Auto-Update: 2023-10-11T12:00:25.741739+00:00

This commit is contained in:
cad-safe-bot 2023-10-11 12:00:29 +00:00
parent 025eee83d3
commit 5147259a3c
21 changed files with 253 additions and 73 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43551",
"sourceIdentifier": "support@hackerone.com",
"published": "2022-12-23T15:15:15.777",
"lastModified": "2023-04-27T15:15:09.903",
"vulnStatus": "Modified",
"lastModified": "2023-10-11T11:15:09.723",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -107,6 +107,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
"source": "support@hackerone.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43552",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-02-09T20:15:10.950",
"lastModified": "2023-03-28T05:15:08.013",
"vulnStatus": "Modified",
"lastModified": "2023-10-11T11:15:10.070",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -88,6 +88,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230214-0002/",
"source": "support@hackerone.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23914",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-02-23T20:15:13.637",
"lastModified": "2023-03-09T19:15:11.020",
"vulnStatus": "Modified",
"lastModified": "2023-10-11T11:15:10.340",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -84,6 +84,10 @@
"Issue Tracking"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230309-0006/",
"source": "support@hackerone.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23915",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-02-23T20:15:13.703",
"lastModified": "2023-03-09T19:15:11.417",
"vulnStatus": "Modified",
"lastModified": "2023-10-11T11:15:10.793",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -83,6 +83,10 @@
"Not Applicable"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230309-0006/",
"source": "support@hackerone.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23916",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-02-23T20:15:13.777",
"lastModified": "2023-04-18T16:49:14.370",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-11T11:15:10.960",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -58,7 +58,6 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -76,7 +75,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -92,7 +90,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -221,7 +218,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -262,6 +258,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230309-0006/",
"source": "support@hackerone.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27533",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-03-30T20:15:07.373",
"lastModified": "2023-04-21T23:15:19.880",
"vulnStatus": "Modified",
"lastModified": "2023-10-11T11:15:11.197",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -92,6 +92,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/",
"source": "support@hackerone.com"
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230420-0011/",
"source": "support@hackerone.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27534",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-03-30T20:15:07.427",
"lastModified": "2023-04-20T09:15:09.820",
"vulnStatus": "Modified",
"lastModified": "2023-10-11T11:15:11.447",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -88,6 +88,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/",
"source": "support@hackerone.com"
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230420-0012/",
"source": "support@hackerone.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27535",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-03-30T20:15:07.483",
"lastModified": "2023-06-29T19:29:03.043",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-11T11:15:11.530",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -58,7 +58,6 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -76,7 +75,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -92,7 +90,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -108,7 +105,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -262,6 +258,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
"source": "support@hackerone.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27536",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-03-30T20:15:07.547",
"lastModified": "2023-06-06T20:34:24.683",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-11T11:15:11.643",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -58,7 +58,6 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -76,7 +75,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -92,7 +90,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -108,7 +105,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -232,7 +228,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -273,6 +268,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
"source": "support@hackerone.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27537",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-03-30T20:15:07.617",
"lastModified": "2023-04-20T09:15:10.027",
"vulnStatus": "Modified",
"lastModified": "2023-10-11T11:15:11.753",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -87,6 +87,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
"source": "support@hackerone.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27538",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-03-30T20:15:07.677",
"lastModified": "2023-04-21T23:15:20.127",
"vulnStatus": "Modified",
"lastModified": "2023-10-11T11:15:11.977",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -103,6 +103,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html",
"source": "support@hackerone.com"
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
"source": "support@hackerone.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28319",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-05-26T21:15:10.020",
"lastModified": "2023-08-02T16:47:10.673",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-11T11:15:12.140",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -58,7 +58,6 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -75,7 +74,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -107,7 +105,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -267,6 +264,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
"source": "support@hackerone.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28320",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-05-26T21:15:15.937",
