From 0522910f6209edb95ddeed484d774ebddcfd6e55 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 8 Oct 2023 10:00:28 +0000 Subject: [PATCH] Auto-Update: 2023-10-08T10:00:24.917564+00:00 --- CVE-2018/CVE-2018-250xx/CVE-2018-25078.json | 8 +++- CVE-2019/CVE-2019-148xx/CVE-2019-14870.json | 6 ++- CVE-2021/CVE-2021-447xx/CVE-2021-44758.json | 8 +++- CVE-2022/CVE-2022-34xx/CVE-2022-3437.json | 10 +++- CVE-2022/CVE-2022-36xx/CVE-2022-3671.json | 8 +++- CVE-2022/CVE-2022-419xx/CVE-2022-41916.json | 14 ++++-- CVE-2022/CVE-2022-428xx/CVE-2022-42898.json | 10 +++- CVE-2022/CVE-2022-446xx/CVE-2022-44640.json | 8 +++- CVE-2022/CVE-2022-451xx/CVE-2022-45142.json | 8 +++- CVE-2023/CVE-2023-218xx/CVE-2023-21884.json | 8 +++- CVE-2023/CVE-2023-218xx/CVE-2023-21885.json | 8 +++- CVE-2023/CVE-2023-218xx/CVE-2023-21886.json | 8 +++- CVE-2023/CVE-2023-218xx/CVE-2023-21889.json | 8 +++- CVE-2023/CVE-2023-218xx/CVE-2023-21898.json | 8 +++- CVE-2023/CVE-2023-218xx/CVE-2023-21899.json | 8 +++- CVE-2023/CVE-2023-311xx/CVE-2023-31124.json | 12 +++-- CVE-2023/CVE-2023-311xx/CVE-2023-31130.json | 6 ++- CVE-2023/CVE-2023-311xx/CVE-2023-31147.json | 12 +++-- CVE-2023/CVE-2023-320xx/CVE-2023-32067.json | 6 ++- CVE-2023/CVE-2023-325xx/CVE-2023-32570.json | 6 ++- README.md | 52 ++++++++++----------- 21 files changed, 155 insertions(+), 67 deletions(-) diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25078.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25078.json index e82f369699c..0f948b5f585 100644 --- a/CVE-2018/CVE-2018-250xx/CVE-2018-25078.json +++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25078.json @@ -2,8 +2,8 @@ "id": "CVE-2018-25078", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-26T21:15:16.080", - "lastModified": "2023-02-02T16:30:57.697", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-08T09:15:10.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,10 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-08", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-148xx/CVE-2019-14870.json b/CVE-2019/CVE-2019-148xx/CVE-2019-14870.json index a5c204375e7..dac4347c64e 100644 --- a/CVE-2019/CVE-2019-148xx/CVE-2019-14870.json +++ b/CVE-2019/CVE-2019-148xx/CVE-2019-14870.json @@ -2,7 +2,7 @@ "id": "CVE-2019-14870", "sourceIdentifier": "secalert@redhat.com", "published": "2019-12-10T23:15:10.457", - "lastModified": "2023-02-16T14:15:14.667", + "lastModified": "2023-10-08T09:15:10.253", "vulnStatus": "Modified", "descriptions": [ { @@ -285,6 +285,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202310-06", + "source": "secalert@redhat.com" + }, { "url": "https://security.netapp.com/advisory/ntap-20191210-0002/", "source": "secalert@redhat.com", diff --git a/CVE-2021/CVE-2021-447xx/CVE-2021-44758.json b/CVE-2021/CVE-2021-447xx/CVE-2021-44758.json index 62bbe3bff92..36613f6eca6 100644 --- a/CVE-2021/CVE-2021-447xx/CVE-2021-44758.json +++ b/CVE-2021/CVE-2021-447xx/CVE-2021-44758.json @@ -2,8 +2,8 @@ "id": "CVE-2021-44758", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-26T05:15:10.503", - "lastModified": "2023-01-05T02:50:59.290", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-08T09:15:10.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -79,6 +79,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-06", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-34xx/CVE-2022-3437.json b/CVE-2022/CVE-2022-34xx/CVE-2022-3437.json index e31ec844e71..c4d4359fe05 100644 --- a/CVE-2022/CVE-2022-34xx/CVE-2022-3437.json +++ b/CVE-2022/CVE-2022-34xx/CVE-2022-3437.json @@ -2,12 +2,16 @@ "id": "CVE-2022-3437", "sourceIdentifier": "secalert@redhat.com", "published": "2023-01-12T15:15:10.083", - "lastModified": "2023-09-17T09:15:11.373", + "lastModified": "2023-10-08T09:15:10.573", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de desbordamiento de b\u00fafer en Samba dentro de las rutinas GSSAPI unwrap_des() y unwrap_des3() de Heimdal. Las rutinas de descifrado DES y Triple-DES de la biblioteca GSSAPI de Heimdal permiten un desbordamiento del b\u00fafer de escritura de longitud limitada en la memoria asignada a malloc() cuando se presenta un paquete maliciosamente peque\u00f1o. Este fallo permite a un usuario remoto enviar datos maliciosos especialmente manipulados a la aplicaci\u00f3n, lo que puede provocar un ataque de denegaci\u00f3n de servicio (DoS)." } ], "metrics": { @@ -127,6 +131,10 @@ "url": "https://security.gentoo.org/glsa/202309-06", "source": "secalert@redhat.com" }, + { + "url": "https://security.gentoo.org/glsa/202310-06", + "source": "secalert@redhat.com" + }, { "url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "source": "secalert@redhat.com" diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3671.