From 3f6b2bffde4917591afab13159f5bae2292df584 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 28 Sep 2023 14:00:28 +0000 Subject: [PATCH] Auto-Update: 2023-09-28T14:00:24.814526+00:00 --- CVE-2023/CVE-2023-261xx/CVE-2023-26145.json | 4 +- CVE-2023/CVE-2023-261xx/CVE-2023-26149.json | 4 +- CVE-2023/CVE-2023-339xx/CVE-2023-33972.json | 4 +- CVE-2023/CVE-2023-388xx/CVE-2023-38870.json | 4 +- CVE-2023/CVE-2023-388xx/CVE-2023-38871.json | 4 +- CVE-2023/CVE-2023-388xx/CVE-2023-38872.json | 4 +- CVE-2023/CVE-2023-388xx/CVE-2023-38873.json | 4 +- CVE-2023/CVE-2023-388xx/CVE-2023-38874.json | 4 +- CVE-2023/CVE-2023-388xx/CVE-2023-38877.json | 4 +- CVE-2023/CVE-2023-400xx/CVE-2023-40026.json | 4 +- CVE-2023/CVE-2023-406xx/CVE-2023-40604.json | 47 +++++++++++++- CVE-2023/CVE-2023-406xx/CVE-2023-40605.json | 47 +++++++++++++- CVE-2023/CVE-2023-40xx/CVE-2023-4066.json | 4 +- CVE-2023/CVE-2023-410xx/CVE-2023-41079.json | 69 +++++++++++++++++++-- CVE-2023/CVE-2023-412xx/CVE-2023-41241.json | 47 +++++++++++++- CVE-2023/CVE-2023-414xx/CVE-2023-41444.json | 4 +- CVE-2023/CVE-2023-414xx/CVE-2023-41445.json | 4 +- CVE-2023/CVE-2023-414xx/CVE-2023-41446.json | 4 +- CVE-2023/CVE-2023-414xx/CVE-2023-41447.json | 4 +- CVE-2023/CVE-2023-414xx/CVE-2023-41448.json | 4 +- CVE-2023/CVE-2023-414xx/CVE-2023-41449.json | 4 +- CVE-2023/CVE-2023-414xx/CVE-2023-41450.json | 4 +- CVE-2023/CVE-2023-414xx/CVE-2023-41451.json | 4 +- CVE-2023/CVE-2023-414xx/CVE-2023-41452.json | 4 +- CVE-2023/CVE-2023-414xx/CVE-2023-41453.json | 4 +- CVE-2023/CVE-2023-422xx/CVE-2023-42222.json | 4 +- CVE-2023/CVE-2023-428xx/CVE-2023-42818.json | 4 +- CVE-2023/CVE-2023-431xx/CVE-2023-43191.json | 4 +- CVE-2023/CVE-2023-431xx/CVE-2023-43192.json | 4 +- CVE-2023/CVE-2023-432xx/CVE-2023-43233.json | 4 +- CVE-2023/CVE-2023-433xx/CVE-2023-43314.json | 4 +- CVE-2023/CVE-2023-433xx/CVE-2023-43320.json | 4 +- CVE-2023/CVE-2023-436xx/CVE-2023-43650.json | 4 +- CVE-2023/CVE-2023-436xx/CVE-2023-43651.json | 4 +- CVE-2023/CVE-2023-436xx/CVE-2023-43652.json | 4 +- CVE-2023/CVE-2023-436xx/CVE-2023-43656.json | 4 +- CVE-2023/CVE-2023-436xx/CVE-2023-43660.json | 4 +- CVE-2023/CVE-2023-438xx/CVE-2023-43869.json | 24 +++++++ CVE-2023/CVE-2023-440xx/CVE-2023-44047.json | 4 +- CVE-2023/CVE-2023-440xx/CVE-2023-44048.json | 4 +- CVE-2023/CVE-2023-440xx/CVE-2023-44080.json | 4 +- CVE-2023/CVE-2023-442xx/CVE-2023-44273.json | 4 +- CVE-2023/CVE-2023-442xx/CVE-2023-44275.json | 4 +- CVE-2023/CVE-2023-442xx/CVE-2023-44276.json | 4 +- CVE-2023/CVE-2023-45xx/CVE-2023-4523.json | 4 +- CVE-2023/CVE-2023-48xx/CVE-2023-4863.json | 6 +- CVE-2023/CVE-2023-52xx/CVE-2023-5230.json | 4 +- CVE-2023/CVE-2023-52xx/CVE-2023-5232.json | 4 +- CVE-2023/CVE-2023-52xx/CVE-2023-5233.json | 4 +- CVE-2023/CVE-2023-52xx/CVE-2023-5244.json | 4 +- README.md | 39 +++++++++--- 51 files changed, 345 insertions(+), 110 deletions(-) create mode 100644 CVE-2023/CVE-2023-438xx/CVE-2023-43869.json diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26145.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26145.json index baf7c5325a5..ad7206b68f7 100644 --- a/CVE-2023/CVE-2023-261xx/CVE-2023-26145.json +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26145.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26145", "sourceIdentifier": "report@snyk.io", "published": "2023-09-28T05:15:45.843", - "lastModified": "2023-09-28T05:15:45.843", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26149.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26149.json index bab12c0bcd3..1590debddc2 100644 --- a/CVE-2023/CVE-2023-261xx/CVE-2023-26149.json +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26149.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26149", "sourceIdentifier": "report@snyk.io", "published": "2023-09-28T05:15:46.023", - "lastModified": "2023-09-28T05:15:46.023", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-339xx/CVE-2023-33972.json b/CVE-2023/CVE-2023-339xx/CVE-2023-33972.json index 58b17f62dd7..7a8864dc43b 100644 --- a/CVE-2023/CVE-2023-339xx/CVE-2023-33972.json +++ b/CVE-2023/CVE-2023-339xx/CVE-2023-33972.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33972", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-27T19:15:11.497", - "lastModified": "2023-09-27T19:15:11.497", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:18.717", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38870.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38870.json index 523ce54f3b6..8b23e37b956 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38870.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38870.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38870", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T04:15:11.893", - "lastModified": "2023-09-28T04:15:11.893", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38871.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38871.json index c7155bb37b9..162d56a1fa6 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38871.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38871.