diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23583.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23583.json index ecfe420a857..009cf7c7cef 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23583.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23583.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23583", "sourceIdentifier": "secure@intel.com", "published": "2023-11-14T19:15:18.113", - "lastModified": "2023-11-16T22:15:27.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-24T02:15:42.207", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -79,6 +79,10 @@ "url": "https://security.netapp.com/advisory/ntap-20231116-0015/", "source": "secure@intel.com" }, + { + "url": "https://www.debian.org/security/2023/dsa-5563", + "source": "secure@intel.com" + }, { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html", "source": "secure@intel.com" diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33706.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33706.json new file mode 100644 index 00000000000..aad91bbbd7c --- /dev/null +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33706.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33706", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-24T02:15:42.323", + "lastModified": "2023-11-24T02:15:42.323", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SysAid before 23.2.15 allows Indirect Object Reference (IDOR) attacks to read ticket data via a modified sid parameter to EmailHtmlSourceIframe.jsp or a modified srID parameter to ShowMessage.jsp." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.pridesec.com.br/en/insecure-direct-object-reference-idor-affects-helpdesk-sysaid/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6204.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6204.json index 70676461588..e9b8ee9abff 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6204.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6204.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6204", "sourceIdentifier": "security@mozilla.org", "published": "2023-11-21T15:15:07.687", - "lastModified": "2023-11-23T01:15:08.043", + "lastModified": "2023-11-24T01:15:07.213", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1841050", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5561", "source": "security@mozilla.org" diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6205.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6205.json index f9cf95035d5..1fedae9c5d7 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6205.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6205.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6205", "sourceIdentifier": "security@mozilla.org", "published": "2023-11-21T15:15:07.737", - "lastModified": "2023-11-23T01:15:08.090", + "lastModified": "2023-11-24T01:15:07.297", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1854076", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5561", "source": "security@mozilla.org" diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6206.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6206.json index 56e01b55062..3a79386c661 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6206.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6206.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6206", "sourceIdentifier": "security@mozilla.org", "published": "2023-11-21T15:15:07.787", - "lastModified": "2023-11-23T01:15:08.130", + "lastModified": "2023-11-24T01:15:07.360", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1857430", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5561", "source": "security@mozilla.org" diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6207.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6207.json index 3e2f0bc46cf..680848f90ff 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6207.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6207.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6207", "sourceIdentifier": "security@mozilla.org", "published": "2023-11-21T15:15:07.843", - "lastModified": "2023-11-23T01:15:08.167", + "lastModified": "2023-11-24T01:15:07.420", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1861344", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5561", "source": "security@mozilla.org" diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6208.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6208.json index 6fc43e96aab..ab3ac850c7a 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6208.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6208.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6208", "sourceIdentifier": "security@mozilla.org", "published": "2023-11-21T15:15:07.900", - "lastModified": "2023-11-23T01:15:08.210", + "lastModified": "2023-11-24T01:15:07.467", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1855345", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5561", "source": "security@mozilla.org" diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6209.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6209.json index fc8f4b40c9d..5f4a95b7d8d 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6209.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6209.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6209", "sourceIdentifier": "security@mozilla.org", "published": "2023-11-21T15:15:07.957", - "lastModified": "2023-11-23T01:15:08.247", + "lastModified": "2023-11-24T01:15:07.523", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1858570", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5561", "source": "security@mozilla.org" diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6212.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6212.json index 1651268abbd..f395341ef26 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6212.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6212.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6212", "sourceIdentifier": "security@mozilla.org", "published": "2023-11-21T15:15:08.110", - "lastModified": "2023-11-23T01:15:08.287", + "lastModified": "2023-11-24T01:15:07.580", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5561", "source": "security@mozilla.org" diff --git a/README.md b/README.md index 4d77f4b3b4e..f0d0f397872 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-24T00:55:47.959716+00:00 +2023-11-24T03:01:49.110851+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-24T00:15:10.280000+00:00 +2023-11-24T02:15:42.323000+00:00 ``` ### Last Data Feed Release @@ -23,27 +23,34 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2023-11-23T01:00:13.565661+00:00 +2023-11-24T01:00:13.558450+00:00 ``` ### Total Number of included CVEs ```plain -231468 +231469 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `1` -* [CVE-2021-39008](CVE-2021/CVE-2021-390xx/CVE-2021-39008.json) (`2023-11-23T23:15:07.353`) -* [CVE-2023-26279](CVE-2023/CVE-2023-262xx/CVE-2023-26279.json) (`2023-11-24T00:15:10.280`) +* [CVE-2023-33706](CVE-2023/CVE-2023-337xx/CVE-2023-33706.json) (`2023-11-24T02:15:42.323`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `8` +* [CVE-2023-6204](CVE-2023/CVE-2023-62xx/CVE-2023-6204.json) (`2023-11-24T01:15:07.213`) +* [CVE-2023-6205](CVE-2023/CVE-2023-62xx/CVE-2023-6205.json) (`2023-11-24T01:15:07.297`) +* [CVE-2023-6206](CVE-2023/CVE-2023-62xx/CVE-2023-6206.json) (`2023-11-24T01:15:07.360`) +* [CVE-2023-6207](CVE-2023/CVE-2023-62xx/CVE-2023-6207.json) (`2023-11-24T01:15:07.420`) +* [CVE-2023-6208](CVE-2023/CVE-2023-62xx/CVE-2023-6208.json) (`2023-11-24T01:15:07.467`) +* [CVE-2023-6209](CVE-2023/CVE-2023-62xx/CVE-2023-6209.json) (`2023-11-24T01:15:07.523`) +* [CVE-2023-6212](CVE-2023/CVE-2023-62xx/CVE-2023-6212.json) (`2023-11-24T01:15:07.580`) +* [CVE-2023-23583](CVE-2023/CVE-2023-235xx/CVE-2023-23583.json) (`2023-11-24T02:15:42.207`) ## Download and Usage