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3671.json index ab3349d0369..c0d25194437 100644 --- a/CVE-2022/CVE-2022-36xx/CVE-2022-3671.json +++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3671.json @@ -2,8 +2,8 @@ "id": "CVE-2022-3671", "sourceIdentifier": "cna@vuldb.com", "published": "2022-10-26T17:15:10.080", - "lastModified": "2022-10-28T01:30:15.533", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-08T09:15:10.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -104,6 +104,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202310-06", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?id.212014", "source": "cna@vuldb.com", diff --git a/CVE-2022/CVE-2022-419xx/CVE-2022-41916.json b/CVE-2022/CVE-2022-419xx/CVE-2022-41916.json index 168f8ed081b..c008703e859 100644 --- a/CVE-2022/CVE-2022-419xx/CVE-2022-41916.json +++ b/CVE-2022/CVE-2022-419xx/CVE-2022-41916.json @@ -2,12 +2,16 @@ "id": "CVE-2022-41916", "sourceIdentifier": "security-advisories@github.com", "published": "2022-11-15T23:15:27.197", - "lastModified": "2023-02-16T14:15:16.590", + "lastModified": "2023-10-08T09:15:10.810", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions prior to 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal's PKI certificate validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as any third-party applications using Heimdal's libhx509. Users should upgrade to Heimdal 7.7.1 or 7.8. There are no known workarounds for this issue." + }, + { + "lang": "es", + "value": "Heimdal es una implementaci\u00f3n de ASN.1/DER, PKIX y Kerberos. Las versiones anteriores a la 7.7.1 son vulnerables a una vulnerabilidad de denegaci\u00f3n de servicio en la biblioteca de validaci\u00f3n de certificados PKI de Heimdal, lo que afecta a KDC (a trav\u00e9s de PKINIT) y kinit (a trav\u00e9s de PKINIT), as\u00ed como a cualquier aplicaci\u00f3n de terceros que utilice libhx509 de Heimdal. Los usuarios deben actualizar a Heimdal 7.7.1 o 7.8. No se conocen workarounds para este problema." } ], "metrics": { @@ -56,7 +60,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security-advisories@github.com", "type": "Primary", "description": [ { @@ -66,7 +70,7 @@ ] }, { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { @@ -130,6 +134,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202310-06", + "source": "security-advisories@github.com" + }, { "url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "source": "security-advisories@github.com" diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42898.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42898.json index 6fc3cfc5134..7b008eaec1d 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42898.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42898.json @@ -2,12 +2,16 @@ "id": "CVE-2022-42898", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-25T06:15:09.427", - "lastModified": "2023-09-17T09:15:11.580", + "lastModified": "2023-10-08T09:15:10.937", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \"a similar bug.\"" + }, + { + "lang": "es", + "value": "El an\u00e1lisis sint\u00e1ctico de PAC en MIT Kerberos 5 (tambi\u00e9n conocido como krb5) antes de 1.19.4 y 1.20.x antes de 1.20.1 tiene desbordamientos de enteros que pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo (en KDC, kadmind, o un servidor de aplicaciones GSS o Kerberos) en plataformas de 32 bits (que tienen un desbordamiento de b\u00fafer resultante), y causar una denegaci\u00f3n de servicio en otras plataformas. Esto ocurre en krb5_pac_parse en lib/krb5/krb/pac.c. Heimdal antes de 7.7.1 tiene \"un bug similar\"." } ], "metrics": { @@ -151,6 +155,10 @@ "url": "https://security.gentoo.org/glsa/202309-06", "source": "cve@mitre.org" }, + { + "url": "https://security.gentoo.org/glsa/202310-06", + "source": "cve@mitre.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "source": "cve@mitre.org" diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44640.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44640.json index 99ff23514c7..a612ef22e63 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44640.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44640.json @@ -2,8 +2,8 @@ "id": "CVE-2022-44640", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-25T05:15:11.103", - "lastModified": "2023-05-16T11:03:18.913", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-08T09:15:11.017", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -103,6 +103,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202310-06", + "source": "cve@mitre.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "source": "cve@mitre.org", diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45142.