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38871", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T04:15:12.003", - "lastModified": "2023-09-28T04:15:12.003", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38872.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38872.json index 6bee2da3332..6856f244106 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38872.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38872.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38872", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T04:15:12.067", - "lastModified": "2023-09-28T04:15:12.067", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38873.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38873.json index 3ec8e14c390..ac4933afe5b 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38873.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38873.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38873", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T04:15:12.123", - "lastModified": "2023-09-28T04:15:12.123", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38874.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38874.json index 59ec41babe4..e27a4a0f56f 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38874.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38874.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38874", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T04:15:12.223", - "lastModified": "2023-09-28T04:15:12.223", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38877.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38877.json index b4c2de87709..8aad002c05f 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38877.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38877.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38877", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T04:15:12.280", - "lastModified": "2023-09-28T04:15:12.280", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40026.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40026.json index 7399e7597ed..06cc06f051f 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40026.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40026.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40026", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-27T21:15:09.713", - "lastModified": "2023-09-27T21:15:09.713", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40604.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40604.json index 414523b092d..e283a4d85fe 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40604.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40604.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40604", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-27T15:19:20.223", - "lastModified": "2023-09-27T15:41:47.123", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-28T13:37:57.513", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jesmadsen:cookies_by_jm:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "FB2DEAA0-2EAC-4085-8327-FC73F255559B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/cookies-by-jm/wordpress-cookies-by-jm-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40605.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40605.json index c459c033ded..1a5c6f91e73 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40605.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40605.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40605", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-27T15:19:20.697", - "lastModified": "2023-09-27T15:41:47.123", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-28T13:29:56.727", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:93digital:typing_effect:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.6", + "matchCriteriaId": "F127DC86-DBB0-4176-8C90-9A433C43B34E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/animated-typing-effect/wordpress-typing-effect-plugin-1-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4066.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4066.json index 311b3c85114..d12df016145 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4066.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4066.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4066", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-27T21:15:10.550", - "lastModified": "2023-09-27T21:15:10.550", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41079.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41079.json index cf1c3692589..6267041b144 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41079.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41079.json @@ -2,19 +2,80 @@ "id": "CVE-2023-41079", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:26.773", - "lastModified": "2023-09-27T15:41:07.967", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-28T13:18:16.230", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved permissions logic. This issue is fixed in macOS Sonoma 14. An app may be able to bypass Privacy preferences." