From ec7ce5fd53a5b0c683da7361d44c2b4dbef2b8d6 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 8 Jul 2023 04:00:30 +0000 Subject: [PATCH] Auto-Update: 2023-07-08T04:00:27.424645+00:00 --- CVE-2022/CVE-2022-436xx/CVE-2022-43684.json | 10 +++++- CVE-2023/CVE-2023-325xx/CVE-2023-32570.json | 6 +++- README.md | 36 ++++----------------- 3 files changed, 20 insertions(+), 32 deletions(-) diff --git a/CVE-2022/CVE-2022-436xx/CVE-2022-43684.json b/CVE-2022/CVE-2022-436xx/CVE-2022-43684.json index ae0d1ae8229..d07b4e15d77 100644 --- a/CVE-2022/CVE-2022-436xx/CVE-2022-43684.json +++ b/CVE-2022/CVE-2022-436xx/CVE-2022-43684.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43684", "sourceIdentifier": "psirt@servicenow.com", "published": "2023-06-13T19:15:09.243", - "lastModified": "2023-07-07T20:15:09.707", + "lastModified": "2023-07-08T02:15:09.343", "vulnStatus": "Modified", "descriptions": [ { @@ -458,12 +458,20 @@ "url": "http://seclists.org/fulldisclosure/2023/Jul/11", "source": "psirt@servicenow.com" }, + { + "url": "https://news.ycombinator.com/item?id=36638530", + "source": "psirt@servicenow.com" + }, { "url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1303489", "source": "psirt@servicenow.com", "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://x64.sh/posts/ServiceNow-Insecure-access-control-to-admin/", + "source": "psirt@servicenow.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32570.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32570.json index 15f6e3a9755..7caa0f599f4 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32570.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32570.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32570", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T05:15:12.190", - "lastModified": "2023-06-24T03:15:08.947", + "lastModified": "2023-07-08T03:15:09.343", "vulnStatus": "Modified", "descriptions": [ { @@ -79,6 +79,10 @@ "Release Notes" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WGSO7UMOF4MVLQ5H6KIV7OG6ONS377B/", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LXZ6CUNJFDJLCFOZHY2TIGMCAEITLCRP/", "source": "cve@mitre.org" diff --git a/README.md b/README.md index 9c9353ba0f8..e07ad1fe55e 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-07-08T02:00:30.806970+00:00 +2023-07-08T04:00:27.424645+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-07-08T01:20:00.437000+00:00 +2023-07-08T03:15:09.343000+00:00 ``` ### Last Data Feed Release @@ -34,40 +34,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `0` -* [CVE-2023-32000](CVE-2023/CVE-2023-320xx/CVE-2023-32000.json) (`2023-07-08T00:15:09.653`) ### CVEs modified in the last Commit -Recently modified CVEs: `34` +Recently modified CVEs: `2` -* [CVE-2021-4391](CVE-2021/CVE-2021-43xx/CVE-2021-4391.json) (`2023-07-08T00:02:31.327`) -* [CVE-2021-4390](CVE-2021/CVE-2021-43xx/CVE-2021-4390.json) (`2023-07-08T00:02:37.307`) -* [CVE-2021-4399](CVE-2021/CVE-2021-43xx/CVE-2021-4399.json) (`2023-07-08T00:03:28.733`) -* [CVE-2021-4402](CVE-2021/CVE-2021-44xx/CVE-2021-4402.json) (`2023-07-08T00:05:14.903`) -* [CVE-2021-4401](CVE-2021/CVE-2021-44xx/CVE-2021-4401.json) (`2023-07-08T00:07:04.170`) -* [CVE-2021-4400](CVE-2021/CVE-2021-44xx/CVE-2021-4400.json) (`2023-07-08T00:13:31.993`) -* [CVE-2021-4403](CVE-2021/CVE-2021-44xx/CVE-2021-4403.json) (`2023-07-08T00:16:20.603`) -* [CVE-2021-4404](CVE-2021/CVE-2021-44xx/CVE-2021-4404.json) (`2023-07-08T00:21:21.363`) -* [CVE-2021-4389](CVE-2021/CVE-2021-43xx/CVE-2021-4389.json) (`2023-07-08T00:34:23.380`) -* [CVE-2021-4405](CVE-2021/CVE-2021-44xx/CVE-2021-4405.json) (`2023-07-08T01:13:48.213`) -* [CVE-2022-44720](CVE-2022/CVE-2022-447xx/CVE-2022-44720.json) (`2023-07-08T00:27:37.807`) -* [CVE-2023-27469](CVE-2023/CVE-2023-274xx/CVE-2023-27469.json) (`2023-07-07T23:55:51.067`) -* [CVE-2023-20754](CVE-2023/CVE-2023-207xx/CVE-2023-20754.json) (`2023-07-07T23:56:37.327`) -* [CVE-2023-20690](CVE-2023/CVE-2023-206xx/CVE-2023-20690.json) (`2023-07-07T23:57:12.433`) -* [CVE-2023-35946](CVE-2023/CVE-2023-359xx/CVE-2023-35946.json) (`2023-07-07T23:58:40.233`) -* [CVE-2023-26136](CVE-2023/CVE-2023-261xx/CVE-2023-26136.json) (`2023-07-08T00:02:00.740`) -* [CVE-2023-30549](CVE-2023/CVE-2023-305xx/CVE-2023-30549.json) (`2023-07-08T00:15:09.500`) -* [CVE-2023-32439](CVE-2023/CVE-2023-324xx/CVE-2023-32439.json) (`2023-07-08T00:15:09.713`) -* [CVE-2023-37201](CVE-2023/CVE-2023-372xx/CVE-2023-37201.json) (`2023-07-08T00:15:09.807`) -* [CVE-2023-37202](CVE-2023/CVE-2023-372xx/CVE-2023-37202.json) (`2023-07-08T00:15:09.890`) -* [CVE-2023-37207](CVE-2023/CVE-2023-372xx/CVE-2023-37207.json) (`2023-07-08T00:15:09.960`) -* [CVE-2023-37208](CVE-2023/CVE-2023-372xx/CVE-2023-37208.json) (`2023-07-08T00:15:10.017`) -* [CVE-2023-37211](CVE-2023/CVE-2023-372xx/CVE-2023-37211.json) (`2023-07-08T00:15:10.097`) -* [CVE-2023-20136](CVE-2023/CVE-2023-201xx/CVE-2023-20136.json) (`2023-07-08T00:38:51.887`) -* [CVE-2023-20116](CVE-2023/CVE-2023-201xx/CVE-2023-20116.json) (`2023-07-08T01:20:00.437`) +* [CVE-2022-43684](CVE-2022/CVE-2022-436xx/CVE-2022-43684.json) (`2023-07-08T02:15:09.343`) +* [CVE-2023-32570](CVE-2023/CVE-2023-325xx/CVE-2023-32570.json) (`2023-07-08T03:15:09.343`) ## Download and Usage