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45142.json index 421622d8f71..fdaeaaade54 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45142.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45142.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45142", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-06T23:15:11.233", - "lastModified": "2023-03-13T18:02:37.587", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-08T09:15:11.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -79,6 +79,10 @@ } ], "references": [ + { + "url": "https://security.gentoo.org/glsa/202310-06", + "source": "secalert@redhat.com" + }, { "url": "https://www.openwall.com/lists/oss-security/2023/02/08/1", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21884.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21884.json index 5794518be2d..bfe7c98050b 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21884.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21884.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21884", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-01-18T00:15:16.353", - "lastModified": "2023-01-25T14:24:21.880", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-08T09:15:11.217", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,10 @@ } ], "references": [ + { + "url": "https://security.gentoo.org/glsa/202310-07", + "source": "secalert_us@oracle.com" + }, { "url": "https://www.oracle.com/security-alerts/cpujan2023.html", "source": "secalert_us@oracle.com", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21885.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21885.json index 68c9f06b82d..14ba354504d 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21885.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21885.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21885", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-01-18T00:15:16.417", - "lastModified": "2023-01-25T14:24:11.263", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-08T09:15:11.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,10 @@ } ], "references": [ + { + "url": "https://security.gentoo.org/glsa/202310-07", + "source": "secalert_us@oracle.com" + }, { "url": "https://www.oracle.com/security-alerts/cpujan2023.html", "source": "secalert_us@oracle.com", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21886.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21886.json index 14457292efd..a78a085a4e9 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21886.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21886.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21886", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-01-18T00:15:16.487", - "lastModified": "2023-01-25T14:24:33.667", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-08T09:15:11.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,10 @@ } ], "references": [ + { + "url": "https://security.gentoo.org/glsa/202310-07", + "source": "secalert_us@oracle.com" + }, { "url": "https://www.oracle.com/security-alerts/cpujan2023.html", "source": "secalert_us@oracle.com", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21889.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21889.json index 7cebaf53065..28b5bb59af9 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21889.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21889.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21889", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-01-18T00:15:16.687", - "lastModified": "2023-01-25T14:26:50.847", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-08T09:15:11.483", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,10 @@ } ], "references": [ + { + "url": "https://security.gentoo.org/glsa/202310-07", + "source": "secalert_us@oracle.com" + }, { "url": "https://www.oracle.com/security-alerts/cpujan2023.html", "source": "secalert_us@oracle.com", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21898.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21898.json index f34f29e3249..b74e3877cc7 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21898.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21898.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21898", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-01-18T00:15:17.190", - "lastModified": "2023-01-25T14:28:30.310", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-08T09:15:11.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,10 @@ } ], "references": [ + { + "url": "https://security.gentoo.org/glsa/202310-07", + "source": "secalert_us@oracle.com" + }, { "url": "https://www.oracle.com/security-alerts/cpujan2023.html", "source": "secalert_us@oracle.com", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21899.