diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2602.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2602.json index 81a2a5aab31..7e51a00848a 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2602.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2602.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2602", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-06T20:15:12.760", - "lastModified": "2023-06-14T18:07:39.807", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-29T03:15:41.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -157,6 +157,10 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/", + "source": "secalert@redhat.com" + }, { "url": "https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2603.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2603.json index e143e498dd7..cc7cee1f5e6 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2603.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2603.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2603", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-06T20:15:13.187", - "lastModified": "2023-06-21T19:02:07.267", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-29T03:15:42.043", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -138,6 +138,10 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/", + "source": "secalert@redhat.com" + }, { "url": "https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json index 867e9e060bd..51ed33f7d8d 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39325", "sourceIdentifier": "security@golang.org", "published": "2023-10-11T22:15:09.880", - "lastModified": "2023-11-25T11:15:18.130", + "lastModified": "2023-11-29T03:15:42.130", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -170,6 +170,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QF5QSYAOPDOWLY6DUHID56Q4HQFYB45I/", "source": "security@golang.org" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/", + "source": "security@golang.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/", "source": "security@golang.org" @@ -178,6 +182,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/", "source": "security@golang.org" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/", + "source": "security@golang.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTT7DG3QOF5ZNJLUGHDNLRUIN6OWZARP/", "source": "security@golang.org" diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46129.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46129.json index cdb8592cad1..540e7b4eb2c 100644 --- a/CVE-2023/CVE-2023-461xx/CVE-2023-46129.json +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46129.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46129", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-31T00:15:09.933", - "lastModified": "2023-11-17T19:33:33.457", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-29T03:15:42.270", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -115,6 +115,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/", + "source": "security-advisories@github.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46849.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46849.json index 8b93b07ad75..2af7a24ec5f 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46849.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46849.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46849", "sourceIdentifier": "security@openvpn.net", "published": "2023-11-11T01:15:07.270", - "lastModified": "2023-11-28T19:47:44.070", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-29T03:15:42.383", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -131,6 +131,10 @@ "Mailing List" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/", + "source": "security@openvpn.net" + }, { "url": "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/", "source": "security@openvpn.net", diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46850.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46850.json index 8be158e2fdb..5ad62bd3017 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46850.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46850.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46850", "sourceIdentifier": "security@openvpn.net", "published": "2023-11-11T01:15:07.357", - "lastModified": "2023-11-28T19:47:39.703", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-29T03:15:42.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -128,6 +128,10 @@ "Mailing List" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/", + "source": "security@openvpn.net" + }, { "url": "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/", "source": "security@openvpn.net", diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47248.