diff --git a/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json b/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json index b242167d4c4..40733c3226f 100644 --- a/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json +++ b/CVE-2021/CVE-2021-31xx/CVE-2021-3156.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3156", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-26T21:15:12.987", - "lastModified": "2024-01-31T18:15:45.590", + "lastModified": "2024-02-04T09:15:08.010", "vulnStatus": "Modified", "cisaExploitAdd": "2022-04-06", "cisaActionDue": "2022-04-27", @@ -528,6 +528,10 @@ "Third Party Advisory" ] }, + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/3", + "source": "cve@mitre.org" + }, { "url": "http://www.openwall.com/lists/oss-security/2021/01/26/3", "source": "cve@mitre.org", diff --git a/CVE-2022/CVE-2022-33xx/CVE-2022-3358.json b/CVE-2022/CVE-2022-33xx/CVE-2022-3358.json index e4225494cf8..4ba03d0c25a 100644 --- a/CVE-2022/CVE-2022-33xx/CVE-2022-3358.json +++ b/CVE-2022/CVE-2022-33xx/CVE-2022-3358.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3358", "sourceIdentifier": "openssl-security@openssl.org", "published": "2022-10-11T15:15:10.233", - "lastModified": "2023-11-07T03:51:10.310", + "lastModified": "2024-02-04T09:15:08.427", "vulnStatus": "Modified", "descriptions": [ { @@ -81,6 +81,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20221028-0014/", "source": "openssl-security@openssl.org", diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39046.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39046.json index 4e4e8c35614..4be8474f6e7 100644 --- a/CVE-2022/CVE-2022-390xx/CVE-2022-39046.json +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39046.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39046", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-31T06:15:07.467", - "lastModified": "2024-01-31T18:15:45.807", + "lastModified": "2024-02-04T09:15:08.257", "vulnStatus": "Modified", "descriptions": [ { @@ -242,6 +242,10 @@ "url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html", "source": "cve@mitre.org" }, + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/3", + "source": "cve@mitre.org" + }, { "url": "http://www.openwall.com/lists/oss-security/2024/01/30/6", "source": "cve@mitre.org" diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4203.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4203.json index e2969555cf9..c488ce7ab50 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4203.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4203.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4203", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-02-24T15:15:11.980", - "lastModified": "2023-11-07T03:57:10.267", + "lastModified": "2024-02-04T09:15:08.533", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,10 @@ "Patch" ] }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://www.openssl.org/news/secadv/20230207.txt", "source": "openssl-security@openssl.org", diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4304.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4304.json index 61e6b6ff87f..cf5725db7bf 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4304.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4304.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4304", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-02-08T20:15:23.887", - "lastModified": "2023-11-07T03:57:29.653", + "lastModified": "2024-02-04T09:15:08.627", "vulnStatus": "Modified", "descriptions": [ { @@ -137,6 +137,10 @@ } ], "references": [ + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://www.openssl.org/news/secadv/20230207.txt", "source": "openssl-security@openssl.org", diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4450.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4450.json index 43b80950777..9cf20ef8ff9 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4450.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4450.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4450", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-02-08T20:15:23.973", - "lastModified": "2023-11-07T03:57:50.597", + "lastModified": "2024-02-04T09:15:08.733", "vulnStatus": "Modified", "descriptions": [ { @@ -113,6 +113,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://www.openssl.org/news/secadv/20230207.txt", "source": "openssl-security@openssl.org", diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0215.