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21899.json index 290d1b7efd8..532220a048d 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21899.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21899.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21899", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-01-18T00:15:17.253", - "lastModified": "2023-01-25T14:28:40.757", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-08T09:15:11.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,10 @@ } ], "references": [ + { + "url": "https://security.gentoo.org/glsa/202310-07", + "source": "secalert_us@oracle.com" + }, { "url": "https://www.oracle.com/security-alerts/cpujan2023.html", "source": "secalert_us@oracle.com", diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31124.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31124.json index 4bbed7d533c..576b5c378b0 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31124.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31124.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31124", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-25T22:15:09.680", - "lastModified": "2023-06-20T17:31:01.297", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-08T09:15:11.727", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -56,7 +56,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security-advisories@github.com", "type": "Primary", "description": [ { @@ -66,7 +66,7 @@ ] }, { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { @@ -144,6 +144,10 @@ "Mailing List", "Third Party Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-09", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31130.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31130.json index fa30d7477d6..5d787e68c10 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31130.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31130.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31130", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-25T22:15:09.760", - "lastModified": "2023-06-26T22:15:09.840", + "lastModified": "2023-10-08T09:15:11.833", "vulnStatus": "Modified", "descriptions": [ { @@ -149,6 +149,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202310-09", + "source": "security-advisories@github.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5419", "source": "security-advisories@github.com" diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31147.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31147.json index 60907509c12..25d694f50d6 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31147.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31147.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31147", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-25T22:15:09.833", - "lastModified": "2023-06-02T17:44:21.927", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-08T09:15:11.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -56,7 +56,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security-advisories@github.com", "type": "Primary", "description": [ { @@ -66,7 +66,7 @@ ] }, { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { @@ -144,6 +144,10 @@ "Mailing List", "Third Party Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-09", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32067.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32067.json index eae832c77be..68cb8336861 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32067.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32067.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32067", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-25T23:15:09.380", - "lastModified": "2023-06-26T22:15:09.937", + "lastModified": "2023-10-08T09:15:12.030", "vulnStatus": "Modified", "descriptions": [ { @@ -149,6 +149,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202310-09", + "source": "security-advisories@github.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5419", "source": "security-advisories@github.com" diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32570.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32570.json index 7caa0f599f4..8b039653318 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32570.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32570.