Auto-Update: 2023-10-06T04:00:24.498090+00:00

This commit is contained in:
cad-safe-bot 2023-10-06 04:00:28 +00:00
parent 13581bd45e
commit e1caebcd20
6 changed files with 58 additions and 54 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41335",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T15:19:30.283",
"lastModified": "2023-09-30T02:02:45.680",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-06T03:15:10.263",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -11,7 +11,7 @@
},
{
"lang": "es",
"value": "Synapse es un servidor dom\u00e9stico Matrix de c\u00f3digo abierto escrito y mantenido por la Fundaci\u00f3n Matrix.org. Cuando los usuarios actualizan sus contrase\u00f1as, las nuevas credenciales pueden guardarse brevemente en la base de datos del servidor. Si bien esto no otorga al servidor ninguna capacidad adicional (ya aprende las contrase\u00f1as de los usuarios como parte del proceso de autenticaci\u00f3n), s\u00ed interrumpe la expectativa de que las contrase\u00f1as no se almacenen en la base de datos. Como resultado, estas contrase\u00f1as podr\u00edan quedar capturadas inadvertidamente en las copias de seguridad de la base de datos durante un per\u00edodo m\u00e1s prolongado. Estas contrase\u00f1as almacenadas temporalmente se borran autom\u00e1ticamente despu\u00e9s de un per\u00edodo de 48 horas. Este problema se solucion\u00f3 en la versi\u00f3n 1.93.0. Se recomienda a los usuarios que actualicen. No se conocen soluciones para este problema."
"value": "Synapse es un servidor dom\u00e9stico Matrix de c\u00f3digo abierto escrito y mantenido por la Fundaci\u00f3n Matrix.org. Cuando los usuarios actualizan sus contrase\u00f1as, las nuevas credenciales pueden guardarse brevemente en la base de datos del servidor. Si bien esto no otorga al servidor ninguna capacidad adicional (ya aprende las contrase\u00f1as de los usuarios como parte del proceso de autenticaci\u00f3n), s\u00ed interrumpe la expectativa de que las contrase\u00f1as no se almacenen en la base de datos. Como resultado, estas contrase\u00f1as podr\u00edan quedar capturadas inadvertidamente en las copias de seguridad de la base de datos durante un per\u00edodo m\u00e1s prolongado. Estas contrase\u00f1as almacenadas temporalmente se borran autom\u00e1ticamente despu\u00e9s de un per\u00edodo de 48 horas. Este problema se solucion\u00f3 en la versi\u00f3n 1.93.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para este problema."
}
],
"metrics": {
@ -104,6 +104,14 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AFB2Y3S2VCPCN5P2XCZTG24MBMZ7DM4/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65QPC55I4D27HIZP7H2NQ34EOXHPP4AO/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42453",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T15:19:32.453",
"lastModified": "2023-09-29T18:43:41.520",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-06T03:15:10.367",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -60,22 +60,22 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-285"
}
]
},
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
"value": "NVD-CWE-Other"
}
]
}
@ -114,6 +114,14 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AFB2Y3S2VCPCN5P2XCZTG24MBMZ7DM4/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65QPC55I4D27HIZP7H2NQ34EOXHPP4AO/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-42464",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-20T15:15:11.817",
"lastModified": "2023-09-25T23:15:10.243",
"lastModified": "2023-10-06T03:15:10.460",
"vulnStatus": "Modified",
"descriptions": [
{
@ -106,11 +106,12 @@
]
},
{
"url": "https://netatalk.sourceforge.io/2.0/htmldocs/afpd.8.html",
"source": "cve@mitre.org",
"tags": [
"Product"
]
"url": "https://netatalk.sourceforge.io/3.1/htmldocs/afpd.8.html",
"source": "cve@mitre.org"
},
{
"url": "https://netatalk.sourceforge.io/CVE-2023-42464.php",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5503",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42822",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T18:15:11.903",
"lastModified": "2023-10-02T18:54:32.737",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-06T03:15:10.543",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -102,6 +102,14 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFGL22QQF65OIZRMCKUZCVJQCKGUBRYE/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTXODUR4ILM7ZPA6ZGY6VSK4BBSBMKGY/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44488",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-30T20:15:10.200",