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0215.json index 44e691b15bc..5b20a0fcf43 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0215.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0215.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0215", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-02-08T20:15:24.107", - "lastModified": "2023-07-19T00:55:16.513", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-04T09:15:08.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -120,6 +120,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20230427-0007/", "source": "openssl-security@openssl.org", diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0216.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0216.json index 76c379c2edc..d670817d4e3 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0216.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0216.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0216", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-02-08T20:15:24.160", - "lastModified": "2023-11-07T03:59:51.950", + "lastModified": "2024-02-04T09:15:08.947", "vulnStatus": "Modified", "descriptions": [ { @@ -90,6 +90,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://www.openssl.org/news/secadv/20230207.txt", "source": "openssl-security@openssl.org", diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0217.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0217.json index 65f1db44997..e05af9f6f23 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0217.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0217.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0217", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-02-08T20:15:24.213", - "lastModified": "2023-11-07T03:59:52.100", + "lastModified": "2024-02-04T09:15:09.040", "vulnStatus": "Modified", "descriptions": [ { @@ -70,6 +70,10 @@ "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=23985bac83fd50c8e29431009302b5442f985096", "source": "openssl-security@openssl.org" }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://www.openssl.org/news/secadv/20230207.txt", "source": "openssl-security@openssl.org", diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0286.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0286.json index f0ce8b7a6fc..6e0cc533abf 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0286.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0286.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0286", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-02-08T20:15:24.267", - "lastModified": "2023-11-07T04:00:05.973", + "lastModified": "2024-02-04T09:15:09.113", "vulnStatus": "Modified", "descriptions": [ { @@ -169,6 +169,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://www.openssl.org/news/secadv/20230207.txt", "source": "openssl-security@openssl.org", diff --git a/CVE-2023/CVE-2023-04xx/CVE-2023-0401.json b/CVE-2023/CVE-2023-04xx/CVE-2023-0401.json index 0fb57830f30..f263edd8ff1 100644 --- a/CVE-2023/CVE-2023-04xx/CVE-2023-0401.json +++ b/CVE-2023/CVE-2023-04xx/CVE-2023-0401.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0401", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-02-08T20:15:24.323", - "lastModified": "2023-11-07T04:00:24.170", + "lastModified": "2024-02-04T09:15:09.223", "vulnStatus": "Modified", "descriptions": [ { @@ -90,6 +90,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://www.openssl.org/news/secadv/20230207.txt", "source": "openssl-security@openssl.org", diff --git a/CVE-2023/CVE-2023-04xx/CVE-2023-0464.json b/CVE-2023/CVE-2023-04xx/CVE-2023-0464.json index a574345c7f6..ce05231dece 100644 --- a/CVE-2023/CVE-2023-04xx/CVE-2023-0464.json +++ b/CVE-2023/CVE-2023-04xx/CVE-2023-0464.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0464", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-03-22T17:15:13.130", - "lastModified": "2023-11-09T13:15:07.340", + "lastModified": "2024-02-04T09:15:09.310", "vulnStatus": "Modified", "descriptions": [ { @@ -122,6 +122,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html", "source": "openssl-security@openssl.org" }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://www.couchbase.com/alerts/", "source": "openssl-security@openssl.org" diff --git a/CVE-2023/CVE-2023-04xx/CVE-2023-0465.json b/CVE-2023/CVE-2023-04xx/CVE-2023-0465.json index 1350e486f31..fb20b36c006 100644 --- a/CVE-2023/CVE-2023-04xx/CVE-2023-0465.json +++ b/CVE-2023/CVE-2023-04xx/CVE-2023-0465.