From 5acad1d74292338ca723d395ba55c3494be34a99 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 1 Oct 2023 04:00:28 +0000 Subject: [PATCH] Auto-Update: 2023-10-01T04:00:25.355123+00:00 --- CVE-2022/CVE-2022-49xx/CVE-2022-4956.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43712.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43713.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43714.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43715.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43716.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43717.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43718.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43719.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43720.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43721.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43722.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43723.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43724.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43725.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43726.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43727.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43728.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43729.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43730.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43731.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43732.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43733.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43734.json | 4 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43735.json | 4 +-- CVE-2023/CVE-2023-439xx/CVE-2023-43907.json | 4 +-- CVE-2023/CVE-2023-444xx/CVE-2023-44488.json | 4 +-- CVE-2023/CVE-2023-51xx/CVE-2023-5111.json | 4 +-- CVE-2023/CVE-2023-51xx/CVE-2023-5112.json | 4 +-- CVE-2023/CVE-2023-52xx/CVE-2023-5207.json | 8 +++-- CVE-2023/CVE-2023-52xx/CVE-2023-5217.json | 6 +++- CVE-2023/CVE-2023-52xx/CVE-2023-5298.json | 8 +++-- CVE-2023/CVE-2023-53xx/CVE-2023-5300.json | 8 +++-- CVE-2023/CVE-2023-53xx/CVE-2023-5301.json | 8 +++-- CVE-2023/CVE-2023-53xx/CVE-2023-5302.json | 8 +++-- CVE-2023/CVE-2023-53xx/CVE-2023-5303.json | 4 +-- CVE-2023/CVE-2023-53xx/CVE-2023-5304.json | 4 +-- CVE-2023/CVE-2023-53xx/CVE-2023-5305.json | 4 +-- CVE-2023/CVE-2023-53xx/CVE-2023-5313.json | 4 +-- CVE-2023/CVE-2023-53xx/CVE-2023-5321.json | 4 +-- CVE-2023/CVE-2023-53xx/CVE-2023-5323.json | 4 +-- README.md | 37 ++++++++++++++++----- 42 files changed, 134 insertions(+), 89 deletions(-) diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4956.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4956.json index 20c95ef9b9e..485dc23d718 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4956.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4956.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4956", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-30T17:15:39.323", - "lastModified": "2023-09-30T17:15:39.323", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43712.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43712.json index b7fc6fa1e0f..c41f610332a 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43712.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43712.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43712", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T21:15:09.850", - "lastModified": "2023-09-30T21:15:09.850", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43713.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43713.json index 6ce75e3b2bd..637e040e8e4 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43713.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43713.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43713", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T21:15:09.947", - "lastModified": "2023-09-30T21:15:09.947", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43714.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43714.json index dc47f2a6cfd..4d3c227423b 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43714.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43714.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43714", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T21:15:10.010", - "lastModified": "2023-09-30T21:15:10.010", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43715.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43715.json index 827846aab3e..c19cd138a62 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43715.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43715.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43715", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T21:15:10.077", - "lastModified": "2023-09-30T21:15:10.077", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43716.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43716.json index 38cf29a4b97..b91ec7d5209 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43716.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43716.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43716", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T21:15:10.140", - "lastModified": "2023-09-30T21:15:10.140", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43717.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43717.json index e125f1921d4..3e5c2f9404b 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43717.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43717.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43717", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:10.347", - "lastModified": "2023-09-30T22:15:10.347", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43718.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43718.json index 9fe5aec5567..815642315e3 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43718.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43718.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43718", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:10.410", - "lastModified": "2023-09-30T22:15:10.410", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43719.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43719.json index ae800c60af0..02f3ce499cb 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43719.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43719.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43719", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:10.467", - "lastModified": "2023-09-30T22:15:10.467", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43720.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43720.json index 99be3afe3d5..aa929e429cd 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43720.