diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40032.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40032.json index 8600db4fc5c..9870b68c100 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40032.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40032.json @@ -2,12 +2,16 @@ "id": "CVE-2023-40032", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-11T19:15:43.603", - "lastModified": "2023-09-15T14:49:31.397", - "vulnStatus": "Analyzed", + "lastModified": "2024-01-29T07:15:07.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "libvips is a demand-driven, horizontally threaded image processing library. A specially crafted SVG input can cause libvips versions 8.14.3 or earlier to segfault when attempting to parse a malformed UTF-8 character. Users should upgrade to libvips version 8.14.4 (or later) when processing untrusted input.\n" + }, + { + "lang": "es", + "value": "libvips es una librer\u00eda de procesamiento de im\u00e1genes con subprocesos horizontales y basada en la demanda. Una entrada SVG manipulada puede provocar que las versiones 8.14.3 o anteriores de libvips generen un error de segmentaci\u00f3n al intentar analizar un car\u00e1cter UTF-8 con formato incorrecto. Los usuarios deben actualizar a libvips versi\u00f3n 8.14.4 (o posterior) cuando procesen entradas que no sean de confianza." } ], "metrics": { @@ -108,6 +112,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YU2FFC47X2XDEGEHEWAGLU5L3R6FEYD2/", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48795.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48795.json index 529f713752f..5e6e4878003 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48795.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48795.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48795", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-18T16:15:10.897", - "lastModified": "2024-01-25T04:15:07.820", + "lastModified": "2024-01-29T07:15:07.890", "vulnStatus": "Modified", "descriptions": [ { @@ -1600,6 +1600,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/", "source": "cve@mitre.org" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json index 7a5206c51fa..3f09a90431c 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5981", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-28T12:15:07.040", - "lastModified": "2024-01-25T18:15:08.577", + "lastModified": "2024-01-29T07:15:08.760", "vulnStatus": "Modified", "descriptions": [ { @@ -180,6 +180,10 @@ "Issue Tracking", "Vendor Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json index 263a78577d8..629971976b2 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0553", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-16T12:15:45.557", - "lastModified": "2024-01-25T18:15:08.780", + "lastModified": "2024-01-29T07:15:09.050", "vulnStatus": "Modified", "descriptions": [ { @@ -166,6 +166,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/", + "source": "secalert@redhat.com" + }, { "url": "https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json index cc2fc222905..76b8f17d849 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0567", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-16T14:15:48.527", - "lastModified": "2024-01-25T16:15:08.510", + "lastModified": "2024-01-29T07:15:09.337", "vulnStatus": "Modified", "descriptions": [ { @@ -133,6 +133,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/", + "source": "secalert@redhat.com" + }, { "url": "https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html", "source": "secalert@redhat.com", diff --git a/README.md b/README.md index 8857c72193f..e784596397f 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-29T07:00:24.726037+00:00 +2024-01-29T09:00:24.589595+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-29T06:15:07.307000+00:00 +2024-01-29T07:15:09.337000+00:00 ``` ### Last Data Feed Release @@ -40,9 +40,13 @@ Recently added CVEs: `0` ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `5` -* [CVE-2023-6816](CVE-2023/CVE-2023-68xx/CVE-2023-6816.json) (`2024-01-29T06:15:07.307`) +* [CVE-2023-40032](CVE-2023/CVE-2023-400xx/CVE-2023-40032.json) (`2024-01-29T07:15:07.510`) +* [CVE-2023-48795](CVE-2023/CVE-2023-487xx/CVE-2023-48795.json) (`2024-01-29T07:15:07.890`) +* [CVE-2023-5981](CVE-2023/CVE-2023-59xx/CVE-2023-5981.json) (`2024-01-29T07:15:08.760`) +* [CVE-2024-0553](CVE-2024/CVE-2024-05xx/CVE-2024-0553.json) (`2024-01-29T07:15:09.050`) +* [CVE-2024-0567](CVE-2024/CVE-2024-05xx/CVE-2024-0567.json) (`2024-01-29T07:15:09.337`) ## Download and Usage