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0465", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-03-28T15:15:06.820", - "lastModified": "2023-06-08T19:15:09.407", + "lastModified": "2024-02-04T09:15:09.430", "vulnStatus": "Modified", "descriptions": [ { @@ -87,6 +87,13 @@ } ], "references": [ + { + "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a", + "source": "openssl-security@openssl.org", + "tags": [ + "Broken Link" + ] + }, { "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb", "source": "openssl-security@openssl.org", @@ -115,6 +122,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html", "source": "openssl-security@openssl.org" }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20230414-0001/", "source": "openssl-security@openssl.org" diff --git a/CVE-2023/CVE-2023-04xx/CVE-2023-0466.json b/CVE-2023/CVE-2023-04xx/CVE-2023-0466.json index dc067a5555f..a33adbf7268 100644 --- a/CVE-2023/CVE-2023-04xx/CVE-2023-0466.json +++ b/CVE-2023/CVE-2023-04xx/CVE-2023-0466.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0466", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-03-28T15:15:06.880", - "lastModified": "2023-09-28T18:15:11.707", + "lastModified": "2024-02-04T09:15:09.540", "vulnStatus": "Modified", "descriptions": [ { @@ -126,6 +126,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html", "source": "openssl-security@openssl.org" }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20230414-0001/", "source": "openssl-security@openssl.org" diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2650.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2650.json index 4b350dfe824..8ca983cfa0d 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2650.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2650.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2650", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-05-30T14:15:09.683", - "lastModified": "2023-10-27T15:15:13.057", + "lastModified": "2024-02-04T09:15:09.643", "vulnStatus": "Modified", "descriptions": [ { @@ -160,6 +160,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20230703-0001/", "source": "openssl-security@openssl.org", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2975.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2975.json index 19a1717f88a..316d81572c8 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2975.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2975.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2975", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-07-14T12:15:09.023", - "lastModified": "2023-07-27T13:02:02.013", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-04T09:15:09.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -123,6 +123,10 @@ "Patch" ] }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20230725-0004/", "source": "openssl-security@openssl.org", diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3446.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3446.json index c0447bb9e29..a1dffa334c6 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3446.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3446.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3446", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-07-19T12:15:10.003", - "lastModified": "2023-10-03T15:48:00.240", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-04T09:15:09.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -159,6 +159,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20230803-0011/", "source": "openssl-security@openssl.org", diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3817.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3817.json index 657cb25a8b1..b60f4df3ed0 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3817.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3817.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3817", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-07-31T16:15:10.497", - "lastModified": "2023-11-06T19:15:09.120", + "lastModified": "2024-02-04T09:15:10.030", "vulnStatus": "Modified", "descriptions": [ { @@ -475,6 +475,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "source": "openssl-security@openssl.org" }, + { + "url": "https://security.gentoo.org/glsa/202402-08", + "source": "openssl-security@openssl.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20230818-0014/", "source": "openssl-security@openssl.org" diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5371.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5371.json index 322574a184b..a00eccd483a 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5371.