From a58264d370c09c92023ffb9d0a5aea38f07adcdf Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 24 Nov 2023 13:00:54 +0000 Subject: [PATCH] Auto-Update: 2023-11-24T13:00:50.975512+00:00 --- CVE-2023/CVE-2023-395xx/CVE-2023-39544.json | 6 +++--- CVE-2023/CVE-2023-395xx/CVE-2023-39545.json | 6 +++--- CVE-2023/CVE-2023-395xx/CVE-2023-39546.json | 6 +++--- CVE-2023/CVE-2023-395xx/CVE-2023-39547.json | 6 +++--- CVE-2023/CVE-2023-395xx/CVE-2023-39548.json | 6 +++--- README.md | 17 ++++++++++------- 6 files changed, 25 insertions(+), 22 deletions(-) diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39544.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39544.json index f20d6810267..16db0785c1d 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39544.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39544.json @@ -2,12 +2,12 @@ "id": "CVE-2023-39544", "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2023-11-17T06:15:33.810", - "lastModified": "2023-11-17T13:58:59.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-24T12:15:06.883", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", - "value": "CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.0 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.0 and earlier allows a attacker to log in to the product may execute an arbitrary command.\n\n" + "value": "CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command.\n\n" }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39545.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39545.json index a83b20670e4..44abed77ce7 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39545.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39545.json @@ -2,12 +2,12 @@ "id": "CVE-2023-39545", "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2023-11-17T06:15:33.880", - "lastModified": "2023-11-17T13:58:59.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-24T12:15:07.150", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", - "value": "CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.0 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.0 and earlier allows a attacker to log in to the product may execute an arbitrary command.\n\n" + "value": "CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command.\n\n" }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39546.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39546.json index d62bdb38529..f9ec4dc8ebd 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39546.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39546.json @@ -2,12 +2,12 @@ "id": "CVE-2023-39546", "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2023-11-17T06:15:33.947", - "lastModified": "2023-11-17T13:58:59.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-24T12:15:07.200", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", - "value": "CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.0 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.0 and earlier allows a attacker to log in to the product may execute an arbitrary command.\n\n" + "value": "CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command.\n\n" }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39547.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39547.json index b92fd3e70de..3650f6af159 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39547.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39547.json @@ -2,12 +2,12 @@ "id": "CVE-2023-39547", "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2023-11-17T06:15:34.017", - "lastModified": "2023-11-17T13:58:59.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-24T12:15:07.260", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", - "value": "CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.0 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.0 and earlier allows a attacker to log in to the product may execute an arbitrary command.\n\n" + "value": "CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command.\n\n" }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39548.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39548.json index 7e6a72b7f22..3393738714e 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39548.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39548.json @@ -2,12 +2,12 @@ "id": "CVE-2023-39548", "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2023-11-17T06:15:34.077", - "lastModified": "2023-11-17T13:59:04.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-24T12:15:07.310", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", - "value": "CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.0 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.0 and earlier allows a attacker to log in to the product may execute an arbitrary command.\n\n" + "value": "CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command.\n\n" }, { "lang": "es", diff --git a/README.md b/README.md index 7f23a0d413b..971e1413a4f 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-24T09:16:02.904301+00:00 +2023-11-24T13:00:50.975512+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-24T08:15:21.163000+00:00 +2023-11-24T12:15:07.310000+00:00 ``` ### Last Data Feed Release @@ -29,21 +29,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -231471 +231472 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `0` -* [CVE-2023-48796](CVE-2023/CVE-2023-487xx/CVE-2023-48796.json) (`2023-11-24T08:15:20.810`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `5` -* [CVE-2023-6118](CVE-2023/CVE-2023-61xx/CVE-2023-6118.json) (`2023-11-24T08:15:21.163`) +* [CVE-2023-39544](CVE-2023/CVE-2023-395xx/CVE-2023-39544.json) (`2023-11-24T12:15:06.883`) +* [CVE-2023-39545](CVE-2023/CVE-2023-395xx/CVE-2023-39545.json) (`2023-11-24T12:15:07.150`) +* [CVE-2023-39546](CVE-2023/CVE-2023-395xx/CVE-2023-39546.json) (`2023-11-24T12:15:07.200`) +* [CVE-2023-39547](CVE-2023/CVE-2023-395xx/CVE-2023-39547.json) (`2023-11-24T12:15:07.260`) +* [CVE-2023-39548](CVE-2023/CVE-2023-395xx/CVE-2023-39548.json) (`2023-11-24T12:15:07.310`) ## Download and Usage