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con una l\u00f3gica de permisos mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14. Es posible que una aplicaci\u00f3n pueda saltarse los ajustes de Privacidad." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0", + "matchCriteriaId": "7A5DD3D5-FB4F-4313-B873-DCED87FC4605" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/HT213940", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41241.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41241.json index 558bc331c0d..38f6d341f88 100644 --- a/CVE-2023/CVE-2023-412xx/CVE-2023-41241.json +++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41241.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41241", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-27T15:19:28.200", - "lastModified": "2023-09-27T15:41:47.123", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-28T13:48:59.413", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:surecart:surecart:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.5.0", + "matchCriteriaId": "861CE0E7-0A07-43B3-8FF1-F9E9C925083F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/surecart/wordpress-surecart-plugin-2-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-414xx/CVE-2023-41444.json b/CVE-2023/CVE-2023-414xx/CVE-2023-41444.json index 51e7ce10c54..b3b88e52a5c 100644 --- a/CVE-2023/CVE-2023-414xx/CVE-2023-41444.json +++ b/CVE-2023/CVE-2023-414xx/CVE-2023-41444.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41444", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T03:15:11.193", - "lastModified": "2023-09-28T03:15:11.193", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-414xx/CVE-2023-41445.json b/CVE-2023/CVE-2023-414xx/CVE-2023-41445.json index 4235722e7e6..63802ea3c16 100644 --- a/CVE-2023/CVE-2023-414xx/CVE-2023-41445.json +++ b/CVE-2023/CVE-2023-414xx/CVE-2023-41445.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41445", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T23:15:10.150", - "lastModified": "2023-09-27T23:15:10.150", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-414xx/CVE-2023-41446.json b/CVE-2023/CVE-2023-414xx/CVE-2023-41446.json index 1369e9e7245..05e808849b9 100644 --- a/CVE-2023/CVE-2023-414xx/CVE-2023-41446.json +++ b/CVE-2023/CVE-2023-414xx/CVE-2023-41446.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41446", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T03:15:11.387", - "lastModified": "2023-09-28T03:15:11.387", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-414xx/CVE-2023-41447.json b/CVE-2023/CVE-2023-414xx/CVE-2023-41447.json index de9e8de0f30..f9fd95a1705 100644 --- a/CVE-2023/CVE-2023-414xx/CVE-2023-41447.json +++ b/CVE-2023/CVE-2023-414xx/CVE-2023-41447.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41447", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T03:15:11.480", - "lastModified": "2023-09-28T03:15:11.480", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-414xx/CVE-2023-41448.json b/CVE-2023/CVE-2023-414xx/CVE-2023-41448.json index 4555b2c6b69..f15c7bf8e60 100644 --- a/CVE-2023/CVE-2023-414xx/CVE-2023-41448.json +++ b/CVE-2023/CVE-2023-414xx/CVE-2023-41448.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41448", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T23:15:11.667", - "lastModified": "2023-09-27T23:15:11.667", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-414xx/CVE-2023-41449.json b/CVE-2023/CVE-2023-414xx/CVE-2023-41449.json index 01d7fa9903d..e14099372a9 100644 --- a/CVE-2023/CVE-2023-414xx/CVE-2023-41449.json +++ b/CVE-2023/CVE-2023-414xx/CVE-2023-41449.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41449", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T23:15:11.730", - "lastModified": "2023-09-27T23:15:11.730", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-414xx/CVE-2023-41450.json b/CVE-2023/CVE-2023-414xx/CVE-2023-41450.json index f90771b296a..2334aab1c20 100644 --- a/CVE-2023/CVE-2023-414xx/CVE-2023-41450.json +++ b/CVE-2023/CVE-2023-414xx/CVE-2023-41450.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41450", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T03:15:11.563", - "lastModified": "2023-09-28T03:15:11.563", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-414xx/CVE-2023-41451.json b/CVE-2023/CVE-2023-414xx/CVE-2023-41451.json index 66d63658e02..74c78a35bb5 100644 --- a/CVE-2023/CVE-2023-414xx/CVE-2023-41451.json +++ b/CVE-2023/CVE-2023-414xx/CVE-2023-41451.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41451", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T23:15:11.787", - "lastModified": "2023-09-27T23:15:11.787", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-414xx/CVE-2023-41452.json b/CVE-2023/CVE-2023-414xx/CVE-2023-41452.json index a7825130062..76596dbec0e 100644 --- a/CVE-2023/CVE-2023-414xx/CVE-2023-41452.json +++ b/CVE-2023/CVE-2023-414xx/CVE-2023-41452.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41452", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T23:15:11.843", - "lastModified": "2023-09-27T23:15:11.843", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-414xx/CVE-2023-41453.json b/CVE-2023/CVE-2023-414xx/CVE-2023-41453.json index c5082e90d1b..17319f05dd8 100644 --- a/CVE-2023/CVE-2023-414xx/CVE-2023-41453.json +++ b/CVE-2023/CVE-2023-414xx/CVE-2023-41453.