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5371.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5371", "sourceIdentifier": "cve@gitlab.com", "published": "2023-10-04T17:15:10.437", - "lastModified": "2023-10-10T13:13:05.367", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-04T10:15:08.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -116,6 +116,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202402-09", + "source": "cve@gitlab.com" + }, { "url": "https://www.wireshark.org/security/wnpa-sec-2023-27.html", "source": "cve@gitlab.com", diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6174.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6174.json index b93c5cd781f..2d35dbe9013 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6174.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6174.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6174", "sourceIdentifier": "cve@gitlab.com", "published": "2023-11-16T12:15:07.240", - "lastModified": "2023-11-28T17:27:06.313", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-04T10:15:08.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -122,6 +122,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202402-09", + "source": "cve@gitlab.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5559", "source": "cve@gitlab.com", diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6246.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6246.json index 55878552dea..62ae945c6fc 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6246.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6246.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6246", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-31T14:15:48.420", - "lastModified": "2024-02-02T04:15:08.713", - "vulnStatus": "Modified", + "lastModified": "2024-02-04T10:15:08.490", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -123,6 +123,14 @@ "url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html", "source": "secalert@redhat.com" }, + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/3", + "source": "secalert@redhat.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/5", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6246", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json index 385e84fb019..82664e9376e 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6779", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-31T14:15:48.700", - "lastModified": "2024-02-02T04:15:08.813", + "lastModified": "2024-02-04T09:15:10.377", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ "url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html", "source": "secalert@redhat.com" }, + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/3", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6779", "source": "secalert@redhat.com" diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json index bdaba8cd45e..fe925c25655 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6780", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-31T14:15:48.917", - "lastModified": "2024-02-02T04:15:08.907", + "lastModified": "2024-02-04T09:15:10.487", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ "url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html", "source": "secalert@redhat.com" }, + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/3", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6780", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json index d71cb3c175a..6821f19aa96 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23222", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-23T01:15:11.500", - "lastModified": "2024-01-30T14:32:15.580", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-04T10:15:08.623", + "vulnStatus": "Modified", "cisaExploitAdd": "2024-01-23", "cisaActionDue": "2024-02-13", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -128,6 +128,10 @@ } ], "references": [ + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/6", + "source": "product-security@apple.com" + }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/27", "source": "product-security@apple.com", diff --git a/README.md b/README.md index 1413ab07829..0cc9af7813a 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-04T09:00:25.052527+00:00 +2024-02-04T11:00:25.048620+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-04T08:15:13.520000+00:00 +2024-02-04T10:15:08.623000+00:00 ``` ### Last Data Feed Release @@ -40,33 +40,32 @@ Recently added CVEs: `0` ### CVEs modified in the last Commit -Recently modified