From 311f507fb0f69319c1fa78826e1e2ff015d760a7 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 9 Dec 2023 19:00:21 +0000 Subject: [PATCH] Auto-Update: 2023-12-09T19:00:18.081663+00:00 --- CVE-2023/CVE-2023-369xx/CVE-2023-36922.json | 6 +++--- CVE-2023/CVE-2023-418xx/CVE-2023-41835.json | 8 ++++++-- README.md | 21 ++++++--------------- 3 files changed, 15 insertions(+), 20 deletions(-) diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36922.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36922.json index 2538a38ac6a..9701cd00b84 100644 --- a/CVE-2023/CVE-2023-369xx/CVE-2023-36922.json +++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36922.json @@ -2,12 +2,12 @@ "id": "CVE-2023-36922", "sourceIdentifier": "cna@sap.com", "published": "2023-07-11T03:15:10.357", - "lastModified": "2023-07-18T18:28:08.627", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-09T17:15:44.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Due to programming error in function module or report, SAP NetWeaver ABAP (IS-OIL) - versions 600, 602, 603, 604, 605, 606, 617, 618, 800, 802, 803, 804, 805, 806, 807, allows an authenticated attacker to\u00a0inject an arbitrary operating system command into an unprotected parameter in a common (default) extension.\u00a0\u00a0On successful exploitation, the attacker can read or modify the system data as well as shut down the system.\n\n" + "value": "Due to programming error in function module and report, IS-OIL component in SAP ECC and SAP S/4HANA allows an authenticated attacker to inject an arbitrary operating system command into an unprotected parameter in a common (default) extension. \u00a0On successful exploitation, the attacker can read or modify the system data as well as shut down the system.\n\n" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-418xx/CVE-2023-41835.json b/CVE-2023/CVE-2023-418xx/CVE-2023-41835.json index 4a23c967cac..79265f5e1a6 100644 --- a/CVE-2023/CVE-2023-418xx/CVE-2023-41835.json +++ b/CVE-2023/CVE-2023-418xx/CVE-2023-41835.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41835", "sourceIdentifier": "security@apache.org", "published": "2023-12-05T09:15:07.093", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-09T18:15:06.723", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -28,6 +28,10 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2023/12/09/1", + "source": "security@apache.org" + }, { "url": "https://lists.apache.org/thread/6wj530kh3ono8phr642y9sqkl67ys2ft", "source": "security@apache.org" diff --git a/README.md b/README.md index 6cd08b65d43..3a8394140f7 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-09T09:00:19.872859+00:00 +2023-12-09T19:00:18.081663+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-09T08:15:06.787000+00:00 +2023-12-09T18:15:06.723000+00:00 ``` ### Last Data Feed Release @@ -34,25 +34,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `0` -* [CVE-2023-28868](CVE-2023/CVE-2023-288xx/CVE-2023-28868.json) (`2023-12-09T07:15:07.070`) -* [CVE-2023-28869](CVE-2023/CVE-2023-288xx/CVE-2023-28869.json) (`2023-12-09T07:15:07.263`) -* [CVE-2023-28870](CVE-2023/CVE-2023-288xx/CVE-2023-28870.json) (`2023-12-09T07:15:07.357`) -* [CVE-2023-28871](CVE-2023/CVE-2023-288xx/CVE-2023-28871.json) (`2023-12-09T07:15:07.430`) -* [CVE-2023-28873](CVE-2023/CVE-2023-288xx/CVE-2023-28873.json) (`2023-12-09T07:15:07.517`) -* [CVE-2023-28874](CVE-2023/CVE-2023-288xx/CVE-2023-28874.json) (`2023-12-09T07:15:07.593`) -* [CVE-2023-46932](CVE-2023/CVE-2023-469xx/CVE-2023-46932.json) (`2023-12-09T07:15:07.663`) -* [CVE-2023-5756](CVE-2023/CVE-2023-57xx/CVE-2023-5756.json) (`2023-12-09T07:15:07.733`) -* [CVE-2023-6120](CVE-2023/CVE-2023-61xx/CVE-2023-6120.json) (`2023-12-09T07:15:08.130`) -* [CVE-2023-47254](CVE-2023/CVE-2023-472xx/CVE-2023-47254.json) (`2023-12-09T08:15:06.787`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `2` -* [CVE-2023-6612](CVE-2023/CVE-2023-66xx/CVE-2023-6612.json) (`2023-12-09T07:15:08.440`) +* [CVE-2023-36922](CVE-2023/CVE-2023-369xx/CVE-2023-36922.json) (`2023-12-09T17:15:44.150`) +* [CVE-2023-41835](CVE-2023/CVE-2023-418xx/CVE-2023-41835.json) (`2023-12-09T18:15:06.723`) ## Download and Usage