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43720.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43720", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:10.533", - "lastModified": "2023-09-30T22:15:10.533", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43721.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43721.json index 076cdf54cc7..812e472fad8 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43721.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43721.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43721", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:10.597", - "lastModified": "2023-09-30T22:15:10.597", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43722.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43722.json index 0ae2f51d555..ae2070634ca 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43722.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43722.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43722", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:10.657", - "lastModified": "2023-09-30T22:15:10.657", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43723.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43723.json index 0dba9a51cf3..6087c3e9e1a 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43723.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43723.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43723", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:10.717", - "lastModified": "2023-09-30T22:15:10.717", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43724.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43724.json index 8bafdaf38b9..9cb702ca7b9 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43724.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43724.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43724", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:10.777", - "lastModified": "2023-09-30T22:15:10.777", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43725.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43725.json index 2781d540eaa..c095af0fe97 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43725.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43725.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43725", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:10.843", - "lastModified": "2023-09-30T22:15:10.843", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43726.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43726.json index ec515600bfb..96da2ee4d73 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43726.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43726.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43726", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:10.903", - "lastModified": "2023-09-30T22:15:10.903", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43727.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43727.json index 048c7c86803..fa5ba7f957a 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43727.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43727.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43727", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:10.967", - "lastModified": "2023-09-30T22:15:10.967", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43728.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43728.json index 55b16e7ea61..d0d8b750c55 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43728.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43728.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43728", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:11.027", - "lastModified": "2023-09-30T22:15:11.027", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43729.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43729.json index 222db303c62..1a4a6742461 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43729.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43729.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43729", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:11.097", - "lastModified": "2023-09-30T22:15:11.097", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43730.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43730.json index 7570be874ac..e4710407544 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43730.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43730.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43730", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:11.163", - "lastModified": "2023-09-30T22:15:11.163", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43731.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43731.json index f282c92a0ba..a47a7fc87d6 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43731.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43731.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43731", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T22:15:11.227", - "lastModified": "2023-09-30T22:15:11.227", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43732.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43732.json index 5f632efa7a2..856f48bde7c 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43732.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43732.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43732", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T23:15:40.127", - "lastModified": "2023-09-30T23:15:40.127", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43733.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43733.json index 3946fb7eb0a..d811f2785c7 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43733.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43733.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43733", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T23:15:40.203", - "lastModified": "2023-09-30T23:15:40.203", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43734.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43734.json index 89e3a5ec4ed..ce7f8c22d64 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43734.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43734.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43734", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T23:15:40.260", - "lastModified": "2023-09-30T23:15:40.260", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43735.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43735.json index a649b7c4b7f..5e694e877ce 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43735.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43735.