"lastModified": "2023-10-04T13:15:25.590",
"vulnStatus": "Modified",
"lastModified": "2023-10-06T03:15:10.647",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -158,6 +158,10 @@
{
"url": "https://security.gentoo.org/glsa/202310-04",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5518",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-10-05T23:55:25.095563+00:00
2023-10-06T04:00:24.498090+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-10-05T23:15:09.733000+00:00
2023-10-06T03:15:10.647000+00:00
```
### Last Data Feed Release
@ -23,7 +23,7 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2023-10-05T00:00:13.556232+00:00
2023-10-06T00:00:13.535152+00:00
```
### Total Number of included CVEs
@ -34,44 +34,19 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `0`
* [CVE-2015-10125](CVE-2015/CVE-2015-101xx/CVE-2015-10125.json) (`2023-10-05T23:15:09.330`)
* [CVE-2023-43269](CVE-2023/CVE-2023-432xx/CVE-2023-43269.json) (`2023-10-05T22:15:12.180`)
* [CVE-2023-43343](CVE-2023/CVE-2023-433xx/CVE-2023-43343.json) (`2023-10-05T22:15:12.237`)
* [CVE-2023-44211](CVE-2023/CVE-2023-442xx/CVE-2023-44211.json) (`2023-10-05T22:15:12.377`)
* [CVE-2023-44212](CVE-2023/CVE-2023-442xx/CVE-2023-44212.json) (`2023-10-05T22:15:12.447`)
* [CVE-2023-44213](CVE-2023/CVE-2023-442xx/CVE-2023-44213.json) (`2023-10-05T22:15:12.520`)
* [CVE-2023-44214](CVE-2023/CVE-2023-442xx/CVE-2023-44214.json) (`2023-10-05T22:15:12.587`)
* [CVE-2023-45240](CVE-2023/CVE-2023-452xx/CVE-2023-45240.json) (`2023-10-05T22:15:12.680`)
* [CVE-2023-45241](CVE-2023/CVE-2023-452xx/CVE-2023-45241.json) (`2023-10-05T22:15:12.757`)
* [CVE-2023-45242](CVE-2023/CVE-2023-452xx/CVE-2023-45242.json) (`2023-10-05T22:15:12.827`)
* [CVE-2023-45243](CVE-2023/CVE-2023-452xx/CVE-2023-45243.json) (`2023-10-05T22:15:12.890`)
### CVEs modified in the last Commit
Recently modified CVEs: `19`
Recently modified CVEs: `5`
* [CVE-2023-44210](CVE-2023/CVE-2023-442xx/CVE-2023-44210.json) (`2023-10-05T22:15:12.287`)
* [CVE-2023-4853](CVE-2023/CVE-2023-48xx/CVE-2023-4853.json) (`2023-10-05T22:15:12.977`)
* [CVE-2023-4911](CVE-2023/CVE-2023-49xx/CVE-2023-4911.json) (`2023-10-05T22:15:13.073`)
* [CVE-2023-32485](CVE-2023/CVE-2023-324xx/CVE-2023-32485.json) (`2023-10-05T23:14:04.503`)
* [CVE-2023-40745](CVE-2023/CVE-2023-407xx/CVE-2023-40745.json) (`2023-10-05T23:14:04.503`)
* [CVE-2023-41175](CVE-2023/CVE-2023-411xx/CVE-2023-41175.json) (`2023-10-05T23:14:04.503`)
* [CVE-2023-42754](CVE-2023/CVE-2023-427xx/CVE-2023-42754.json) (`2023-10-05T23:14:04.503`)
* [CVE-2023-42755](CVE-2023/CVE-2023-427xx/CVE-2023-42755.json) (`2023-10-05T23:14:04.503`)
* [CVE-2023-43260](CVE-2023/CVE-2023-432xx/CVE-2023-43260.json) (`2023-10-05T23:14:04.503`)
* [CVE-2023-40920](CVE-2023/CVE-2023-409xx/CVE-2023-40920.json) (`2023-10-05T23:14:04.503`)
* [CVE-2023-43284](CVE-2023/CVE-2023-432xx/CVE-2023-43284.json) (`2023-10-05T23:14:04.503`)
* [CVE-2023-43981](CVE-2023/CVE-2023-439xx/CVE-2023-43981.json) (`2023-10-05T23:14:04.503`)
* [CVE-2023-43983](CVE-2023/CVE-2023-439xx/CVE-2023-43983.json) (`2023-10-05T23:14:04.503`)
* [CVE-2023-44024](CVE-2023/CVE-2023-440xx/CVE-2023-44024.json) (`2023-10-05T23:14:04.503`)
* [CVE-2023-39323](CVE-2023/CVE-2023-393xx/CVE-2023-39323.json) (`2023-10-05T23:14:04.503`)
* [CVE-2023-5441](CVE-2023/CVE-2023-54xx/CVE-2023-5441.json) (`2023-10-05T23:14:04.503`)
* [CVE-2023-5169](CVE-2023/CVE-2023-51xx/CVE-2023-5169.json) (`2023-10-05T23:15:09.523`)
* [CVE-2023-5171](CVE-2023/CVE-2023-51xx/CVE-2023-5171.json) (`2023-10-05T23:15:09.640`)
* [CVE-2023-5217](CVE-2023/CVE-2023-52xx/CVE-2023-5217.json) (`2023-10-05T23:15:09.733`)
* [CVE-2023-41335](CVE-2023/CVE-2023-413xx/CVE-2023-41335.json) (`2023-10-06T03:15:10.263`)
* [CVE-2023-42453](CVE-2023/CVE-2023-424xx/CVE-2023-42453.json) (`2023-10-06T03:15:10.367`)
* [CVE-2023-42464](CVE-2023/CVE-2023-424xx/CVE-2023-42464.json) (`2023-10-06T03:15:10.460`)
* [CVE-2023-42822](CVE-2023/CVE-2023-428xx/CVE-2023-42822.json) (`2023-10-06T03:15:10.543`)
* [CVE-2023-44488](CVE-2023/CVE-2023-444xx/CVE-2023-44488.json) (`2023-10-06T03:15:10.647`)
## Download and Usage