"lastModified": "2023-08-02T16:46:55.257",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-11T11:15:12.517",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -62,7 +62,6 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -79,7 +78,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -111,7 +109,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -271,6 +268,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
"source": "support@hackerone.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28321",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-05-26T21:15:16.020",
"lastModified": "2023-08-02T16:46:39.470",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-11T11:15:12.713",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -58,7 +58,6 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -75,7 +74,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -96,7 +94,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -225,7 +222,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -304,6 +300,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
"source": "support@hackerone.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28322",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-05-26T21:15:16.153",
"lastModified": "2023-08-02T16:46:27.513",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-11T11:15:12.940",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -58,7 +58,6 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -75,7 +74,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -96,7 +94,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -128,7 +125,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -304,6 +300,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
"source": "support@hackerone.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38039",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-09-15T04:15:10.127",
"lastModified": "2023-09-27T15:18:55.227",
"vulnStatus": "Modified",
"lastModified": "2023-10-11T11:15:13.127",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -109,6 +109,10 @@
"tags": [
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-44093",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T11:15:13.423",
"lastModified": "2023-10-11T11:15:13.423",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of package names' public keys not being verified in the security module.Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
"source": "psirt@huawei.com"
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-44094",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T11:15:13.577",
"lastModified": "2023-10-11T11:15:13.577",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
"source": "psirt@huawei.com"
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-44096",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T11:15:13.833",
"lastModified": "2023-10-11T11:15:13.833",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": " Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
"source": "psirt@huawei.com"
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-44109",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T11:15:14.120",
"lastModified": "2023-10-11T11:15:14.120",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Clone vulnerability in the huks ta module.Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
"source": "psirt@huawei.com"
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
"source": "psirt@huawei.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-10-11T10:00:25.885887+00:00
2023-10-11T12:00:25.741739+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-10-11T09:15:10.773000+00:00
2023-10-11T11:15:14.120000+00:00
```
### Last Data Feed Release
@ -29,28 +29,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
227533
227537
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `4`
* [CVE-2023-44997](CVE-2023/CVE-2023-449xx/CVE-2023-44997.json) (`2023-10-11T08:15:08.883`)
* [CVE-2023-4990](CVE-2023/CVE-2023-49xx/CVE-2023-4990.json) (`2023-10-11T08:15:09.053`)
* [CVE-2023-42138](CVE-2023/CVE-2023-421xx/CVE-2023-42138.json) (`2023-10-11T09:15:10.417`)
* [CVE-2023-44093](CVE-2023/CVE-2023-440xx/CVE-2023-44093.json) (`2023-10-11T11:15:13.423`)
* [CVE-2023-44094](CVE-2023/CVE-2023-440xx/CVE-2023-44094.json) (`2023-10-11T11:15:13.577`)
* [CVE-2023-44096](CVE-2023/CVE-2023-440xx/CVE-2023-44096.json) (`2023-10-11T11:15:13.833`)
* [CVE-2023-44109](CVE-2023/CVE-2023-441xx/CVE-2023-44109.json) (`2023-10-11T11:15:14.120`)
### CVEs modified in the last Commit
Recently modified CVEs: `6`
Recently modified CVEs: `16`
* [CVE-2023-2718](CVE-2023/CVE-2023-27xx/CVE-2023-2718.json) (`2023-10-11T09:15:09.813`)
* [CVE-2023-3134](CVE-2023/CVE-2023-31xx/CVE-2023-3134.json) (`2023-10-11T09:15:10.097`)
* [CVE-2023-3575](CVE-2023/CVE-2023-35xx/CVE-2023-3575.json) (`2023-10-11T09:15:10.320`)
* [CVE-2023-5391](CVE-2023/CVE-2023-53xx/CVE-2023-5391.json) (`2023-10-11T09:15:10.483`)
* [CVE-2023-5399](CVE-2023/CVE-2023-53xx/CVE-2023-5399.json) (`2023-10-11T09:15:10.597`)
* [CVE-2023-5402](CVE-2023/CVE-2023-54xx/CVE-2023-5402.json) (`2023-10-11T09:15:10.773`)
* [CVE-2022-43551](CVE-2022/CVE-2022-435xx/CVE-2022-43551.json) (`2023-10-11T11:15:09.723`)
* [CVE-2022-43552](CVE-2022/CVE-2022-435xx/CVE-2022-43552.json) (`2023-10-11T11:15:10.070`)
* [CVE-2023-23914](CVE-2023/CVE-2023-239xx/CVE-2023-23914.json) (`2023-10-11T11:15:10.340`)
* [CVE-2023-23915](CVE-2023/CVE-2023-239xx/CVE-2023-23915.json) (`2023-10-11T11:15:10.793`)
* [CVE-2023-23916](CVE-2023/CVE-2023-239xx/CVE-2023-23916.json) (`2023-10-11T11:15:10.960`)
* [CVE-2023-27533](CVE-2023/CVE-2023-275xx/CVE-2023-27533.json) (`2023-10-11T11:15:11.197`)
* [CVE-2023-27534](CVE-2023/CVE-2023-275xx/CVE-2023-27534.json) (`2023-10-11T11:15:11.447`)
* [CVE-2023-27535](CVE-2023/CVE-2023-275xx/CVE-2023-27535.json) (`2023-10-11T11:15:11.530`)
* [CVE-2023-27536](CVE-2023/CVE-2023-275xx/CVE-2023-27536.json) (`2023-10-11T11:15:11.643`)
* [CVE-2023-27537](CVE-2023/CVE-2023-275xx/CVE-2023-27537.json) (`2023-10-11T11:15:11.753`)
* [CVE-2023-27538](CVE-2023/CVE-2023-275xx/CVE-2023-27538.json) (`2023-10-11T11:15:11.977`)
* [CVE-2023-28319](CVE-2023/CVE-2023-283xx/CVE-2023-28319.json) (`2023-10-11T11:15:12.140`)
* [CVE-2023-28320](CVE-2023/CVE-2023-283xx/CVE-2023-28320.json) (`2023-10-11T11:15:12.517`)
* [CVE-2023-28321](CVE-2023/CVE-2023-283xx/CVE-2023-28321.json) (`2023-10-11T11:15:12.713`)
* [CVE-2023-28322](CVE-2023/CVE-2023-283xx/CVE-2023-28322.json) (`2023-10-11T11:15:12.940`)
* [CVE-2023-38039](CVE-2023/CVE-2023-380xx/CVE-2023-38039.json) (`2023-10-11T11:15:13.127`)
## Download and Usage