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32570", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T05:15:12.190", - "lastModified": "2023-07-08T03:15:09.343", + "lastModified": "2023-10-08T08:15:53.050", "vulnStatus": "Modified", "descriptions": [ { @@ -86,6 +86,10 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LXZ6CUNJFDJLCFOZHY2TIGMCAEITLCRP/", "source": "cve@mitre.org" + }, + { + "url": "https://security.gentoo.org/glsa/202310-05", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 98d14d0e1c3..44b9475a8cc 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-10-08T06:00:24.384523+00:00 +2023-10-08T10:00:24.917564+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-10-08T04:15:57.893000+00:00 +2023-10-08T09:15:12.030000+00:00 ``` ### Last Data Feed Release @@ -34,38 +34,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `24` +Recently added CVEs: `0` -* [CVE-2023-40631](CVE-2023/CVE-2023-406xx/CVE-2023-40631.json) (`2023-10-08T04:15:55.547`) -* [CVE-2023-40632](CVE-2023/CVE-2023-406xx/CVE-2023-40632.json) (`2023-10-08T04:15:56.397`) -* [CVE-2023-40633](CVE-2023/CVE-2023-406xx/CVE-2023-40633.json) (`2023-10-08T04:15:56.483`) -* [CVE-2023-40634](CVE-2023/CVE-2023-406xx/CVE-2023-40634.json) (`2023-10-08T04:15:56.553`) -* [CVE-2023-40635](CVE-2023/CVE-2023-406xx/CVE-2023-40635.json) (`2023-10-08T04:15:56.630`) -* [CVE-2023-40636](CVE-2023/CVE-2023-406xx/CVE-2023-40636.json) (`2023-10-08T04:15:56.700`) -* [CVE-2023-40637](CVE-2023/CVE-2023-406xx/CVE-2023-40637.json) (`2023-10-08T04:15:56.773`) -* [CVE-2023-40638](CVE-2023/CVE-2023-406xx/CVE-2023-40638.json) (`2023-10-08T04:15:56.833`) -* [CVE-2023-40639](CVE-2023/CVE-2023-406xx/CVE-2023-40639.json) (`2023-10-08T04:15:56.897`) -* [CVE-2023-40640](CVE-2023/CVE-2023-406xx/CVE-2023-40640.json) (`2023-10-08T04:15:56.957`) -* [CVE-2023-40641](CVE-2023/CVE-2023-406xx/CVE-2023-40641.json) (`2023-10-08T04:15:57.027`) -* [CVE-2023-40642](CVE-2023/CVE-2023-406xx/CVE-2023-40642.json) (`2023-10-08T04:15:57.087`) -* [CVE-2023-40643](CVE-2023/CVE-2023-406xx/CVE-2023-40643.json) (`2023-10-08T04:15:57.147`) -* [CVE-2023-40644](CVE-2023/CVE-2023-406xx/CVE-2023-40644.json) (`2023-10-08T04:15:57.207`) -* [CVE-2023-40645](CVE-2023/CVE-2023-406xx/CVE-2023-40645.json) (`2023-10-08T04:15:57.270`) -* [CVE-2023-40646](CVE-2023/CVE-2023-406xx/CVE-2023-40646.json) (`2023-10-08T04:15:57.347`) -* [CVE-2023-40647](CVE-2023/CVE-2023-406xx/CVE-2023-40647.json) (`2023-10-08T04:15:57.423`) -* [CVE-2023-40648](CVE-2023/CVE-2023-406xx/CVE-2023-40648.json) (`2023-10-08T04:15:57.493`) -* [CVE-2023-40649](CVE-2023/CVE-2023-406xx/CVE-2023-40649.json) (`2023-10-08T04:15:57.563`) -* [CVE-2023-40650](CVE-2023/CVE-2023-406xx/CVE-2023-40650.json) (`2023-10-08T04:15:57.627`) -* [CVE-2023-40651](CVE-2023/CVE-2023-406xx/CVE-2023-40651.json) (`2023-10-08T04:15:57.693`) -* [CVE-2023-40652](CVE-2023/CVE-2023-406xx/CVE-2023-40652.json) (`2023-10-08T04:15:57.770`) -* [CVE-2023-40653](CVE-2023/CVE-2023-406xx/CVE-2023-40653.json) (`2023-10-08T04:15:57.827`) -* [CVE-2023-40654](CVE-2023/CVE-2023-406xx/CVE-2023-40654.json) (`2023-10-08T04:15:57.893`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `20` +* [CVE-2018-25078](CVE-2018/CVE-2018-250xx/CVE-2018-25078.json) (`2023-10-08T09:15:10.143`) +* [CVE-2019-14870](CVE-2019/CVE-2019-148xx/CVE-2019-14870.json) (`2023-10-08T09:15:10.253`) +* [CVE-2021-44758](CVE-2021/CVE-2021-447xx/CVE-2021-44758.json) (`2023-10-08T09:15:10.480`) +* [CVE-2022-3437](CVE-2022/CVE-2022-34xx/CVE-2022-3437.json) (`2023-10-08T09:15:10.573`) +* [CVE-2022-3671](CVE-2022/CVE-2022-36xx/CVE-2022-3671.json) (`2023-10-08T09:15:10.677`) +* [CVE-2022-41916](CVE-2022/CVE-2022-419xx/CVE-2022-41916.json) (`2023-10-08T09:15:10.810`) +* [CVE-2022-42898](CVE-2022/CVE-2022-428xx/CVE-2022-42898.json) (`2023-10-08T09:15:10.937`) +* [CVE-2022-44640](CVE-2022/CVE-2022-446xx/CVE-2022-44640.json) (`2023-10-08T09:15:11.017`) +* [CVE-2022-45142](CVE-2022/CVE-2022-451xx/CVE-2022-45142.json) (`2023-10-08T09:15:11.120`) +* [CVE-2023-32570](CVE-2023/CVE-2023-325xx/CVE-2023-32570.json) (`2023-10-08T08:15:53.050`) +* [CVE-2023-21884](CVE-2023/CVE-2023-218xx/CVE-2023-21884.json) (`2023-10-08T09:15:11.217`) +* [CVE-2023-21885](CVE-2023/CVE-2023-218xx/CVE-2023-21885.json) (`2023-10-08T09:15:11.323`) +* [CVE-2023-21886](CVE-2023/CVE-2023-218xx/CVE-2023-21886.json) (`2023-10-08T09:15:11.400`) +* [CVE-2023-21889](CVE-2023/CVE-2023-218xx/CVE-2023-21889.json) (`2023-10-08T09:15:11.483`) +* [CVE-2023-21898](CVE-2023/CVE-2023-218xx/CVE-2023-21898.json) (`2023-10-08T09:15:11.560`) +* [CVE-2023-21899](CVE-2023/CVE-2023-218xx/CVE-2023-21899.json) (`2023-10-08T09:15:11.637`) +* [CVE-2023-31124](CVE-2023/CVE-2023-311xx/CVE-2023-31124.json) (`2023-10-08T09:15:11.727`) +* [CVE-2023-31130](CVE-2023/CVE-2023-311xx/CVE-2023-31130.json) (`2023-10-08T09:15:11.833`) +* [CVE-2023-31147](CVE-2023/CVE-2023-311xx/CVE-2023-31147.json) (`2023-10-08T09:15:11.940`) +* [CVE-2023-32067](CVE-2023/CVE-2023-320xx/CVE-2023-32067.json) (`2023-10-08T09:15:12.030`) ## Download and Usage