diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20593.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20593.json index 21d94a33e17..ad1a1cf3a08 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20593.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20593.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20593", "sourceIdentifier": "psirt@amd.com", "published": "2023-07-24T20:15:10.237", - "lastModified": "2023-07-27T21:15:10.260", + "lastModified": "2023-07-30T21:15:09.810", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -79,6 +79,14 @@ { "url": "https://www.debian.org/security/2023/dsa-5459", "source": "psirt@amd.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5461", + "source": "psirt@amd.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5462", + "source": "psirt@amd.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3390.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3390.json index 7e792ca82d0..57b13570c6a 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3390.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3390.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3390", "sourceIdentifier": "cve-coordination@google.com", "published": "2023-06-28T21:15:10.447", - "lastModified": "2023-07-06T21:32:34.897", - "vulnStatus": "Analyzed", + "lastModified": "2023-07-30T21:15:09.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -117,6 +117,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5461", + "source": "cve-coordination@google.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3610.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3610.json index 48c63a55f86..f07d2321980 100644 --- a/CVE-2023/CVE-2023-36xx/CVE-2023-3610.json +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3610.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3610", "sourceIdentifier": "cve-coordination@google.com", "published": "2023-07-21T21:15:11.820", - "lastModified": "2023-07-24T13:09:06.887", + "lastModified": "2023-07-30T21:15:10.047", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -54,6 +54,10 @@ { "url": "https://kernel.dance/4bedf9eee016286c835e3d8fa981ddece5338795", "source": "cve-coordination@google.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5461", + "source": "cve-coordination@google.com" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 6257a8d3e96..ba00727e4f4 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-07-30T18:00:29.606138+00:00 +2023-07-30T22:00:25.174937+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-07-30T16:15:09.890000+00:00 +2023-07-30T21:15:10.047000+00:00 ``` ### Last Data Feed Release @@ -40,9 +40,11 @@ Recently added CVEs: `0` ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `3` -* [CVE-2023-28130](CVE-2023/CVE-2023-281xx/CVE-2023-28130.json) (`2023-07-30T16:15:09.890`) +* [CVE-2023-20593](CVE-2023/CVE-2023-205xx/CVE-2023-20593.json) (`2023-07-30T21:15:09.810`) +* [CVE-2023-3390](CVE-2023/CVE-2023-33xx/CVE-2023-3390.json) (`2023-07-30T21:15:09.910`) +* [CVE-2023-3610](CVE-2023/CVE-2023-36xx/CVE-2023-3610.json) (`2023-07-30T21:15:10.047`) ## Download and Usage