CVEs: `39` +Recently modified CVEs: `24` -* [CVE-2022-26361](CVE-2022/CVE-2022-263xx/CVE-2022-26361.json) (`2024-02-04T08:15:10.587`) -* [CVE-2022-27672](CVE-2022/CVE-2022-276xx/CVE-2022-27672.json) (`2024-02-04T08:15:10.667`) -* [CVE-2022-29900](CVE-2022/CVE-2022-299xx/CVE-2022-29900.json) (`2024-02-04T08:15:10.917`) -* [CVE-2022-29901](CVE-2022/CVE-2022-299xx/CVE-2022-29901.json) (`2024-02-04T08:15:11.163`) -* [CVE-2022-33746](CVE-2022/CVE-2022-337xx/CVE-2022-33746.json) (`2024-02-04T08:15:11.510`) -* [CVE-2022-33747](CVE-2022/CVE-2022-337xx/CVE-2022-33747.json) (`2024-02-04T08:15:11.717`) -* [CVE-2022-33748](CVE-2022/CVE-2022-337xx/CVE-2022-33748.json) (`2024-02-04T08:15:11.800`) -* [CVE-2022-33749](CVE-2022/CVE-2022-337xx/CVE-2022-33749.json) (`2024-02-04T08:15:11.900`) -* [CVE-2022-42309](CVE-2022/CVE-2022-423xx/CVE-2022-42309.json) (`2024-02-04T08:15:11.987`) -* [CVE-2022-42310](CVE-2022/CVE-2022-423xx/CVE-2022-42310.json) (`2024-02-04T08:15:12.090`) -* [CVE-2022-42319](CVE-2022/CVE-2022-423xx/CVE-2022-42319.json) (`2024-02-04T08:15:12.187`) -* [CVE-2022-42320](CVE-2022/CVE-2022-423xx/CVE-2022-42320.json) (`2024-02-04T08:15:12.300`) -* [CVE-2022-42321](CVE-2022/CVE-2022-423xx/CVE-2022-42321.json) (`2024-02-04T08:15:12.390`) -* [CVE-2022-42322](CVE-2022/CVE-2022-423xx/CVE-2022-42322.json) (`2024-02-04T08:15:12.477`) -* [CVE-2022-42323](CVE-2022/CVE-2022-423xx/CVE-2022-42323.json) (`2024-02-04T08:15:12.560`) -* [CVE-2022-42324](CVE-2022/CVE-2022-423xx/CVE-2022-42324.json) (`2024-02-04T08:15:12.647`) -* [CVE-2022-42325](CVE-2022/CVE-2022-423xx/CVE-2022-42325.json) (`2024-02-04T08:15:12.767`) -* [CVE-2022-42326](CVE-2022/CVE-2022-423xx/CVE-2022-42326.json) (`2024-02-04T08:15:12.877`) -* [CVE-2022-42327](CVE-2022/CVE-2022-423xx/CVE-2022-42327.json) (`2024-02-04T08:15:12.970`) -* [CVE-2022-42330](CVE-2022/CVE-2022-423xx/CVE-2022-42330.json) (`2024-02-04T08:15:13.050`) -* [CVE-2022-42331](CVE-2022/CVE-2022-423xx/CVE-2022-42331.json) (`2024-02-04T08:15:13.147`) -* [CVE-2022-42332](CVE-2022/CVE-2022-423xx/CVE-2022-42332.json) (`2024-02-04T08:15:13.257`) -* [CVE-2022-42333](CVE-2022/CVE-2022-423xx/CVE-2022-42333.json) (`2024-02-04T08:15:13.357`) -* [CVE-2022-42334](CVE-2022/CVE-2022-423xx/CVE-2022-42334.json) (`2024-02-04T08:15:13.440`) -* [CVE-2022-42335](CVE-2022/CVE-2022-423xx/CVE-2022-42335.json) (`2024-02-04T08:15:13.520`) +* [CVE-2021-3156](CVE-2021/CVE-2021-31xx/CVE-2021-3156.json) (`2024-02-04T09:15:08.010`) +* [CVE-2022-39046](CVE-2022/CVE-2022-390xx/CVE-2022-39046.json) (`2024-02-04T09:15:08.257`) +* [CVE-2022-3358](CVE-2022/CVE-2022-33xx/CVE-2022-3358.json) (`2024-02-04T09:15:08.427`) +* [CVE-2022-4203](CVE-2022/CVE-2022-42xx/CVE-2022-4203.json) (`2024-02-04T09:15:08.533`) +* [CVE-2022-4304](CVE-2022/CVE-2022-43xx/CVE-2022-4304.json) (`2024-02-04T09:15:08.627`) +* [CVE-2022-4450](CVE-2022/CVE-2022-44xx/CVE-2022-4450.json) (`2024-02-04T09:15:08.733`) +* [CVE-2023-0215](CVE-2023/CVE-2023-02xx/CVE-2023-0215.json) (`2024-02-04T09:15:08.847`) +* [CVE-2023-0216](CVE-2023/CVE-2023-02xx/CVE-2023-0216.json) (`2024-02-04T09:15:08.947`) +* [CVE-2023-0217](CVE-2023/CVE-2023-02xx/CVE-2023-0217.json) (`2024-02-04T09:15:09.040`) +* [CVE-2023-0286](CVE-2023/CVE-2023-02xx/CVE-2023-0286.json) (`2024-02-04T09:15:09.113`) +* [CVE-2023-0401](CVE-2023/CVE-2023-04xx/CVE-2023-0401.json) (`2024-02-04T09:15:09.223`) +* [CVE-2023-0464](CVE-2023/CVE-2023-04xx/CVE-2023-0464.json) (`2024-02-04T09:15:09.310`) +* [CVE-2023-0465](CVE-2023/CVE-2023-04xx/CVE-2023-0465.json) (`2024-02-04T09:15:09.430`) +* [CVE-2023-0466](CVE-2023/CVE-2023-04xx/CVE-2023-0466.json) (`2024-02-04T09:15:09.540`) +* [CVE-2023-2650](CVE-2023/CVE-2023-26xx/CVE-2023-2650.json) (`2024-02-04T09:15:09.643`) +* [CVE-2023-2975](CVE-2023/CVE-2023-29xx/CVE-2023-2975.json) (`2024-02-04T09:15:09.773`) +* [CVE-2023-3446](CVE-2023/CVE-2023-34xx/CVE-2023-3446.json) (`2024-02-04T09:15:09.900`) +* [CVE-2023-3817](CVE-2023/CVE-2023-38xx/CVE-2023-3817.json) (`2024-02-04T09:15:10.030`) +* [CVE-2023-6779](CVE-2023/CVE-2023-67xx/CVE-2023-6779.json) (`2024-02-04T09:15:10.377`) +* [CVE-2023-6780](CVE-2023/CVE-2023-67xx/CVE-2023-6780.json) (`2024-02-04T09:15:10.487`) +* [CVE-2023-5371](CVE-2023/CVE-2023-53xx/CVE-2023-5371.json) (`2024-02-04T10:15:08.080`) +* [CVE-2023-6174](CVE-2023/CVE-2023-61xx/CVE-2023-6174.json) (`2024-02-04T10:15:08.337`) +* [CVE-2023-6246](CVE-2023/CVE-2023-62xx/CVE-2023-6246.json) (`2024-02-04T10:15:08.490`) +* [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-02-04T10:15:08.623`) ## Download and Usage