Auto-Update: 2023-07-08T04:00:27.424645+00:00

This commit is contained in:
cad-safe-bot 2023-07-08 04:00:30 +00:00
parent e7809ac9ae
commit ec7ce5fd53
3 changed files with 20 additions and 32 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-43684", "id": "CVE-2022-43684",
"sourceIdentifier": "psirt@servicenow.com", "sourceIdentifier": "psirt@servicenow.com",
"published": "2023-06-13T19:15:09.243", "published": "2023-06-13T19:15:09.243",
"lastModified": "2023-07-07T20:15:09.707", "lastModified": "2023-07-08T02:15:09.343",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -458,12 +458,20 @@
"url": "http://seclists.org/fulldisclosure/2023/Jul/11", "url": "http://seclists.org/fulldisclosure/2023/Jul/11",
"source": "psirt@servicenow.com" "source": "psirt@servicenow.com"
}, },
{
"url": "https://news.ycombinator.com/item?id=36638530",
"source": "psirt@servicenow.com"
},
{ {
"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1303489", "url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1303489",
"source": "psirt@servicenow.com", "source": "psirt@servicenow.com",
"tags": [ "tags": [
"Vendor Advisory" "Vendor Advisory"
] ]
},
{
"url": "https://x64.sh/posts/ServiceNow-Insecure-access-control-to-admin/",
"source": "psirt@servicenow.com"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32570", "id": "CVE-2023-32570",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T05:15:12.190", "published": "2023-05-10T05:15:12.190",
"lastModified": "2023-06-24T03:15:08.947", "lastModified": "2023-07-08T03:15:09.343",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -79,6 +79,10 @@
"Release Notes" "Release Notes"
] ]
}, },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WGSO7UMOF4MVLQ5H6KIV7OG6ONS377B/",
"source": "cve@mitre.org"
},
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LXZ6CUNJFDJLCFOZHY2TIGMCAEITLCRP/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LXZ6CUNJFDJLCFOZHY2TIGMCAEITLCRP/",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-07-08T02:00:30.806970+00:00 2023-07-08T04:00:27.424645+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-07-08T01:20:00.437000+00:00 2023-07-08T03:15:09.343000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -34,40 +34,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `1` Recently added CVEs: `0`
* [CVE-2023-32000](CVE-2023/CVE-2023-320xx/CVE-2023-32000.json) (`2023-07-08T00:15:09.653`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `34` Recently modified CVEs: `2`
* [CVE-2021-4391](CVE-2021/CVE-2021-43xx/CVE-2021-4391.json) (`2023-07-08T00:02:31.327`) * [CVE-2022-43684](CVE-2022/CVE-2022-436xx/CVE-2022-43684.json) (`2023-07-08T02:15:09.343`)
* [CVE-2021-4390](CVE-2021/CVE-2021-43xx/CVE-2021-4390.json) (`2023-07-08T00:02:37.307`) * [CVE-2023-32570](CVE-2023/CVE-2023-325xx/CVE-2023-32570.json) (`2023-07-08T03:15:09.343`)
* [CVE-2021-4399](CVE-2021/CVE-2021-43xx/CVE-2021-4399.json) (`2023-07-08T00:03:28.733`)
* [CVE-2021-4402](CVE-2021/CVE-2021-44xx/CVE-2021-4402.json) (`2023-07-08T00:05:14.903`)
* [CVE-2021-4401](CVE-2021/CVE-2021-44xx/CVE-2021-4401.json) (`2023-07-08T00:07:04.170`)
* [CVE-2021-4400](CVE-2021/CVE-2021-44xx/CVE-2021-4400.json) (`2023-07-08T00:13:31.993`)
* [CVE-2021-4403](CVE-2021/CVE-2021-44xx/CVE-2021-4403.json) (`2023-07-08T00:16:20.603`)
* [CVE-2021-4404](CVE-2021/CVE-2021-44xx/CVE-2021-4404.json) (`2023-07-08T00:21:21.363`)
* [CVE-2021-4389](CVE-2021/CVE-2021-43xx/CVE-2021-4389.json) (`2023-07-08T00:34:23.380`)
* [CVE-2021-4405](CVE-2021/CVE-2021-44xx/CVE-2021-4405.json) (`2023-07-08T01:13:48.213`)
* [CVE-2022-44720](CVE-2022/CVE-2022-447xx/CVE-2022-44720.json) (`2023-07-08T00:27:37.807`)
* [CVE-2023-27469](CVE-2023/CVE-2023-274xx/CVE-2023-27469.json) (`2023-07-07T23:55:51.067`)
* [CVE-2023-20754](CVE-2023/CVE-2023-207xx/CVE-2023-20754.json) (`2023-07-07T23:56:37.327`)
* [CVE-2023-20690](CVE-2023/CVE-2023-206xx/CVE-2023-20690.json) (`2023-07-07T23:57:12.433`)
* [CVE-2023-35946](CVE-2023/CVE-2023-359xx/CVE-2023-35946.json) (`2023-07-07T23:58:40.233`)
* [CVE-2023-26136](CVE-2023/CVE-2023-261xx/CVE-2023-26136.json) (`2023-07-08T00:02:00.740`)
* [CVE-2023-30549](CVE-2023/CVE-2023-305xx/CVE-2023-30549.json) (`2023-07-08T00:15:09.500`)
* [CVE-2023-32439](CVE-2023/CVE-2023-324xx/CVE-2023-32439.json) (`2023-07-08T00:15:09.713`)
* [CVE-2023-37201](CVE-2023/CVE-2023-372xx/CVE-2023-37201.json) (`2023-07-08T00:15:09.807`)
* [CVE-2023-37202](CVE-2023/CVE-2023-372xx/CVE-2023-37202.json) (`2023-07-08T00:15:09.890`)
* [CVE-2023-37207](CVE-2023/CVE-2023-372xx/CVE-2023-37207.json) (`2023-07-08T00:15:09.960`)
* [CVE-2023-37208](CVE-2023/CVE-2023-372xx/CVE-2023-37208.json) (`2023-07-08T00:15:10.017`)
* [CVE-2023-37211](CVE-2023/CVE-2023-372xx/CVE-2023-37211.json) (`2023-07-08T00:15:10.097`)
* [CVE-2023-20136](CVE-2023/CVE-2023-201xx/CVE-2023-20136.json) (`2023-07-08T00:38:51.887`)
* [CVE-2023-20116](CVE-2023/CVE-2023-201xx/CVE-2023-20116.json) (`2023-07-08T01:20:00.437`)
## Download and Usage ## Download and Usage