new file mode 100644 index 00000000000..e00869a3ae6 --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40644.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40644", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:57.207", + "lastModified": "2023-10-08T04:15:57.207", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40645.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40645.json new file mode 100644 index 00000000000..9d89ec652fd --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40645.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40645", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:57.270", + "lastModified": "2023-10-08T04:15:57.270", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40646.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40646.json new file mode 100644 index 00000000000..d26aaa7f717 --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40646.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40646", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:57.347", + "lastModified": "2023-10-08T04:15:57.347", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40647.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40647.json new file mode 100644 index 00000000000..ba396fe0723 --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40647.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40647", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:57.423", + "lastModified": "2023-10-08T04:15:57.423", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40648.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40648.json new file mode 100644 index 00000000000..9a6f30c7a4b --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40648.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40648", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:57.493", + "lastModified": "2023-10-08T04:15:57.493", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40649.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40649.json new file mode 100644 index 00000000000..291ef888c75 --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40649.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40649", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:57.563", + "lastModified": "2023-10-08T04:15:57.563", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40650.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40650.json new file mode 100644 index 00000000000..191531982b5 --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40650.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40650", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:57.627", + "lastModified": "2023-10-08T04:15:57.627", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Telecom service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40651.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40651.json new file mode 100644 index 00000000000..4fb25ae794a --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40651.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40651", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:57.693", + "lastModified": "2023-10-08T04:15:57.693", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In urild service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40652.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40652.json new file mode 100644 index 00000000000..7a32cc6ae95 --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40652.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40652", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:57.770", + "lastModified": "2023-10-08T04:15:57.770", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In jpg driver, there is a possible out of bounds write due to improper input validation. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40653.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40653.json new file mode 100644 index 00000000000..10e214e185e --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40653.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40653", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:57.827", + "lastModified": "2023-10-08T04:15:57.827", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In FW-PackageManager, there is a possible missing permission check. This could lead to local escalation of privilege with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40654.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40654.json new file mode 100644 index 00000000000..111747b5635 --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40654.