From bee9fd5dd8791c230a7a0be1d134e2a7b25e04ba Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 8 Sep 2023 06:00:29 +0000 Subject: [PATCH] Auto-Update: 2023-09-08T06:00:25.613057+00:00 --- CVE-2023/CVE-2023-335xx/CVE-2023-33546.json | 10 ++++--- CVE-2023/CVE-2023-47xx/CVE-2023-4761.json | 8 ++++-- CVE-2023/CVE-2023-47xx/CVE-2023-4762.json | 8 ++++-- CVE-2023/CVE-2023-47xx/CVE-2023-4763.json | 8 ++++-- CVE-2023/CVE-2023-47xx/CVE-2023-4764.json | 8 ++++-- README.md | 30 +++++++-------------- 6 files changed, 40 insertions(+), 32 deletions(-) diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33546.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33546.json index 358a35ccaca..084d4a41799 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33546.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33546.json @@ -2,12 +2,12 @@ "id": "CVE-2023-33546", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T13:15:10.743", - "lastModified": "2023-06-08T18:49:27.210", - "vulnStatus": "Analyzed", + "lastModified": "2023-09-08T05:15:43.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow." + "value": "** DISPUTED ** Janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. NOTE: this is disputed by multiple parties because Janino is not intended for use with untrusted input." } ], "metrics": { @@ -73,6 +73,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://janino-compiler.github.io/janino/#security", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4761.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4761.json index 76aad87d64f..cdeff2f9665 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4761.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4761.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4761", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-05T22:15:09.583", - "lastModified": "2023-09-07T01:10:21.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-08T04:15:10.137", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -19,6 +19,10 @@ { "url": "https://crbug.com/1476403", "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5491", + "source": "chrome-cve-admin@google.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4762.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4762.json index af7c820d004..231a7e964ba 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4762.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4762.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4762", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-05T22:15:09.677", - "lastModified": "2023-09-07T01:10:21.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-08T04:15:11.017", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -19,6 +19,10 @@ { "url": "https://crbug.com/1473247", "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5491", + "source": "chrome-cve-admin@google.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4763.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4763.json index 5a283023dfc..16ffa147ec8 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4763.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4763.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4763", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-05T22:15:09.777", - "lastModified": "2023-09-07T01:10:21.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-08T04:15:11.350", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -19,6 +19,10 @@ { "url": "https://crbug.com/1469928", "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5491", + "source": "chrome-cve-admin@google.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4764.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4764.json index 3ca9e1c6de7..badef0734a1 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4764.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4764.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4764", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-05T22:15:09.883", - "lastModified": "2023-09-07T01:10:21.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-08T04:15:11.677", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -19,6 +19,10 @@ { "url": "https://crbug.com/1447237", "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5491", + "source": "chrome-cve-admin@google.com" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 1ea6d797aee..70d1401ba2f 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-09-08T04:00:24.840438+00:00 +2023-09-08T06:00:25.613057+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-09-08T03:15:09.060000+00:00 +2023-09-08T05:15:43.073000+00:00 ``` ### Last Data Feed Release @@ -34,31 +34,19 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `16` +Recently added CVEs: `0` -* [CVE-2014-5329](CVE-2014/CVE-2014-53xx/CVE-2014-5329.json) (`2023-09-08T03:15:07.387`) -* [CVE-2021-33834](CVE-2021/CVE-2021-338xx/CVE-2021-33834.json) (`2023-09-08T02:15:07.503`) -* [CVE-2021-45811](CVE-2021/CVE-2021-458xx/CVE-2021-45811.json) (`2023-09-08T02:15:07.877`) -* [CVE-2021-27715](CVE-2021/CVE-2021-277xx/CVE-2021-27715.json) (`2023-09-08T03:15:07.823`) -* [CVE-2022-27599](CVE-2022/CVE-2022-275xx/CVE-2022-27599.json) (`2023-09-08T02:15:07.940`) -* [CVE-2023-36184](CVE-2023/CVE-2023-361xx/CVE-2023-36184.json) (`2023-09-08T02:15:08.080`) -* [CVE-2023-40271](CVE-2023/CVE-2023-402xx/CVE-2023-40271.json) (`2023-09-08T02:15:08.133`) -* [CVE-2023-37367](CVE-2023/CVE-2023-373xx/CVE-2023-37367.json) (`2023-09-08T03:15:08.330`) -* [CVE-2023-37368](CVE-2023/CVE-2023-373xx/CVE-2023-37368.json) (`2023-09-08T03:15:08.560`) -* [CVE-2023-37377](CVE-2023/CVE-2023-373xx/CVE-2023-37377.json) (`2023-09-08T03:15:08.643`) -* [CVE-2023-37759](CVE-2023/CVE-2023-377xx/CVE-2023-37759.json) (`2023-09-08T03:15:08.727`) -* [CVE-2023-39620](CVE-2023/CVE-2023-396xx/CVE-2023-39620.json) (`2023-09-08T03:15:08.787`) -* [CVE-2023-40353](CVE-2023/CVE-2023-403xx/CVE-2023-40353.json) (`2023-09-08T03:15:08.853`) -* [CVE-2023-40953](CVE-2023/CVE-2023-409xx/CVE-2023-40953.json) (`2023-09-08T03:15:08.930`) -* [CVE-2023-41594](CVE-2023/CVE-2023-415xx/CVE-2023-41594.json) (`2023-09-08T03:15:08.997`) -* [CVE-2023-41615](CVE-2023/CVE-2023-416xx/CVE-2023-41615.json) (`2023-09-08T03:15:09.060`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `5` -* [CVE-2023-35785](CVE-2023/CVE-2023-357xx/CVE-2023-35785.json) (`2023-09-08T03:15:08.017`) +* [CVE-2023-4761](CVE-2023/CVE-2023-47xx/CVE-2023-4761.json) (`2023-09-08T04:15:10.137`) +* [CVE-2023-4762](CVE-2023/CVE-2023-47xx/CVE-2023-4762.json) (`2023-09-08T04:15:11.017`) +* [CVE-2023-4763](CVE-2023/CVE-2023-47xx/CVE-2023-4763.json) (`2023-09-08T04:15:11.350`) +* [CVE-2023-4764](CVE-2023/CVE-2023-47xx/CVE-2023-4764.json) (`2023-09-08T04:15:11.677`) +* [CVE-2023-33546](CVE-2023/CVE-2023-335xx/CVE-2023-33546.json) (`2023-09-08T05:15:43.073`) ## Download and Usage