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47248.json index cdf60c5b9a6..318d3980e99 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47248.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47248.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47248", "sourceIdentifier": "security@apache.org", "published": "2023-11-09T09:15:08.223", - "lastModified": "2023-11-17T17:44:01.637", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-29T03:15:42.547", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,7 +41,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -85,6 +85,18 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FR34AIPXVTMB3XPRU5ULV5HHWPMRE33X/", + "source": "security@apache.org" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAGWEAJDWO2ACYATUQCPXLSYY5C3L3XU/", + "source": "security@apache.org" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWFYXLVBTBHNKYRXI572RFX7IJDDQGBL/", + "source": "security@apache.org" + }, { "url": "https://pypi.org/project/pyarrow-hotfix/", "source": "security@apache.org", diff --git a/README.md b/README.md index c47963b78e0..d6794bb687e 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-29T03:00:20.030738+00:00 +2023-11-29T05:00:18.275707+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-29T02:37:33.630000+00:00 +2023-11-29T03:15:42.547000+00:00 ``` ### Last Data Feed Release @@ -34,42 +34,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `0` -* [CVE-2023-23324](CVE-2023/CVE-2023-233xx/CVE-2023-23324.json) (`2023-11-29T01:15:07.127`) -* [CVE-2023-23325](CVE-2023/CVE-2023-233xx/CVE-2023-23325.json) (`2023-11-29T01:15:07.187`) -* [CVE-2023-24294](CVE-2023/CVE-2023-242xx/CVE-2023-24294.json) (`2023-11-29T01:15:07.237`) ### CVEs modified in the last Commit -Recently modified CVEs: `28` +Recently modified CVEs: `7` -* [CVE-2023-48705](CVE-2023/CVE-2023-487xx/CVE-2023-48705.json) (`2023-11-29T02:25:23.870`) -* [CVE-2023-47350](CVE-2023/CVE-2023-473xx/CVE-2023-47350.json) (`2023-11-29T02:25:35.663`) -* [CVE-2023-2889](CVE-2023/CVE-2023-28xx/CVE-2023-2889.json) (`2023-11-29T02:25:43.980`) -* [CVE-2023-6252](CVE-2023/CVE-2023-62xx/CVE-2023-6252.json) (`2023-11-29T02:26:07.880`) -* [CVE-2023-47014](CVE-2023/CVE-2023-470xx/CVE-2023-47014.json) (`2023-11-29T02:29:03.067`) -* [CVE-2023-47781](CVE-2023/CVE-2023-477xx/CVE-2023-47781.json) (`2023-11-29T02:29:15.833`) -* [CVE-2023-47792](CVE-2023/CVE-2023-477xx/CVE-2023-47792.json) (`2023-11-29T02:29:26.833`) -* [CVE-2023-47819](CVE-2023/CVE-2023-478xx/CVE-2023-47819.json) (`2023-11-29T02:29:33.000`) -* [CVE-2023-30496](CVE-2023/CVE-2023-304xx/CVE-2023-30496.json) (`2023-11-29T02:29:39.327`) -* [CVE-2023-47759](CVE-2023/CVE-2023-477xx/CVE-2023-47759.json) (`2023-11-29T02:30:03.937`) -* [CVE-2023-47824](CVE-2023/CVE-2023-478xx/CVE-2023-47824.json) (`2023-11-29T02:30:13.810`) -* [CVE-2023-47825](CVE-2023/CVE-2023-478xx/CVE-2023-47825.json) (`2023-11-29T02:30:21.970`) -* [CVE-2023-6238](CVE-2023/CVE-2023-62xx/CVE-2023-6238.json) (`2023-11-29T02:31:23.327`) -* [CVE-2023-48299](CVE-2023/CVE-2023-482xx/CVE-2023-48299.json) (`2023-11-29T02:31:52.117`) -* [CVE-2023-48239](CVE-2023/CVE-2023-482xx/CVE-2023-48239.json) (`2023-11-29T02:32:23.183`) -* [CVE-2023-48230](CVE-2023/CVE-2023-482xx/CVE-2023-48230.json) (`2023-11-29T02:35:10.457`) -* [CVE-2023-48228](CVE-2023/CVE-2023-482xx/CVE-2023-48228.json) (`2023-11-29T02:35:26.887`) -* [CVE-2023-48226](CVE-2023/CVE-2023-482xx/CVE-2023-48226.json) (`2023-11-29T02:35:48.987`) -* [CVE-2023-47643](CVE-2023/CVE-2023-476xx/CVE-2023-47643.json) (`2023-11-29T02:36:10.290`) -* [CVE-2023-22521](CVE-2023/CVE-2023-225xx/CVE-2023-22521.json) (`2023-11-29T02:36:19.223`) -* [CVE-2023-22516](CVE-2023/CVE-2023-225xx/CVE-2023-22516.json) (`2023-11-29T02:36:29.390`) -* [CVE-2023-20274](CVE-2023/CVE-2023-202xx/CVE-2023-20274.json) (`2023-11-29T02:36:46.983`) -* [CVE-2023-20272](CVE-2023/CVE-2023-202xx/CVE-2023-20272.json) (`2023-11-29T02:36:57.387`) -* [CVE-2023-20265](CVE-2023/CVE-2023-202xx/CVE-2023-20265.json) (`2023-11-29T02:37:14.087`) -* [CVE-2023-20208](CVE-2023/CVE-2023-202xx/CVE-2023-20208.json) (`2023-11-29T02:37:33.630`) +* [CVE-2023-2602](CVE-2023/CVE-2023-26xx/CVE-2023-2602.json) (`2023-11-29T03:15:41.910`) +* [CVE-2023-2603](CVE-2023/CVE-2023-26xx/CVE-2023-2603.json) (`2023-11-29T03:15:42.043`) +* [CVE-2023-39325](CVE-2023/CVE-2023-393xx/CVE-2023-39325.json) (`2023-11-29T03:15:42.130`) +* [CVE-2023-46129](CVE-2023/CVE-2023-461xx/CVE-2023-46129.json) (`2023-11-29T03:15:42.270`) +* [CVE-2023-46849](CVE-2023/CVE-2023-468xx/CVE-2023-46849.json) (`2023-11-29T03:15:42.383`) +* [CVE-2023-46850](CVE-2023/CVE-2023-468xx/CVE-2023-46850.json) (`2023-11-29T03:15:42.467`) +* [CVE-2023-47248](CVE-2023/CVE-2023-472xx/CVE-2023-47248.json) (`2023-11-29T03:15:42.547`) ## Download and Usage