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40654", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-10-08T04:15:57.893", + "lastModified": "2023-10-08T04:15:57.893", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In FW-PackageManager, there is a possible missing permission check. This could lead to local escalation of privilege with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6feba43ced6..98d14d0e1c3 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-10-07T22:00:24.986180+00:00 +2023-10-08T06:00:24.384523+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-10-07T21:15:16.767000+00:00 +2023-10-08T04:15:57.893000+00:00 ``` ### Last Data Feed Release @@ -23,50 +23,49 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2023-10-07T00:00:13.585919+00:00 +2023-10-08T00:00:13.568515+00:00 ``` ### Total Number of included CVEs ```plain -227157 +227181 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `24` +* [CVE-2023-40631](CVE-2023/CVE-2023-406xx/CVE-2023-40631.json) (`2023-10-08T04:15:55.547`) +* [CVE-2023-40632](CVE-2023/CVE-2023-406xx/CVE-2023-40632.json) (`2023-10-08T04:15:56.397`) +* [CVE-2023-40633](CVE-2023/CVE-2023-406xx/CVE-2023-40633.json) (`2023-10-08T04:15:56.483`) +* [CVE-2023-40634](CVE-2023/CVE-2023-406xx/CVE-2023-40634.json) (`2023-10-08T04:15:56.553`) +* [CVE-2023-40635](CVE-2023/CVE-2023-406xx/CVE-2023-40635.json) (`2023-10-08T04:15:56.630`) +* [CVE-2023-40636](CVE-2023/CVE-2023-406xx/CVE-2023-40636.json) (`2023-10-08T04:15:56.700`) +* [CVE-2023-40637](CVE-2023/CVE-2023-406xx/CVE-2023-40637.json) (`2023-10-08T04:15:56.773`) +* [CVE-2023-40638](CVE-2023/CVE-2023-406xx/CVE-2023-40638.json) (`2023-10-08T04:15:56.833`) +* [CVE-2023-40639](CVE-2023/CVE-2023-406xx/CVE-2023-40639.json) (`2023-10-08T04:15:56.897`) +* [CVE-2023-40640](CVE-2023/CVE-2023-406xx/CVE-2023-40640.json) (`2023-10-08T04:15:56.957`) +* [CVE-2023-40641](CVE-2023/CVE-2023-406xx/CVE-2023-40641.json) (`2023-10-08T04:15:57.027`) +* [CVE-2023-40642](CVE-2023/CVE-2023-406xx/CVE-2023-40642.json) (`2023-10-08T04:15:57.087`) +* [CVE-2023-40643](CVE-2023/CVE-2023-406xx/CVE-2023-40643.json) (`2023-10-08T04:15:57.147`) +* [CVE-2023-40644](CVE-2023/CVE-2023-406xx/CVE-2023-40644.json) (`2023-10-08T04:15:57.207`) +* [CVE-2023-40645](CVE-2023/CVE-2023-406xx/CVE-2023-40645.json) (`2023-10-08T04:15:57.270`) +* [CVE-2023-40646](CVE-2023/CVE-2023-406xx/CVE-2023-40646.json) (`2023-10-08T04:15:57.347`) +* [CVE-2023-40647](CVE-2023/CVE-2023-406xx/CVE-2023-40647.json) (`2023-10-08T04:15:57.423`) +* [CVE-2023-40648](CVE-2023/CVE-2023-406xx/CVE-2023-40648.json) (`2023-10-08T04:15:57.493`) +* [CVE-2023-40649](CVE-2023/CVE-2023-406xx/CVE-2023-40649.json) (`2023-10-08T04:15:57.563`) +* [CVE-2023-40650](CVE-2023/CVE-2023-406xx/CVE-2023-40650.json) (`2023-10-08T04:15:57.627`) +* [CVE-2023-40651](CVE-2023/CVE-2023-406xx/CVE-2023-40651.json) (`2023-10-08T04:15:57.693`) +* [CVE-2023-40652](CVE-2023/CVE-2023-406xx/CVE-2023-40652.json) (`2023-10-08T04:15:57.770`) +* [CVE-2023-40653](CVE-2023/CVE-2023-406xx/CVE-2023-40653.json) (`2023-10-08T04:15:57.827`) +* [CVE-2023-40654](CVE-2023/CVE-2023-406xx/CVE-2023-40654.json) (`2023-10-08T04:15:57.893`) ### CVEs modified in the last Commit -Recently modified CVEs: `47` +Recently modified CVEs: `0` -* [CVE-2020-11096](CVE-2020/CVE-2020-110xx/CVE-2020-11096.json) (`2023-10-07T21:15:13.937`) -* [CVE-2020-11097](CVE-2020/CVE-2020-110xx/CVE-2020-11097.json) (`2023-10-07T21:15:14.067`) -* [CVE-2020-11098](CVE-2020/CVE-2020-110xx/CVE-2020-11098.json) (`2023-10-07T21:15:14.173`) -* [CVE-2020-11099](CVE-2020/CVE-2020-110xx/CVE-2020-11099.json) (`2023-10-07T21:15:14.277`) -* [CVE-2020-13396](CVE-2020/CVE-2020-133xx/CVE-2020-13396.json) (`2023-10-07T21:15:14.397`) -* [CVE-2020-13397](CVE-2020/CVE-2020-133xx/CVE-2020-13397.json) (`2023-10-07T21:15:14.513`) -* [CVE-2020-13398](CVE-2020/CVE-2020-133xx/CVE-2020-13398.json) (`2023-10-07T21:15:14.607`) -* [CVE-2020-15103](CVE-2020/CVE-2020-151xx/CVE-2020-15103.json) (`2023-10-07T21:15:14.697`) -* [CVE-2020-4030](CVE-2020/CVE-2020-40xx/CVE-2020-4030.json) (`2023-10-07T21:15:14.837`) -* [CVE-2020-4031](CVE-2020/CVE-2020-40xx/CVE-2020-4031.json) (`2023-10-07T21:15:14.957`) -* [CVE-2020-4032](CVE-2020/CVE-2020-40xx/CVE-2020-4032.json) (`2023-10-07T21:15:15.087`) -* [CVE-2020-4033](CVE-2020/CVE-2020-40xx/CVE-2020-4033.json) (`2023-10-07T21:15:15.193`) -* [CVE-2023-39350](CVE-2023/CVE-2023-393xx/CVE-2023-39350.json) (`2023-10-07T21:15:15.343`) -* [CVE-2023-39351](CVE-2023/CVE-2023-393xx/CVE-2023-39351.json) (`2023-10-07T21:15:15.470`) -* [CVE-2023-39352](CVE-2023/CVE-2023-393xx/CVE-2023-39352.json) (`2023-10-07T21:15:15.583`) -* [CVE-2023-39353](CVE-2023/CVE-2023-393xx/CVE-2023-39353.json) (`2023-10-07T21:15:15.703`) -* [CVE-2023-39354](CVE-2023/CVE-2023-393xx/CVE-2023-39354.json) (`2023-10-07T21:15:15.820`) -* [CVE-2023-39355](CVE-2023/CVE-2023-393xx/CVE-2023-39355.json) (`2023-10-07T21:15:15.933`) -* [CVE-2023-39356](CVE-2023/CVE-2023-393xx/CVE-2023-39356.json) (`2023-10-07T21:15:16.030`) -* [CVE-2023-40181](CVE-2023/CVE-2023-401xx/CVE-2023-40181.json) (`2023-10-07T21:15:16.153`) -* [CVE-2023-40186](CVE-2023/CVE-2023-401xx/CVE-2023-40186.json) (`2023-10-07T21:15:16.273`) -* [CVE-2023-40188](CVE-2023/CVE-2023-401xx/CVE-2023-40188.json) (`2023-10-07T21:15:16.400`) -* [CVE-2023-40567](CVE-2023/CVE-2023-405xx/CVE-2023-40567.json) (`2023-10-07T21:15:16.537`) -* [CVE-2023-40569](CVE-2023/CVE-2023-405xx/CVE-2023-40569.json) (`2023-10-07T21:15:16.657`) -* [CVE-2023-40589](CVE-2023/CVE-2023-405xx/CVE-2023-40589.json) (`2023-10-07T21:15:16.767`) ## Download and Usage