From 04d2d700ab802f0fe24309988d7db4351e9b7bff Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 5 Sep 2023 14:00:29 +0000 Subject: [PATCH] Auto-Update: 2023-09-05T14:00:25.738677+00:00 --- CVE-2022/CVE-2022-332xx/CVE-2022-33220.json | 4 +- CVE-2022/CVE-2022-332xx/CVE-2022-33275.json | 4 +- CVE-2022/CVE-2022-405xx/CVE-2022-40524.json | 4 +- CVE-2022/CVE-2022-405xx/CVE-2022-40534.json | 4 +- CVE-2022/CVE-2022-417xx/CVE-2022-41763.json | 20 +++++ CVE-2023/CVE-2023-208xx/CVE-2023-20897.json | 4 +- CVE-2023/CVE-2023-208xx/CVE-2023-20898.json | 4 +- CVE-2023/CVE-2023-216xx/CVE-2023-21636.json | 4 +- CVE-2023/CVE-2023-216xx/CVE-2023-21644.json | 4 +- CVE-2023/CVE-2023-216xx/CVE-2023-21646.json | 4 +- CVE-2023/CVE-2023-216xx/CVE-2023-21653.json | 4 +- CVE-2023/CVE-2023-216xx/CVE-2023-21654.json | 4 +- CVE-2023/CVE-2023-216xx/CVE-2023-21655.json | 4 +- CVE-2023/CVE-2023-216xx/CVE-2023-21662.json | 4 +- CVE-2023/CVE-2023-216xx/CVE-2023-21663.json | 4 +- CVE-2023/CVE-2023-216xx/CVE-2023-21664.json | 4 +- CVE-2023/CVE-2023-216xx/CVE-2023-21667.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28538.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28543.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28544.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28548.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28549.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28557.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28558.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28559.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28560.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28562.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28564.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28565.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28567.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28573.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28581.json | 4 +- CVE-2023/CVE-2023-285xx/CVE-2023-28584.json | 4 +- CVE-2023/CVE-2023-317xx/CVE-2023-31714.json | 84 +++++++++++++++++++-- CVE-2023/CVE-2023-330xx/CVE-2023-33015.json | 4 +- CVE-2023/CVE-2023-330xx/CVE-2023-33016.json | 4 +- CVE-2023/CVE-2023-330xx/CVE-2023-33019.json | 4 +- CVE-2023/CVE-2023-330xx/CVE-2023-33020.json | 4 +- CVE-2023/CVE-2023-330xx/CVE-2023-33021.json | 4 +- CVE-2023/CVE-2023-34xx/CVE-2023-3489.json | 56 +++++++++++++- CVE-2023/CVE-2023-364xx/CVE-2023-36492.json | 4 +- CVE-2023/CVE-2023-385xx/CVE-2023-38569.json | 4 +- CVE-2023/CVE-2023-385xx/CVE-2023-38574.json | 4 +- CVE-2023/CVE-2023-394xx/CVE-2023-39448.json | 4 +- CVE-2023/CVE-2023-399xx/CVE-2023-39938.json | 4 +- CVE-2023/CVE-2023-405xx/CVE-2023-40535.json | 4 +- CVE-2023/CVE-2023-405xx/CVE-2023-40582.json | 52 ++++++++++++- CVE-2023/CVE-2023-407xx/CVE-2023-40705.json | 4 +- CVE-2023/CVE-2023-419xx/CVE-2023-41908.json | 4 +- CVE-2023/CVE-2023-419xx/CVE-2023-41909.json | 4 +- CVE-2023/CVE-2023-419xx/CVE-2023-41910.json | 4 +- CVE-2023/CVE-2023-45xx/CVE-2023-4540.json | 10 ++- README.md | 41 +++++++--- 53 files changed, 330 insertions(+), 121 deletions(-) create mode 100644 CVE-2022/CVE-2022-417xx/CVE-2022-41763.json diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33220.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33220.json index 1fab85f7dd9..bde5c9367ec 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33220.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33220.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33220", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:11.847", - "lastModified": "2023-09-05T07:15:11.847", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:56.227", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33275.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33275.json index 7313f139568..397d83f4a7c 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33275.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33275.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33275", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:11.983", - "lastModified": "2023-09-05T07:15:11.983", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:56.227", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40524.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40524.json index 1d6ff137f62..20bc680917f 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40524.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40524.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40524", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.073", - "lastModified": "2023-09-05T07:15:12.073", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:56.227", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40534.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40534.json index fd7901a22ab..08246f68d61 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40534.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40534.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40534", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.157", - "lastModified": "2023-09-05T07:15:12.157", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:56.227", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41763.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41763.json new file mode 100644 index 00000000000..06512503140 --- /dev/null +++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41763.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2022-41763", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-09-05T13:15:07.717", + "lastModified": "2023-09-05T13:33:34.903", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in NOKIA AMS 9.7.05. Remote Code Execution exists via the debugger of the ipAddress variable. A remote user, authenticated to the AMS server, could inject code in the PING function. The privileges of the command executed depend on the user that runs the service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.gruppotim.it/it/footer/red-team.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20897.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20897.json index 1c52d6033ab..8fef4708299 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20897.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20897.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20897", "sourceIdentifier": "security@vmware.com", "published": "2023-09-05T11:15:32.973", - "lastModified": "2023-09-05T11:15:32.973", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20898.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20898.json index a4296319e64..84176c9507e 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20898.