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43735", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T23:15:40.320", - "lastModified": "2023-09-30T23:15:40.320", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-439xx/CVE-2023-43907.json b/CVE-2023/CVE-2023-439xx/CVE-2023-43907.json index 91a112a49f8..8b419eb6cbe 100644 --- a/CVE-2023/CVE-2023-439xx/CVE-2023-43907.json +++ b/CVE-2023/CVE-2023-439xx/CVE-2023-43907.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43907", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-01T01:15:24.947", - "lastModified": "2023-10-01T01:15:24.947", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44488.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44488.json index eb79cbe1643..05199b27236 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44488.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44488.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44488", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-30T20:15:10.200", - "lastModified": "2023-10-01T00:15:09.803", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5111.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5111.json index 7b11802121b..c2a3376a6e7 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5111.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5111.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5111", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T23:15:40.377", - "lastModified": "2023-09-30T23:15:40.377", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5112.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5112.json index ed8aa36b9b0..9c22dacaa50 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5112.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5112.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5112", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-09-30T23:15:40.433", - "lastModified": "2023-09-30T23:15:40.433", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5207.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5207.json index 3e1e2fabde6..d099664e08d 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5207.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5207.json @@ -2,12 +2,16 @@ "id": "CVE-2023-5207", "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-30T09:15:14.933", - "lastModified": "2023-09-30T09:15:14.933", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in GitLab CE and EE affecting all versions starting 16.0 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. An authenticated attacker could perform arbitrary pipeline execution under the context of another user." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad en GitLab CE y EE que afecta a todas las versiones desde 16.0 anteriores a 16.2.8, 16.3 anteriores a 16.3.5 y 16.4 anteriores a 16.4.1. Un atacante autenticado podr\u00eda realizar una ejecuci\u00f3n del pipeline arbitrario en el contexto de otro usuario." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json index 5072f353f9e..ed1440a220f 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5217", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-28T16:15:10.980", - "lastModified": "2023-10-01T00:15:09.863", + "lastModified": "2023-10-01T03:15:09.517", "vulnStatus": "Modified", "descriptions": [ { @@ -175,6 +175,10 @@ "url": "http://www.openwall.com/lists/oss-security/2023/09/30/4", "source": "chrome-cve-admin@google.com" }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/30/5", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software/", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5298.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5298.json index ed78428a070..66fcd0ad53d 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5298.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5298.json @@ -2,12 +2,16 @@ "id": "CVE-2023-5298", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-30T06:15:11.483", - "lastModified": "2023-09-30T06:15:11.483", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tongda OA 2017. It has been rated as critical. Affected by this issue is some unknown functionality of the file general/hr/recruit/requirements/delete.php. The manipulation of the argument REQUIREMENTS_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-240938 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Tongda OA 2017 y ha sido calificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo general/hr/recruit/requirements/delete.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento REQUIREMENTS_ID conduce a la inyecci\u00f3n SQL. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 11.10 puede solucionar este problema. Se recomienda actualizar el componente afectado. VDB-240938 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5300.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5300.json index 8eb36253089..705907101f0 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5300.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5300.json @@ -2,12 +2,16 @@ "id": "CVE-2023-5300", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-30T10:15:10.517", - "lastModified": "2023-09-30T10:15:10.517", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in TTSPlanning up to 20230925. This affects an unknown part. The manipulation of the argument uid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240939." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en TTSPlanning hasta 20230925 y clasificada como cr\u00edtica. La manipulaci\u00f3n del argumento uid conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-240939." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5301.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5301.json index d7392a60baa..5c5fdba6e85 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5301.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5301.json @@ -2,12 +2,16 @@ "id": "CVE-2023-5301", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-30T11:15:15.333", - "lastModified": "2023-09-30T11:15:15.333", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in DedeCMS 5.7.111. This vulnerability affects the function AddMyAddon of the file album_add.php. The manipulation of the argument albumUploadFiles leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240940." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en DedeCMS 5.7.111 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n AddMyAddon del archivo album_add.php. La manipulaci\u00f3n del argumento albumUploadFiles conduce a la inyecci\u00f3n de comandos del sistema operativo. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-240940." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5302.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5302.json index 01c7a8b1f64..187e1c4b52b 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5302.