From 76ff54fc7b0d45b953c17c9de51fa5fd6281ec95 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 12 Oct 2023 06:02:51 +0000 Subject: [PATCH] Auto-Update: 2023-10-12T06:00:25.597780+00:00 --- CVE-2023/CVE-2023-408xx/CVE-2023-40829.json | 20 +++++++++++ CVE-2023/CVE-2023-422xx/CVE-2023-42298.json | 20 +++++++++++ CVE-2023/CVE-2023-436xx/CVE-2023-43641.json | 6 +++- CVE-2023/CVE-2023-447xx/CVE-2023-44793.json | 15 ++++++++ README.md | 39 +++++---------------- 5 files changed, 69 insertions(+), 31 deletions(-) create mode 100644 CVE-2023/CVE-2023-408xx/CVE-2023-40829.json create mode 100644 CVE-2023/CVE-2023-422xx/CVE-2023-42298.json create mode 100644 CVE-2023/CVE-2023-447xx/CVE-2023-44793.json diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40829.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40829.json new file mode 100644 index 00000000000..5e7c5bb7a14 --- /dev/null +++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40829.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40829", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-12T05:15:46.863", + "lastModified": "2023-10-12T05:15:46.863", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "There is an interface unauthorized access vulnerability in the background of Tencent Enterprise Wechat Privatization 2.5.x and 2.6.930000." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/wwwziziyu/85bdf8d56b415974c4827a5668f493e9", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42298.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42298.json new file mode 100644 index 00000000000..d7b222dbf1e --- /dev/null +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42298.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42298", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-12T04:15:13.053", + "lastModified": "2023-10-12T04:15:13.053", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to cause a denial of service via the Q_DecCoordOnUnitSphere function of file src/bifs/unquantize.c." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/gpac/gpac/issues/2567", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json index 4941f7bd1dd..3f3caa48a16 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43641", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-09T22:15:12.707", - "lastModified": "2023-10-12T03:15:09.680", + "lastModified": "2023-10-12T04:15:13.200", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -75,6 +75,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57JEYTRFG4PVGZZ7HIEFTX5I7OONFFMI/", "source": "security-advisories@github.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGQOMFDBXGM3DOICCXKCUS76OTKTSPMN/", + "source": "security-advisories@github.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5524", "source": "security-advisories@github.com" diff --git a/CVE-2023/CVE-2023-447xx/CVE-2023-44793.json b/CVE-2023/CVE-2023-447xx/CVE-2023-44793.json new file mode 100644 index 00000000000..21bddef625e --- /dev/null +++ b/CVE-2023/CVE-2023-447xx/CVE-2023-44793.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2023-44793", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-12T05:15:46.967", + "lastModified": "2023-10-12T05:15:46.967", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/README.md b/README.md index aa158880470..48034bcace5 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-10-12T04:00:25.389610+00:00 +2023-10-12T06:00:25.597780+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-10-12T03:15:09.680000+00:00 +2023-10-12T05:15:46.967000+00:00 ``` ### Last Data Feed Release @@ -29,44 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -227631 +227634 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `3` +* [CVE-2023-42298](CVE-2023/CVE-2023-422xx/CVE-2023-42298.json) (`2023-10-12T04:15:13.053`) +* [CVE-2023-40829](CVE-2023/CVE-2023-408xx/CVE-2023-40829.json) (`2023-10-12T05:15:46.863`) +* [CVE-2023-44793](CVE-2023/CVE-2023-447xx/CVE-2023-44793.json) (`2023-10-12T05:15:46.967`) ### CVEs modified in the last Commit -Recently modified CVEs: `60` +Recently modified CVEs: `1` -* [CVE-2023-40541](CVE-2023/CVE-2023-405xx/CVE-2023-40541.json) (`2023-10-12T02:32:07.413`) -* [CVE-2023-41063](CVE-2023/CVE-2023-410xx/CVE-2023-41063.json) (`2023-10-12T02:32:25.927`) -* [CVE-2023-41065](CVE-2023/CVE-2023-410xx/CVE-2023-41065.json) (`2023-10-12T02:35:43.833`) -* [CVE-2023-41066](CVE-2023/CVE-2023-410xx/CVE-2023-41066.json) (`2023-10-12T02:36:20.743`) -* [CVE-2023-41067](CVE-2023/CVE-2023-410xx/CVE-2023-41067.json) (`2023-10-12T02:37:44.647`) -* [CVE-2023-41068](CVE-2023/CVE-2023-410xx/CVE-2023-41068.json) (`2023-10-12T02:38:01.330`) -* [CVE-2023-41070](CVE-2023/CVE-2023-410xx/CVE-2023-41070.json) (`2023-10-12T02:38:53.627`) -* [CVE-2023-41071](CVE-2023/CVE-2023-410xx/CVE-2023-41071.json) (`2023-10-12T02:40:02.397`) -* [CVE-2023-41073](CVE-2023/CVE-2023-410xx/CVE-2023-41073.json) (`2023-10-12T02:40:29.053`) -* [CVE-2023-41074](CVE-2023/CVE-2023-410xx/CVE-2023-41074.json) (`2023-10-12T02:40:54.100`) -* [CVE-2023-41993](CVE-2023/CVE-2023-419xx/CVE-2023-41993.json) (`2023-10-12T02:42:54.773`) -* [CVE-2023-41992](CVE-2023/CVE-2023-419xx/CVE-2023-41992.json) (`2023-10-12T02:44:38.967`) -* [CVE-2023-41991](CVE-2023/CVE-2023-419xx/CVE-2023-41991.json) (`2023-10-12T02:45:00.457`) -* [CVE-2023-5187](CVE-2023/CVE-2023-51xx/CVE-2023-5187.json) (`2023-10-12T02:45:40.760`) -* [CVE-2023-5186](CVE-2023/CVE-2023-51xx/CVE-2023-5186.json) (`2023-10-12T02:46:12.913`) -* [CVE-2023-44464](CVE-2023/CVE-2023-444xx/CVE-2023-44464.json) (`2023-10-12T02:47:15.840`) -* [CVE-2023-44488](CVE-2023/CVE-2023-444xx/CVE-2023-44488.json) (`2023-10-12T02:48:57.420`) -* [CVE-2023-5171](CVE-2023/CVE-2023-51xx/CVE-2023-5171.json) (`2023-10-12T02:52:09.820`) -* [CVE-2023-5169](CVE-2023/CVE-2023-51xx/CVE-2023-5169.json) (`2023-10-12T02:53:26.827`) -* [CVE-2023-5176](CVE-2023/CVE-2023-51xx/CVE-2023-5176.json) (`2023-10-12T02:56:05.727`) -* [CVE-2023-4354](CVE-2023/CVE-2023-43xx/CVE-2023-4354.json) (`2023-10-12T02:56:56.870`) -* [CVE-2023-20588](CVE-2023/CVE-2023-205xx/CVE-2023-20588.json) (`2023-10-12T03:15:09.277`) -* [CVE-2023-22338](CVE-2023/CVE-2023-223xx/CVE-2023-22338.json) (`2023-10-12T03:15:09.490`) -* [CVE-2023-22840](CVE-2023/CVE-2023-228xx/CVE-2023-22840.json) (`2023-10-12T03:15:09.590`) -* [CVE-2023-43641](CVE-2023/CVE-2023-436xx/CVE-2023-43641.json) (`2023-10-12T03:15:09.680`) +* [CVE-2023-43641](CVE-2023/CVE-2023-436xx/CVE-2023-43641.json) (`2023-10-12T04:15:13.200`) ## Download and Usage