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41453", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T23:15:11.900", - "lastModified": "2023-09-27T23:15:11.900", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42222.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42222.json index 839dae09118..0c4c3f022be 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42222.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42222.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42222", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T03:15:11.643", - "lastModified": "2023-09-28T03:15:11.643", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42818.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42818.json index e34bfed1a20..d8db2ba4e06 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42818.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42818.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42818", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-27T21:15:10.173", - "lastModified": "2023-09-27T21:15:10.173", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43191.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43191.json index 60d39891170..a96207a5119 100644 --- a/CVE-2023/CVE-2023-431xx/CVE-2023-43191.json +++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43191.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43191", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T23:15:11.960", - "lastModified": "2023-09-27T23:15:11.960", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43192.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43192.json index fc03d19662f..25671b512ea 100644 --- a/CVE-2023/CVE-2023-431xx/CVE-2023-43192.json +++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43192.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43192", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T22:15:09.700", - "lastModified": "2023-09-27T22:15:09.700", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-432xx/CVE-2023-43233.json b/CVE-2023/CVE-2023-432xx/CVE-2023-43233.json index 821ce118b09..db3eb17ef44 100644 --- a/CVE-2023/CVE-2023-432xx/CVE-2023-43233.json +++ b/CVE-2023/CVE-2023-432xx/CVE-2023-43233.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43233", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T23:15:12.007", - "lastModified": "2023-09-27T23:15:12.007", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43314.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43314.json index 29eefa3de2c..c2cf5777c09 100644 --- a/CVE-2023/CVE-2023-433xx/CVE-2023-43314.json +++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43314.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43314", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T23:15:12.057", - "lastModified": "2023-09-27T23:15:12.057", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43320.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43320.json index 61dae8e8581..ad3e41bd512 100644 --- a/CVE-2023/CVE-2023-433xx/CVE-2023-43320.json +++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43320.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43320", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T23:15:12.113", - "lastModified": "2023-09-27T23:15:12.113", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43650.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43650.json index 587f9777b26..3c02ec75c85 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43650.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43650.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43650", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-27T19:15:11.927", - "lastModified": "2023-09-27T19:15:11.927", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:18.717", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43651.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43651.json index d145c1f89c5..9e436021605 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43651.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43651.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43651", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-27T21:15:10.347", - "lastModified": "2023-09-27T21:15:10.347", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43652.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43652.json index c1bd4f527a3..b8df6a3db13 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43652.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43652.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43652", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-27T19:15:12.133", - "lastModified": "2023-09-27T19:15:12.133", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:18.717", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43656.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43656.json index c0724f62a4d..36a8965778a 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43656.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43656.