From d20b068bde80e6fd72a19f1c62a9bb6f17111ea5 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ren=C3=A9=20Helmke?= Date: Tue, 16 May 2023 04:00:27 +0200 Subject: [PATCH] Auto-Update: 2023-05-16T02:00:24.345844+00:00 --- CVE-2023/CVE-2023-260xx/CVE-2023-26081.json | 6 ++- CVE-2023/CVE-2023-299xx/CVE-2023-29961.json | 24 +++++++++ README.md | 60 +++------------------ 3 files changed, 37 insertions(+), 53 deletions(-) create mode 100644 CVE-2023/CVE-2023-299xx/CVE-2023-29961.json diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26081.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26081.json index c624dea3f55..53f1d5cd3f5 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26081.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26081.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26081", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-20T03:15:10.313", - "lastModified": "2023-03-02T03:15:10.007", + "lastModified": "2023-05-16T00:15:09.087", "vulnStatus": "Modified", "descriptions": [ { @@ -96,6 +96,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00015.html", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFWUNG6E4ZT43EYNHKYXS7QVSO2VW2H2/", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29961.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29961.json new file mode 100644 index 00000000000..596f16b7667 --- /dev/null +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29961.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-29961", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T01:15:09.067", + "lastModified": "2023-05-16T01:15:09.067", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-605L firmware version 1.17B01 BETA is vulnerable to stack overflow via /goform/formTcpipSetup," + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Archerber/bug_submit/blob/main/D-Link/dir605l.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b6dd0c84f0c..bcd77710588 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-16T00:00:23.886731+00:00 +2023-05-16T02:00:24.345844+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-15T22:15:12.273000+00:00 +2023-05-16T01:15:09.067000+00:00 ``` ### Last Data Feed Release @@ -23,71 +23,27 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](releases/latest) ```plain -2023-05-15T00:00:20.978594+00:00 +2023-05-16T00:00:20.966642+00:00 ``` ### Total Number of included CVEs ```plain -215335 +215336 ``` ### CVEs added in the last Commit -Recently added CVEs: `44` +Recently added CVEs: `1` -* [CVE-2021-0877](CVE-2021/CVE-2021-08xx/CVE-2021-0877.json) (`2023-05-15T22:15:10.163`) -* [CVE-2023-1729](CVE-2023/CVE-2023-17xx/CVE-2023-1729.json) (`2023-05-15T22:15:10.350`) -* [CVE-2023-20673](CVE-2023/CVE-2023-206xx/CVE-2023-20673.json) (`2023-05-15T22:15:10.427`) -* [CVE-2023-20694](CVE-2023/CVE-2023-206xx/CVE-2023-20694.json) (`2023-05-15T22:15:10.480`) -* [CVE-2023-20695](CVE-2023/CVE-2023-206xx/CVE-2023-20695.json) (`2023-05-15T22:15:10.523`) -* [CVE-2023-20696](CVE-2023/CVE-2023-206xx/CVE-2023-20696.json) (`2023-05-15T22:15:10.563`) -* [CVE-2023-20697](CVE-2023/CVE-2023-206xx/CVE-2023-20697.json) (`2023-05-15T22:15:10.603`) -* [CVE-2023-20698](CVE-2023/CVE-2023-206xx/CVE-2023-20698.json) (`2023-05-15T22:15:10.647`) -* [CVE-2023-20699](CVE-2023/CVE-2023-206xx/CVE-2023-20699.json) (`2023-05-15T22:15:10.690`) -* [CVE-2023-20700](CVE-2023/CVE-2023-207xx/CVE-2023-20700.json) (`2023-05-15T22:15:10.743`) -* [CVE-2023-20701](CVE-2023/CVE-2023-207xx/CVE-2023-20701.json) (`2023-05-15T22:15