diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28130.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28130.json index cf95e587ca4..07343ec8d51 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28130.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28130.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28130", "sourceIdentifier": "cve@checkpoint.com", "published": "2023-07-26T11:15:09.550", - "lastModified": "2023-07-30T14:15:09.780", + "lastModified": "2023-07-30T16:15:09.890", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -27,6 +27,10 @@ { "url": "https://pentests.nl/pentest-blog/cve-2023-28130-command-injection-in-check-point-gaia-portal/", "source": "cve@checkpoint.com" + }, + { + "url": "https://support.checkpoint.com/results/sk/sk181311", + "source": "cve@checkpoint.com" } ] } \ No newline at end of file diff --git a/README.md b/README.md index bed5165033b..6257a8d3e96 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-07-30T16:00:27.579162+00:00 +2023-07-30T18:00:29.606138+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-07-30T14:15:09.780000+00:00 +2023-07-30T16:15:09.890000+00:00 ``` ### Last Data Feed Release @@ -42,7 +42,7 @@ Recently added CVEs: `0` Recently modified CVEs: `1` -* [CVE-2023-28130](CVE-2023/CVE-2023-281xx/CVE-2023-28130.json) (`2023-07-30T14:15:09.780`) +* [CVE-2023-28130](CVE-2023/CVE-2023-281xx/CVE-2023-28130.json) (`2023-07-30T16:15:09.890`) ## Download and Usage