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43656", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-27T21:15:10.443", - "lastModified": "2023-09-27T21:15:10.443", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43660.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43660.json index b6dc45ffe8c..c9c1f593413 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43660.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43660.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43660", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-27T22:15:10.730", - "lastModified": "2023-09-27T22:15:10.730", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43869.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43869.json new file mode 100644 index 00000000000..dcc090b9223 --- /dev/null +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43869.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-43869", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-09-28T13:15:09.850", + "lastModified": "2023-09-28T13:15:09.850", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard56 Function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-440xx/CVE-2023-44047.json b/CVE-2023/CVE-2023-440xx/CVE-2023-44047.json index f56df5efe4d..db031e610e1 100644 --- a/CVE-2023/CVE-2023-440xx/CVE-2023-44047.json +++ b/CVE-2023/CVE-2023-440xx/CVE-2023-44047.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44047", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T20:15:09.850", - "lastModified": "2023-09-27T22:15:11.283", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-440xx/CVE-2023-44048.json b/CVE-2023/CVE-2023-440xx/CVE-2023-44048.json index e370a16ba30..e2ad2a0c6dc 100644 --- a/CVE-2023/CVE-2023-440xx/CVE-2023-44048.json +++ b/CVE-2023/CVE-2023-440xx/CVE-2023-44048.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44048", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T20:15:13.493", - "lastModified": "2023-09-27T22:15:11.513", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-440xx/CVE-2023-44080.json b/CVE-2023/CVE-2023-440xx/CVE-2023-44080.json index 8537685c4b6..5fb45a6ca68 100644 --- a/CVE-2023/CVE-2023-440xx/CVE-2023-44080.json +++ b/CVE-2023/CVE-2023-440xx/CVE-2023-44080.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44080", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T22:15:11.783", - "lastModified": "2023-09-27T22:15:11.783", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:13.510", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44273.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44273.json index a3d48070aec..663a06be8c6 100644 --- a/CVE-2023/CVE-2023-442xx/CVE-2023-44273.json +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44273.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44273", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T04:15:12.493", - "lastModified": "2023-09-28T04:15:12.493", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44275.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44275.json index 65cda2ee5b4..985c3ea62db 100644 --- a/CVE-2023/CVE-2023-442xx/CVE-2023-44275.json +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44275.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44275", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T05:15:46.243", - "lastModified": "2023-09-28T05:15:46.243", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44276.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44276.json index 26fd58f7331..b8872bdf496 100644 --- a/CVE-2023/CVE-2023-442xx/CVE-2023-44276.json +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44276.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44276", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T05:15:46.290", - "lastModified": "2023-09-28T05:15:46.290", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4523.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4523.json index 17466cf7ec6..bac22739d1b 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4523.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4523.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4523", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-09-27T19:15:12.373", - "lastModified": "2023-09-27T19:15:12.373", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:18.717", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json index d19a13049ea..661092d2fd7 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4863", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-12T15:15:24.327", - "lastModified": "2023-09-27T20:15:14.377", + "lastModified": "2023-09-28T12:15:09.650", "vulnStatus": "Modified", "cisaExploitAdd": "2023-09-13", "cisaActionDue": "2023-10-04", @@ -237,6 +237,10 @@ "url": "http://www.openwall.com/lists/oss-security/2023/09/26/7", "source": "chrome-cve-admin@google.com" }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/28/1", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/", "source": "chrome-cve-admin@google.com", diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5230.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5230.json index fc407ef0962..6fec58bce89 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5230.