:10.787`) -* [CVE-2023-20703](CVE-2023/CVE-2023-207xx/CVE-2023-20703.json) (`2023-05-15T22:15:10.830`) -* [CVE-2023-20704](CVE-2023/CVE-2023-207xx/CVE-2023-20704.json) (`2023-05-15T22:15:10.870`) -* [CVE-2023-20705](CVE-2023/CVE-2023-207xx/CVE-2023-20705.json) (`2023-05-15T22:15:10.910`) -* [CVE-2023-20706](CVE-2023/CVE-2023-207xx/CVE-2023-20706.json) (`2023-05-15T22:15:10.947`) -* [CVE-2023-20707](CVE-2023/CVE-2023-207xx/CVE-2023-20707.json) (`2023-05-15T22:15:10.993`) -* [CVE-2023-20708](CVE-2023/CVE-2023-207xx/CVE-2023-20708.json) (`2023-05-15T22:15:11.033`) -* [CVE-2023-20709](CVE-2023/CVE-2023-207xx/CVE-2023-20709.json) (`2023-05-15T22:15:11.073`) -* [CVE-2023-20710](CVE-2023/CVE-2023-207xx/CVE-2023-20710.json) (`2023-05-15T22:15:11.113`) -* [CVE-2023-20711](CVE-2023/CVE-2023-207xx/CVE-2023-20711.json) (`2023-05-15T22:15:11.150`) -* [CVE-2023-20717](CVE-2023/CVE-2023-207xx/CVE-2023-20717.json) (`2023-05-15T22:15:11.190`) -* [CVE-2023-20718](CVE-2023/CVE-2023-207xx/CVE-2023-20718.json) (`2023-05-15T22:15:11.230`) -* [CVE-2023-20719](CVE-2023/CVE-2023-207xx/CVE-2023-20719.json) (`2023-05-15T22:15:11.273`) -* [CVE-2023-20720](CVE-2023/CVE-2023-207xx/CVE-2023-20720.json) (`2023-05-15T22:15:11.313`) -* [CVE-2023-20721](CVE-2023/CVE-2023-207xx/CVE-2023-20721.json) (`2023-05-15T22:15:11.350`) -* [CVE-2023-20722](CVE-2023/CVE-2023-207xx/CVE-2023-20722.json) (`2023-05-15T22:15:11.390`) -* [CVE-2023-20726](CVE-2023/CVE-2023-207xx/CVE-2023-20726.json) (`2023-05-15T22:15:11.433`) -* [CVE-2023-20914](CVE-2023/CVE-2023-209xx/CVE-2023-20914.json) (`2023-05-15T22:15:11.473`) -* [CVE-2023-20930](CVE-2023/CVE-2023-209xx/CVE-2023-20930.json) (`2023-05-15T22:15:11.513`) -* [CVE-2023-21102](CVE-2023/CVE-2023-211xx/CVE-2023-21102.json) (`2023-05-15T22:15:11.623`) -* [CVE-2023-21103](CVE-2023/CVE-2023-211xx/CVE-2023-21103.json) (`2023-05-15T22:15:11.687`) -* [CVE-2023-21104](CVE-2023/CVE-2023-211xx/CVE-2023-21104.json) (`2023-05-15T22:15:11.737`) -* [CVE-2023-21106](CVE-2023/CVE-2023-211xx/CVE-2023-21106.json) (`2023-05-15T22:15:11.777`) -* [CVE-2023-21107](CVE-2023/CVE-2023-211xx/CVE-2023-21107.json) (`2023-05-15T22:15:11.830`) -* [CVE-2023-21109](CVE-2023/CVE-2023-211xx/CVE-2023-21109.json) (`2023-05-15T22:15:11.870`) -* [CVE-2023-21110](CVE-2023/CVE-2023-211xx/CVE-2023-21110.json) (`2023-05-15T22:15:11.910`) -* [CVE-2023-21111](CVE-2023/CVE-2023-211xx/CVE-2023-21111.json) (`2023-05-15T22:15:11.950`) -* [CVE-2023-21112](CVE-2023/CVE-2023-211xx/CVE-2023-21112.json) (`2023-05-15T22:15:11.987`) -* [CVE-2023-21116](CVE-2023/CVE-2023-211xx/CVE-2023-21116.json) (`2023-05-15T22:15:12.027`) -* [CVE-2023-21117](CVE-2023/CVE-2023-211xx/CVE-2023-21117.json) (`2023-05-15T22:15:12.067`) -* [CVE-2023-21118](CVE-2023/CVE-2023-211xx/CVE-2023-21118.json) (`2023-05-15T22:15:12.107`) -* [CVE-2023-2124](CVE-2023/CVE-2023-21xx/CVE-2023-2124.json) (`2023-05-15T22:15:12.150`) -* [CVE-2023-2700](CVE-2023/CVE-2023-27xx/CVE-2023-2700.json) (`2023-05-15T22:15:12.207`) -* [CVE-2023-31131](CVE-2023/CVE-2023-311xx/CVE-2023-31131.json) (`2023-05-15T22:15:12.273`) +* [CVE-2023-29961](CVE-2023/CVE-2023-299xx/CVE-2023-29961.json) (`2023-05-16T01:15:09.067`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `1` -* [CVE-2022-20338](CVE-2022/CVE-2022-203xx/CVE-2022-20338.json) (`2023-05-15T22:15:10.237`) -* [CVE-2023-20993](CVE-2023/CVE-2023-209xx/CVE-2023-20993.json) (`2023-05-15T22:15:11.553`) +* [CVE-2023-26081](CVE-2023/CVE-2023-260xx/CVE-2023-26081.json) (`2023-05-16T00:15:09.087`) ## Download and Usage