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20898.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20898", "sourceIdentifier": "security@vmware.com", "published": "2023-09-05T11:15:33.300", - "lastModified": "2023-09-05T11:15:33.300", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21636.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21636.json index 13f6fd4c636..0100ba08ea6 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21636.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21636.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21636", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.247", - "lastModified": "2023-09-05T07:15:12.247", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:56.227", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21644.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21644.json index a24d46f2e48..1c5b6eb2e2e 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21644.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21644.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21644", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.327", - "lastModified": "2023-09-05T07:15:12.327", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:56.227", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21646.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21646.json index 9894626d701..c8729723e2e 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21646.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21646.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21646", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.410", - "lastModified": "2023-09-05T07:15:12.410", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:56.227", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21653.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21653.json index e872bdddaab..a29a43682df 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21653.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21653.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21653", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.490", - "lastModified": "2023-09-05T07:15:12.490", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:56.227", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21654.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21654.json index 05c31f97bda..e2fbe1c6b90 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21654.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21654.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21654", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.570", - "lastModified": "2023-09-05T07:15:12.570", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21655.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21655.json index ebadf6e5b31..0a1f7bd2bdf 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21655.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21655.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21655", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.697", - "lastModified": "2023-09-05T07:15:12.697", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21662.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21662.json index f8e5f1fd4bd..9cab5045080 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21662.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21662.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21662", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.780", - "lastModified": "2023-09-05T07:15:12.780", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21663.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21663.json index 5f538b7d423..36a9432cf82 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21663.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21663.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21663", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.863", - "lastModified": "2023-09-05T07:15:12.863", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21664.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21664.json index 0d11e5ecf27..a1d74197790 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21664.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21664.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21664", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.940", - "lastModified": "2023-09-05T07:15:12.940", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21667.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21667.json index 70af5369352..15c15b65b7a 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21667.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21667.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21667", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.020", - "lastModified": "2023-09-05T07:15:13.020", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28538.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28538.json index c001ba8e98b..e7859bd73d3 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28538.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28538.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28538", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.113", - "lastModified": "2023-09-05T07:15:13.113", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28543.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28543.json index eff942e4bb1..2097084a85e 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28543.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28543.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28543", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.197", - "lastModified": "2023-09-05T07:15:13.197", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28544.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28544.json index dd9c243fee5..3a5824143ba 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28544.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28544.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28544", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.280", - "lastModified": "2023-09-05T07:15:13.280", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28548.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28548.json index 8a576d96d99..d2165947e35 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28548.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28548.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28548", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.360", - "lastModified": "2023-09-05T07:15:13.360", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28549.