From 46cf4f453d1d1bee1435dc2674fc0a7b001908a5 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 29 Aug 2023 04:00:28 +0000 Subject: [PATCH] Auto-Update: 2023-08-29T04:00:24.796220+00:00 --- CVE-2023/CVE-2023-06xx/CVE-2023-0664.json | 8 +-- CVE-2023/CVE-2023-19xx/CVE-2023-1995.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-31xx/CVE-2023-3180.json | 8 ++- CVE-2023/CVE-2023-33xx/CVE-2023-3354.json | 8 ++- CVE-2023/CVE-2023-402xx/CVE-2023-40251.json | 11 ++--- CVE-2023/CVE-2023-402xx/CVE-2023-40252.json | 11 ++--- CVE-2023/CVE-2023-402xx/CVE-2023-40253.json | 13 ++--- CVE-2023/CVE-2023-402xx/CVE-2023-40254.json | 13 ++--- README.md | 19 ++++--- 9 files changed, 103 insertions(+), 43 deletions(-) create mode 100644 CVE-2023/CVE-2023-19xx/CVE-2023-1995.json diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0664.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0664.json index 2d25081198a..07d7a74407d 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0664.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0664.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0664", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-29T20:15:07.347", - "lastModified": "2023-05-17T20:15:09.687", + "lastModified": "2023-08-29T03:15:07.567", "vulnStatus": "Modified", "descriptions": [ { @@ -86,7 +86,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -112,7 +111,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -152,6 +150,10 @@ "Patch" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/", + "source": "secalert@redhat.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEOC7SRJWLZSXCND2ADFW6C76ZMTZLE4/", "source": "secalert@redhat.com" diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1995.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1995.json new file mode 100644 index 00000000000..c5d556c7ed0 --- /dev/null +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1995.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-1995", + "sourceIdentifier": "hirt@hitachi.co.jp", + "published": "2023-08-29T02:15:07.837", + "lastModified": "2023-08-29T02:15:07.837", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient Logging vulnerability in Hitachi HiRDB Server, HiRDB Server With Addtional Function, HiRDB Structured Data Access Facility.This issue affects HiRDB Server: before 09-60-39, before 09-65-23, before 10-01-10, before 10-03-12, before 10-04-06, before 10-05-06, before 10-06-02; HiRDB Server With Addtional Function: before 09-60-2M, before 09-65-/W; HiRDB Structured Data Access Facility: before 09-60-39, before 10-03-12, before 10-04-06, before 10-06-02.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "hirt@hitachi.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "hirt@hitachi.co.jp", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-778" + } + ] + } + ], + "references": [ + { + "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-133/index.html", + "source": "hirt@hitachi.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3180.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3180.json index 98fe2761214..ca6784b8cd3 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3180.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3180.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3180", "sourceIdentifier": "secalert@redhat.com", "published": "2023-08-03T15:15:29.960", - "lastModified": "2023-08-08T16:16:06.530", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-29T03:15:08.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -99,6 +99,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3354.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3354.json index 9b5331d338c..8f34313dfdc 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3354.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3354.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3354", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-11T17:15:13.387", - "lastModified": "2023-07-20T12:58:14.863", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-29T03:15:08.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -133,6 +133,10 @@ "Issue Tracking", "Patch" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40251.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40251.json index 8dc0a8460eb..737718a7370 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40251.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40251.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40251", "sourceIdentifier": "vuln@krcert.or.kr", "published": "2023-08-17T07:15:43.737", - "lastModified": "2023-08-23T14:43:45.137", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-29T02:15:08.277", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -121,11 +121,8 @@ ], "references": [ { - "url": "https://www.genians.co.kr/notice/2023", - "source": "vuln@krcert.or.kr", - "tags": [ - "Vendor Advisory" - ] + "url": "https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html", + "source": "vuln@krcert.or.kr" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40252.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40252.json index f4677304de4..c9b2df31731 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40252.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40252.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40252", "sourceIdentifier": "vuln@krcert.or.kr", "published": "2023-08-17T07:15:43.847", - "lastModified": "2023-08-23T15:13:24.897", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-29T02:15:08.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -121,11 +121,8 @@ ], "references": [ { - "url": "https://www.genians.co.kr/notice/2023", - "source": "vuln@krcert.or.kr", - "tags": [ - "Vendor Advisory" - ] + "url": "https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html", + "source": "vuln@krcert.or.kr" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40253.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40253.json index 02b47115da5..cf8e70af518 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40253.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40253.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40253", "sourceIdentifier": "vuln@krcert.or.kr", "published": "2023-08-11T06:15:10.673", - "lastModified": "2023-08-23T00:02:47.657", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-29T02:15:08.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -71,7 +71,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-78" } ] } @@ -121,11 +121,8 @@ ], "references": [ { - "url": "https://www.genians.co.kr/notice/2023", - "source": "vuln@krcert.or.kr", - "tags": [ - "Vendor Advisory" - ] + "url": "https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html", + "source": "vuln@krcert.or.kr" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40254.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40254.json index afc7eeae514..033847f874a 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40254.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40254.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40254", "sourceIdentifier": "vuln@krcert.or.kr", "published": "2023-08-11T07:15:09.423", - "lastModified": "2023-08-23T00:03:06.927", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-29T02:15:08.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -71,7 +71,7 @@ "description": [ { "lang": "en", - "value": "CWE-494" + "value": "CWE-89" } ] } @@ -121,11 +121,8 @@ ], "references": [ { - "url": "https://www.genians.co.kr/notice/2023", - "source": "vuln@krcert.or.kr", - "tags": [ - "Vendor Advisory" - ] + "url": "https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html", + "source": "vuln@krcert.or.kr" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 06a3b84e93b..6f9a1ffd99e 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-29T02:00:24.842621+00:00 +2023-08-29T04:00:24.796220+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-29T00:15:07.593000+00:00 +2023-08-29T03:15:08.197000+00:00 ``` ### Last Data Feed Release @@ -29,20 +29,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -223590 +223591 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `1` +* [CVE-2023-1995](CVE-2023/CVE-2023-19xx/CVE-2023-1995.json) (`2023-08-29T02:15:07.837`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `7` -* [CVE-2023-28980](CVE-2023/CVE-2023-289xx/CVE-2023-28980.json) (`2023-08-29T00:15:07.593`) +* [CVE-2023-40251](CVE-2023/CVE-2023-402xx/CVE-2023-40251.json) (`2023-08-29T02:15:08.277`) +* [CVE-2023-40252](CVE-2023/CVE-2023-402xx/CVE-2023-40252.json) (`2023-08-29T02:15:08.503`) +* [CVE-2023-40253](CVE-2023/CVE-2023-402xx/CVE-2023-40253.json) (`2023-08-29T02:15:08.610`) +* [CVE-2023-40254](CVE-2023/CVE-2023-402xx/CVE-2023-40254.json) (`2023-08-29T02:15:08.737`) +* [CVE-2023-0664](CVE-2023/CVE-2023-06xx/CVE-2023-0664.json) (`2023-08-29T03:15:07.567`) +* [CVE-2023-3180](CVE-2023/CVE-2023-31xx/CVE-2023-3180.json) (`2023-08-29T03:15:08.083`) +* [CVE-2023-3354](CVE-2023/CVE-2023-33xx/CVE-2023-3354.json) (`2023-08-29T03:15:08.197`) ## Download and Usage