diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2429.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2429.json new file mode 100644 index 00000000000..a75b1b9017f --- /dev/null +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2429.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-2429", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-04-30T03:15:08.750", + "lastModified": "2023-04-30T03:15:08.750", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.13." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/thorsten/phpmyfaq/commit/07552f5577ff8b1e6f7cdefafcce9b2a744d3a24", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/20d3a0b3-2693-4bf1-b196-10741201a540", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26924.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26924.json index 8330977cf23..5e4995f9d0e 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26924.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26924.json @@ -2,12 +2,12 @@ "id": "CVE-2023-26924", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-27T22:15:21.967", - "lastModified": "2023-04-03T18:34:23.743", - "vulnStatus": "Analyzed", + "lastModified": "2023-04-30T02:15:11.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "LLVM a0dab4950 has a segmentation fault in mlir::outlineSingleBlockRegion." + "value": "** DISPUTED ** LLVM a0dab4950 has a segmentation fault in mlir::outlineSingleBlockRegion. NOTE: third parties dispute this because the LLVM security policy excludes \"Language front-ends ... for which a malicious input file can cause undesirable behavior.\"" } ], "metrics": { @@ -79,6 +79,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://llvm.org/docs/Security.html#what-is-considered-a-security-issue", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/README.md b/README.md index d1c34ea14ef..715262efc89 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-04-30T02:00:24.526947+00:00 +2023-04-30T04:00:24.429657+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-04-30T01:15:09.493000+00:00 +2023-04-30T03:15:08.750000+00:00 ``` ### Last Data Feed Release @@ -29,20 +29,21 @@ Download and Changelog: [Click](releases/latest) ### Total Number of included CVEs ```plain -213835 +213836 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -* [CVE-2023-2428](CVE-2023/CVE-2023-24xx/CVE-2023-2428.json) (`2023-04-30T01:15:09.493`) +* [CVE-2023-2429](CVE-2023/CVE-2023-24xx/CVE-2023-2429.json) (`2023-04-30T03:15:08.750`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +* [CVE-2023-26924](CVE-2023/CVE-2023-269xx/CVE-2023-26924.json) (`2023-04-30T02:15:11.430`) ## Download and Usage