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28549.json index a9fa2b1a07b..3257c7c7b68 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28549.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28549.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28549", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.437", - "lastModified": "2023-09-05T07:15:13.437", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28557.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28557.json index 0099a0ade97..2f692f89192 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28557.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28557.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28557", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.517", - "lastModified": "2023-09-05T07:15:13.517", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28558.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28558.json index 7c326b0c885..9b36c41668f 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28558.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28558.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28558", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.603", - "lastModified": "2023-09-05T07:15:13.603", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28559.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28559.json index f548f1cbd7e..732bf6c663f 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28559.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28559.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28559", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.687", - "lastModified": "2023-09-05T07:15:13.687", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json index 3ace550911d..61ab22068d7 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28560", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.763", - "lastModified": "2023-09-05T07:15:13.763", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28562.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28562.json index 45abc171a50..0163170b3ca 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28562.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28562.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28562", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.843", - "lastModified": "2023-09-05T07:15:13.843", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28564.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28564.json index 5dba2951e67..d99c05332ef 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28564.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28564.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28564", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.923", - "lastModified": "2023-09-05T07:15:13.923", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28565.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28565.json index b199d5c19a1..538f9ac7951 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28565.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28565.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28565", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.000", - "lastModified": "2023-09-05T07:15:14.000", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28567.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28567.json index 4625ce0549b..85ea15d13d2 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28567.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28567.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28567", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.083", - "lastModified": "2023-09-05T07:15:14.083", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28573.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28573.json index 6cbbbfd45d7..254c8f8743a 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28573.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28573.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28573", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.167", - "lastModified": "2023-09-05T07:15:14.167", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:51.627", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28581.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28581.json index bf55da173df..ae6f706d2b7 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28581.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28581.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28581", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.247", - "lastModified": "2023-09-05T07:15:14.247", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28584.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28584.json index 7da63384ae4..a063e430c2c 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28584.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28584.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28584", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.323", - "lastModified": "2023-09-05T07:15:14.323", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31714.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31714.json index d79764852fa..601342dc2ac 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31714.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31714.json @@ -2,31 +2,101 @@ "id": "CVE-2023-31714", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T22:15:08.013", - "lastModified": "2023-08-31T10:02:10.690", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-05T12:29:00.033", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Chitor-CMS before v1.1.2 was discovered to contain multiple SQL injection vulnerabilities." + }, + { + "lang": "es", + "value": "Se ha descubierto que Chitor-CMS antes de la versi\u00f3n 1.1.2 contiene m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL. " + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:waqaskanju:chitor-cms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.2", + "matchCriteriaId": "7A9BA737-3DCE-4D63-AE63-EEF6C64FE9A7" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/msd0pe-1/chitor-sqli", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/waqaskanju/Chitor-CMS/commit/69d34420ad382c91b0c285432418c1b0810128c1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/waqaskanju/Chitor-CMS/releases/tag/Chitor-cms", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.exploit-db.com/exploits/51383", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33015.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33015.json index 4d75658d493..5b502a31ae5 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33015.