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5230.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5230", "sourceIdentifier": "security@wordfence.com", "published": "2023-09-28T05:15:46.337", - "lastModified": "2023-09-28T05:15:46.337", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5232.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5232.json index a48cc85cff8..1cc5bc0fd25 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5232.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5232.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5232", "sourceIdentifier": "security@wordfence.com", "published": "2023-09-28T05:15:46.437", - "lastModified": "2023-09-28T05:15:46.437", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5233.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5233.json index 13613fdb755..f692909f84b 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5233.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5233.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5233", "sourceIdentifier": "security@wordfence.com", "published": "2023-09-28T05:15:46.513", - "lastModified": "2023-09-28T05:15:46.513", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5244.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5244.json index eaee6b0c366..18ce9fbd516 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5244.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5244.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5244", "sourceIdentifier": "security@huntr.dev", "published": "2023-09-28T01:15:09.060", - "lastModified": "2023-09-28T01:15:09.060", - "vulnStatus": "Received", + "lastModified": "2023-09-28T12:44:04.973", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 229f2c17466..572a517dd52 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-09-28T12:00:25.473751+00:00 +2023-09-28T14:00:24.814526+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-09-28T09:15:12.857000+00:00 +2023-09-28T13:48:59.413000+00:00 ``` ### Last Data Feed Release @@ -29,22 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -226502 +226503 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `1` +* [CVE-2023-43869](CVE-2023/CVE-2023-438xx/CVE-2023-43869.json) (`2023-09-28T13:15:09.850`) ### CVEs modified in the last Commit -Recently modified CVEs: `3` +Recently modified CVEs: `49` -* [CVE-2022-29599](CVE-2022/CVE-2022-295xx/CVE-2022-29599.json) (`2023-09-28T09:15:11.267`) -* [CVE-2023-33934](CVE-2023/CVE-2023-339xx/CVE-2023-33934.json) (`2023-09-28T09:15:12.597`) -* [CVE-2023-44154](CVE-2023/CVE-2023-441xx/CVE-2023-44154.json) (`2023-09-28T09:15:12.857`) +* [CVE-2023-42818](CVE-2023/CVE-2023-428xx/CVE-2023-42818.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-43651](CVE-2023/CVE-2023-436xx/CVE-2023-43651.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-43656](CVE-2023/CVE-2023-436xx/CVE-2023-43656.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-4066](CVE-2023/CVE-2023-40xx/CVE-2023-4066.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-43192](CVE-2023/CVE-2023-431xx/CVE-2023-43192.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-43660](CVE-2023/CVE-2023-436xx/CVE-2023-43660.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-44080](CVE-2023/CVE-2023-440xx/CVE-2023-44080.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-41445](CVE-2023/CVE-2023-414xx/CVE-2023-41445.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-41448](CVE-2023/CVE-2023-414xx/CVE-2023-41448.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-41449](CVE-2023/CVE-2023-414xx/CVE-2023-41449.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-41451](CVE-2023/CVE-2023-414xx/CVE-2023-41451.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-41452](CVE-2023/CVE-2023-414xx/CVE-2023-41452.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-41453](CVE-2023/CVE-2023-414xx/CVE-2023-41453.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-43191](CVE-2023/CVE-2023-431xx/CVE-2023-43191.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-43233](CVE-2023/CVE-2023-432xx/CVE-2023-43233.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-43314](CVE-2023/CVE-2023-433xx/CVE-2023-43314.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-43320](CVE-2023/CVE-2023-433xx/CVE-2023-43320.json) (`2023-09-28T12:44:13.510`) +* [CVE-2023-33972](CVE-2023/CVE-2023-339xx/CVE-2023-33972.json) (`2023-09-28T12:44:18.717`) +* [CVE-2023-43650](CVE-2023/CVE-2023-436xx/CVE-2023-43650.json) (`2023-09-28T12:44:18.717`) +* [CVE-2023-43652](CVE-2023/CVE-2023-436xx/CVE-2023-43652.json) (`2023-09-28T12:44:18.717`) +* [CVE-2023-4523](CVE-2023/CVE-2023-45xx/CVE-2023-4523.json) (`2023-09-28T12:44:18.717`) +* [CVE-2023-41079](CVE-2023/CVE-2023-410xx/CVE-2023-41079.json) (`2023-09-28T13:18:16.230`) +* [CVE-2023-40605](CVE-2023/CVE-2023-406xx/CVE-2023-40605.json) (`2023-09-28T13:29:56.727`) +* [CVE-2023-40604](CVE-2023/CVE-2023-406xx/CVE-2023-40604.json) (`2023-09-28T13:37:57.513`) +* [CVE-2023-41241](CVE-2023/CVE-2023-412xx/CVE-2023-41241.json) (`2023-09-28T13:48:59.413`) ## Download and Usage