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5302.json @@ -2,12 +2,16 @@ "id": "CVE-2023-5302", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-30T12:15:09.963", - "lastModified": "2023-09-30T12:15:09.963", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Best Courier Management System 1.0. This issue affects some unknown processing of the component Manage Account Page. The manipulation of the argument First Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240941 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Best Courier Management System 1.0. Este problema afecta a un procesamiento desconocido del componente Manage Account Page. La manipulaci\u00f3n del argumento First Name conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede usarse. El identificador VDB-240941 fue asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5303.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5303.json index 3dbcc647aba..8f483418f36 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5303.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5303.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5303", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-30T14:15:15.737", - "lastModified": "2023-09-30T14:15:15.737", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5304.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5304.json index a4383598eb3..a978f40ec93 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5304.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5304.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5304", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-30T15:15:10.180", - "lastModified": "2023-09-30T15:15:10.180", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5305.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5305.json index e23995855d1..7d83a470da5 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5305.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5305.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5305", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-30T15:15:10.260", - "lastModified": "2023-09-30T15:15:10.260", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5313.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5313.json index 888378bd9b2..946290132dc 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5313.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5313.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5313", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-30T15:15:10.337", - "lastModified": "2023-09-30T15:15:10.337", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5321.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5321.json index 950c7e9d8d3..4a5e07d5bc3 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5321.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5321.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5321", "sourceIdentifier": "security@huntr.dev", "published": "2023-09-30T14:15:15.843", - "lastModified": "2023-09-30T14:15:15.843", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5323.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5323.json index fb871c67063..8eb6ac000ce 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5323.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5323.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5323", "sourceIdentifier": "security@huntr.dev", "published": "2023-10-01T01:15:24.997", - "lastModified": "2023-10-01T01:15:24.997", - "vulnStatus": "Received", + "lastModified": "2023-10-01T03:02:09.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 7531336d584..61e3f407423 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-10-01T02:00:25.366534+00:00 +2023-10-01T04:00:25.355123+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-10-01T01:15:24.997000+00:00 +2023-10-01T03:15:09.517000+00:00 ``` ### Last Data Feed Release @@ -34,18 +34,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `0` -* [CVE-2023-43907](CVE-2023/CVE-2023-439xx/CVE-2023-43907.json) (`2023-10-01T01:15:24.947`) -* [CVE-2023-5323](CVE-2023/CVE-2023-53xx/CVE-2023-5323.json) (`2023-10-01T01:15:24.997`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `41` -* [CVE-2023-44488](CVE-2023/CVE-2023-444xx/CVE-2023-44488.json) (`2023-10-01T00:15:09.803`) -* [CVE-2023-5217](CVE-2023/CVE-2023-52xx/CVE-2023-5217.json) (`2023-10-01T00:15:09.863`) +* [CVE-2023-43716](CVE-2023/CVE-2023-437xx/CVE-2023-43716.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43717](CVE-2023/CVE-2023-437xx/CVE-2023-43717.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43718](CVE-2023/CVE-2023-437xx/CVE-2023-43718.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43719](CVE-2023/CVE-2023-437xx/CVE-2023-43719.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43720](CVE-2023/CVE-2023-437xx/CVE-2023-43720.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43721](CVE-2023/CVE-2023-437xx/CVE-2023-43721.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43722](CVE-2023/CVE-2023-437xx/CVE-2023-43722.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43723](CVE-2023/CVE-2023-437xx/CVE-2023-43723.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43724](CVE-2023/CVE-2023-437xx/CVE-2023-43724.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43725](CVE-2023/CVE-2023-437xx/CVE-2023-43725.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43726](CVE-2023/CVE-2023-437xx/CVE-2023-43726.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43727](CVE-2023/CVE-2023-437xx/CVE-2023-43727.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43728](CVE-2023/CVE-2023-437xx/CVE-2023-43728.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43729](CVE-2023/CVE-2023-437xx/CVE-2023-43729.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43730](CVE-2023/CVE-2023-437xx/CVE-2023-43730.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43731](CVE-2023/CVE-2023-437xx/CVE-2023-43731.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43732](CVE-2023/CVE-2023-437xx/CVE-2023-43732.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43733](CVE-2023/CVE-2023-437xx/CVE-2023-43733.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43734](CVE-2023/CVE-2023-437xx/CVE-2023-43734.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43735](CVE-2023/CVE-2023-437xx/CVE-2023-43735.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-5111](CVE-2023/CVE-2023-51xx/CVE-2023-5111.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-5112](CVE-2023/CVE-2023-51xx/CVE-2023-5112.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-43907](CVE-2023/CVE-2023-439xx/CVE-2023-43907.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-5323](CVE-2023/CVE-2023-53xx/CVE-2023-5323.json) (`2023-10-01T03:02:09.307`) +* [CVE-2023-5217](CVE-2023/CVE-2023-52xx/CVE-2023-5217.json) (`2023-10-01T03:15:09.517`) ## Download and Usage