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33015.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33015", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.407", - "lastModified": "2023-09-05T07:15:14.407", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33016.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33016.json index 7c6219eb789..7ccd8e620d9 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33016.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33016.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33016", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.487", - "lastModified": "2023-09-05T07:15:14.487", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33019.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33019.json index 6ec50a2180d..3ba46eb3d83 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33019.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33019.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33019", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.560", - "lastModified": "2023-09-05T07:15:14.560", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33020.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33020.json index f0d459abcb7..3625e3fe8a7 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33020.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33020.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33020", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.640", - "lastModified": "2023-09-05T07:15:14.640", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33021.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33021.json index 7c29b04786e..82689f7ec48 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33021.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33021.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33021", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.717", - "lastModified": "2023-09-05T07:15:14.717", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3489.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3489.json index 3cfe3d9652e..5f35b5afd34 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3489.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3489.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3489", "sourceIdentifier": "sirt@brocade.com", "published": "2023-08-31T00:15:07.913", - "lastModified": "2023-08-31T10:02:10.690", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-05T12:46:37.377", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "sirt@brocade.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + }, { "source": "sirt@brocade.com", "type": "Secondary", @@ -46,10 +76,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:broadcom:fabric_operating_system:9.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9F3045B8-D0C4-47D8-8EBB-F96B1DBBA1DC" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22510", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36492.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36492.json index bb84b94e5f9..e0bd0d03804 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36492.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36492.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36492", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-05T10:15:07.463", - "lastModified": "2023-09-05T10:15:07.463", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38569.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38569.json index a531839508d..d8c9bb9d89e 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38569.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38569.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38569", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-05T10:15:07.643", - "lastModified": "2023-09-05T10:15:07.643", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38574.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38574.json index 1c5b67f7f6b..44729443683 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38574.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38574.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38574", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-05T09:15:08.037", - "lastModified": "2023-09-05T09:15:08.037", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39448.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39448.json index 8399ca81312..af970c2d84c 100644 --- a/CVE-2023/CVE-2023-394xx/CVE-2023-39448.json +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39448.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39448", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-05T09:15:08.803", - "lastModified": "2023-09-05T09:15:08.803", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39938.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39938.json index d8ac05bdf0e..bd696dd6b35 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39938.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39938.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39938", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-05T09:15:09.053", - "lastModified": "2023-09-05T09:15:09.053", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40535.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40535.json index df89f552781..8e5f52a7f1b 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40535.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40535.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40535", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-05T09:15:09.213", - "lastModified": "2023-09-05T09:15:09.213", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40582.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40582.json index 7166c858ed3..2aa4406e5f3 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40582.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40582.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40582", "sourceIdentifier": "security-advisories@github.com", "published": "2023-08-30T18:15:09.783", - "lastModified": "2023-08-31T10:02:10.690", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-05T12:57:14.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +66,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:find-exec_project:find-exec:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "1.0.3", + "matchCriteriaId": "9D212061-F058-4CB9-A96E-23856D97B658" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/shime/find-exec/commit/74fb108097c229b03d6dba4cce81e36aa364b51c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/shime/find-exec/security/advisories/GHSA-95rp-6gqp-6622", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40705.