From a2ecb204a7169a9a7868543477af38fa7935f288 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 7 Sep 2023 06:00:28 +0000 Subject: [PATCH] Auto-Update: 2023-09-07T06:00:24.742083+00:00 --- CVE-2022/CVE-2022-417xx/CVE-2022-41717.json | 6 ++- CVE-2023/CVE-2023-380xx/CVE-2023-38031.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-403xx/CVE-2023-40305.json | 6 ++- README.md | 26 +++------- 4 files changed, 73 insertions(+), 20 deletions(-) create mode 100644 CVE-2023/CVE-2023-380xx/CVE-2023-38031.json diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41717.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41717.json index ccdd1303597..5cf3815da7f 100644 --- a/CVE-2022/CVE-2022-417xx/CVE-2022-41717.json +++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41717.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41717", "sourceIdentifier": "security@golang.org", "published": "2022-12-08T20:15:10.330", - "lastModified": "2023-09-07T03:15:07.973", + "lastModified": "2023-09-07T04:15:09.720", "vulnStatus": "Modified", "descriptions": [ { @@ -135,6 +135,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4SBIUECMLNC572P23DDOKJNKPJVX26SP/", "source": "security@golang.org" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/56B2FFESRYYP6IY2AZ3UWXLWKZ5IYZN4/", + "source": "security@golang.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQGNAXK3YBPMUP3J4TECIRDHFGW37522/", "source": "security@golang.org", diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38031.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38031.json new file mode 100644 index 00000000000..9fbcdd4868d --- /dev/null +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38031.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38031", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2023-09-07T04:15:10.273", + "lastModified": "2023-09-07T04:15:10.273", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nASUS RT-AC86U Adaptive QoS - Web History function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services.\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/tw/cp-132-7348-56989-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40305.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40305.json index bb51d27547d..426af557e07 100644 --- a/CVE-2023/CVE-2023-403xx/CVE-2023-40305.json +++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40305.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40305", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T06:15:09.683", - "lastModified": "2023-09-07T03:15:08.413", + "lastModified": "2023-09-07T04:15:10.407", "vulnStatus": "Modified", "descriptions": [ { @@ -75,6 +75,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W6SL3NKMH5R4S5PD2O3MTC2UR4SBVHK/", "source": "cve@mitre.org" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MIUH3F63KQJWYR3FLKRZUYYRJOY6FYX/", + "source": "cve@mitre.org" + }, { "url": "https://savannah.gnu.org/bugs/index.php?64503", "source": "cve@mitre.org", diff --git a/README.md b/README.md index 4bbcedcf0d0..e397f79b5a4 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-09-07T04:00:25.134761+00:00 +2023-09-07T06:00:24.742083+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-09-07T03:15:08.713000+00:00 +2023-09-07T04:15:10.407000+00:00 ``` ### Last Data Feed Release @@ -29,32 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -224424 +224425 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `1` -* [CVE-2023-4772](CVE-2023/CVE-2023-47xx/CVE-2023-4772.json) (`2023-09-07T02:15:08.033`) -* [CVE-2023-4792](CVE-2023/CVE-2023-47xx/CVE-2023-4792.json) (`2023-09-07T02:15:08.163`) -* [CVE-2023-34357](CVE-2023/CVE-2023-343xx/CVE-2023-34357.json) (`2023-09-07T03:15:08.263`) +* [CVE-2023-38031](CVE-2023/CVE-2023-380xx/CVE-2023-38031.json) (`2023-09-07T04:15:10.273`) ### CVEs modified in the last Commit -Recently modified CVEs: `10` +Recently modified CVEs: `2` -* [CVE-2022-34300](CVE-2022/CVE-2022-343xx/CVE-2022-34300.json) (`2023-09-07T03:15:07.537`) -* [CVE-2022-41717](CVE-2022/CVE-2022-417xx/CVE-2022-41717.json) (`2023-09-07T03:15:07.973`) -* [CVE-2023-22652](CVE-2023/CVE-2023-226xx/CVE-2023-22652.json) (`2023-09-07T02:15:07.570`) -* [CVE-2023-30079](CVE-2023/CVE-2023-300xx/CVE-2023-30079.json) (`2023-09-07T02:15:07.933`) -* [CVE-2023-33551](CVE-2023/CVE-2023-335xx/CVE-2023-33551.json) (`2023-09-07T03:15:08.103`) -* [CVE-2023-33552](CVE-2023/CVE-2023-335xx/CVE-2023-33552.json) (`2023-09-07T03:15:08.190`) -* [CVE-2023-40305](CVE-2023/CVE-2023-403xx/CVE-2023-40305.json) (`2023-09-07T03:15:08.413`) -* [CVE-2023-4733](CVE-2023/CVE-2023-47xx/CVE-2023-4733.json) (`2023-09-07T03:15:08.517`) -* [CVE-2023-4750](CVE-2023/CVE-2023-47xx/CVE-2023-4750.json) (`2023-09-07T03:15:08.620`) -* [CVE-2023-4752](CVE-2023/CVE-2023-47xx/CVE-2023-4752.json) (`2023-09-07T03:15:08.713`) +* [CVE-2022-41717](CVE-2022/CVE-2022-417xx/CVE-2022-41717.json) (`2023-09-07T04:15:09.720`) +* [CVE-2023-40305](CVE-2023/CVE-2023-403xx/CVE-2023-40305.json) (`2023-09-07T04:15:10.407`) ## Download and Usage