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40705.json index 52484bc73d9..0435d0c23cc 100644 --- a/CVE-2023/CVE-2023-407xx/CVE-2023-40705.json +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40705.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40705", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-05T09:15:09.340", - "lastModified": "2023-09-05T09:15:09.340", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41908.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41908.json index 75c713263dc..e2404e9b3c7 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41908.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41908.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41908", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-05T07:15:14.810", - "lastModified": "2023-09-05T07:15:14.810", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41909.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41909.json index 6045cca5d9f..1278ee6cfe1 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41909.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41909.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41909", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-05T07:15:14.877", - "lastModified": "2023-09-05T07:15:14.877", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41910.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41910.json index e04d5536d5d..8664ec2a87d 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41910.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41910.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41910", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-05T07:15:14.927", - "lastModified": "2023-09-05T07:15:14.927", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4540.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4540.json index 9f5d7d592fa..b76429029d0 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4540.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4540.json @@ -2,12 +2,12 @@ "id": "CVE-2023-4540", "sourceIdentifier": "cvd@cert.pl", "published": "2023-09-05T08:15:40.017", - "lastModified": "2023-09-05T08:15:40.017", - "vulnStatus": "Received", + "lastModified": "2023-09-05T12:54:46.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Improper Handling of Exceptional Conditions vulnerability in Daurnimator HTTP Library for Lua allows Excessive Allocation.This issue affects HTTP Library for Lua: before commit ddab283.\n\n" + "value": "Improper Handling of Exceptional Conditions vulnerability in Daurnimator lua-http library allows Excessive Allocation and a denial of service (DoS) attack to be executed by sending a properly crafted request to the server. \n\nThis issue affects lua-http: all versions before commit ddab283." } ], "metrics": {}, @@ -24,6 +24,10 @@ } ], "references": [ + { + "url": "https://cert.pl/posts/2023/09/CVE-2023-4540/", + "source": "cvd@cert.pl" + }, { "url": "https://github.com/daurnimator/lua-http/commit/ddab2835c583d45dec62680ca8d3cbde55e0bae6", "source": "cvd@cert.pl" diff --git a/README.md b/README.md index 912a881d1e4..57e5bd3ce7d 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-09-05T12:00:25.321378+00:00 +2023-09-05T14:00:25.738677+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-09-05T11:43:01.273000+00:00 +2023-09-05T13:33:34.903000+00:00 ``` ### Last Data Feed Release @@ -29,24 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -224191 +224192 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `1` -* [CVE-2023-36492](CVE-2023/CVE-2023-364xx/CVE-2023-36492.json) (`2023-09-05T10:15:07.463`) -* [CVE-2023-38569](CVE-2023/CVE-2023-385xx/CVE-2023-38569.json) (`2023-09-05T10:15:07.643`) -* [CVE-2023-20897](CVE-2023/CVE-2023-208xx/CVE-2023-20897.json) (`2023-09-05T11:15:32.973`) -* [CVE-2023-20898](CVE-2023/CVE-2023-208xx/CVE-2023-20898.json) (`2023-09-05T11:15:33.300`) +* [CVE-2022-41763](CVE-2022/CVE-2022-417xx/CVE-2022-41763.json) (`2023-09-05T13:15:07.717`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `51` -* [CVE-2022-43151](CVE-2022/CVE-2022-431xx/CVE-2022-43151.json) (`2023-09-05T11:43:01.273`) +* [CVE-2023-21654](CVE-2023/CVE-2023-216xx/CVE-2023-21654.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-21655](CVE-2023/CVE-2023-216xx/CVE-2023-21655.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-21662](CVE-2023/CVE-2023-216xx/CVE-2023-21662.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-21663](CVE-2023/CVE-2023-216xx/CVE-2023-21663.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-21664](CVE-2023/CVE-2023-216xx/CVE-2023-21664.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-21667](CVE-2023/CVE-2023-216xx/CVE-2023-21667.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-28538](CVE-2023/CVE-2023-285xx/CVE-2023-28538.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-28543](CVE-2023/CVE-2023-285xx/CVE-2023-28543.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-28544](CVE-2023/CVE-2023-285xx/CVE-2023-28544.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-28548](CVE-2023/CVE-2023-285xx/CVE-2023-28548.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-28549](CVE-2023/CVE-2023-285xx/CVE-2023-28549.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-28557](CVE-2023/CVE-2023-285xx/CVE-2023-28557.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-28558](CVE-2023/CVE-2023-285xx/CVE-2023-28558.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-28559](CVE-2023/CVE-2023-285xx/CVE-2023-28559.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-28560](CVE-2023/CVE-2023-285xx/CVE-2023-28560.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-28562](CVE-2023/CVE-2023-285xx/CVE-2023-28562.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-28564](CVE-2023/CVE-2023-285xx/CVE-2023-28564.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-28565](CVE-2023/CVE-2023-285xx/CVE-2023-28565.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-28567](CVE-2023/CVE-2023-285xx/CVE-2023-28567.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-28573](CVE-2023/CVE-2023-285xx/CVE-2023-28573.json) (`2023-09-05T12:54:51.627`) +* [CVE-2023-21636](CVE-2023/CVE-2023-216xx/CVE-2023-21636.json) (`2023-09-05T12:54:56.227`) +* [CVE-2023-21644](CVE-2023/CVE-2023-216xx/CVE-2023-21644.json) (`2023-09-05T12:54:56.227`) +* [CVE-2023-21646](CVE-2023/CVE-2023-216xx/CVE-2023-21646.json) (`2023-09-05T12:54:56.227`) +* [CVE-2023-21653](CVE-2023/CVE-2023-216xx/CVE-2023-21653.json) (`2023-09-05T12:54:56.227`) +* [CVE-2023-40582](CVE-2023/CVE-2023-405xx/CVE-2023-40582.json) (`2023-09-05T12:57:14.317`) ## Download and Usage