From f3a9a74b451eea06758fc036848a2ab4e1b59f2e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 22 Sep 2023 22:00:27 +0000 Subject: [PATCH] Auto-Update: 2023-09-22T22:00:24.022474+00:00 --- CVE-2023/CVE-2023-205xx/CVE-2023-20593.json | 6 ++- CVE-2023/CVE-2023-384xx/CVE-2023-38408.json | 6 ++- CVE-2023/CVE-2023-38xx/CVE-2023-3817.json | 6 ++- CVE-2023/CVE-2023-409xx/CVE-2023-40989.json | 20 ++++++++++ README.md | 42 +++++---------------- 5 files changed, 44 insertions(+), 36 deletions(-) create mode 100644 CVE-2023/CVE-2023-409xx/CVE-2023-40989.json diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20593.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20593.json index ea8a879abf6..81a19d5f005 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20593.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20593.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20593", "sourceIdentifier": "psirt@amd.com", "published": "2023-07-24T20:15:10.237", - "lastModified": "2023-08-27T03:15:13.583", + "lastModified": "2023-09-22T21:15:09.800", "vulnStatus": "Modified", "descriptions": [ { @@ -2084,6 +2084,10 @@ "url": "http://www.openwall.com/lists/oss-security/2023/08/16/5", "source": "psirt@amd.com" }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9", + "source": "psirt@amd.com" + }, { "url": "http://xenbits.xen.org/xsa/advisory-433.html", "source": "psirt@amd.com", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json index e5da3848707..206a35a7c22 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38408", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-20T03:15:10.170", - "lastModified": "2023-08-17T19:15:12.520", + "lastModified": "2023-09-22T21:15:16.973", "vulnStatus": "Modified", "descriptions": [ { @@ -121,6 +121,10 @@ "Third Party Advisory" ] }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9", + "source": "cve@mitre.org" + }, { "url": "https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3817.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3817.json index 6e3a8744f5b..73b2c4cb5b2 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3817.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3817.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3817", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-07-31T16:15:10.497", - "lastModified": "2023-08-18T14:15:33.647", + "lastModified": "2023-09-22T21:15:20.033", "vulnStatus": "Modified", "descriptions": [ { @@ -428,6 +428,10 @@ "Mailing List" ] }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9", + "source": "openssl-security@openssl.org" + }, { "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "source": "openssl-security@openssl.org", diff --git a/CVE-2023/CVE-2023-409xx/CVE-2023-40989.json b/CVE-2023/CVE-2023-409xx/CVE-2023-40989.json new file mode 100644 index 00000000000..e5d9ab5b62c --- /dev/null +++ b/CVE-2023/CVE-2023-409xx/CVE-2023-40989.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40989", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-09-22T20:15:09.697", + "lastModified": "2023-09-22T20:15:09.697", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL injection vulnerbility in jeecgboot jeecg-boot v 3.0, 3.5.3 that allows a remote attacker to execute arbitrary code via a crafted request to the report/jeecgboot/jmreport/queryFieldBySql component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Zone1-Z/CVE-2023-40989/blob/main/CVE-2023-40989", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index efb5fc43b7f..b78c31e4591 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-09-22T20:00:24.443414+00:00 +2023-09-22T22:00:24.022474+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-09-22T19:33:28.297000+00:00 +2023-09-22T21:15:20.033000+00:00 ``` ### Last Data Feed Release @@ -29,47 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -226060 +226061 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `1` -* [CVE-2023-43640](CVE-2023/CVE-2023-436xx/CVE-2023-43640.json) (`2023-09-22T18:15:12.243`) -* [CVE-2023-38346](CVE-2023/CVE-2023-383xx/CVE-2023-38346.json) (`2023-09-22T19:15:09.593`) -* [CVE-2023-43270](CVE-2023/CVE-2023-432xx/CVE-2023-43270.json) (`2023-09-22T19:15:11.130`) +* [CVE-2023-40989](CVE-2023/CVE-2023-409xx/CVE-2023-40989.json) (`2023-09-22T20:15:09.697`) ### CVEs modified in the last Commit -Recently modified CVEs: `35` +Recently modified CVEs: `3` -* [CVE-2023-40043](CVE-2023/CVE-2023-400xx/CVE-2023-40043.json) (`2023-09-22T18:32:28.627`) -* [CVE-2023-2508](CVE-2023/CVE-2023-25xx/CVE-2023-2508.json) (`2023-09-22T18:32:46.273`) -* [CVE-2023-42464](CVE-2023/CVE-2023-424xx/CVE-2023-42464.json) (`2023-09-22T18:33:38.487`) -* [CVE-2023-4236](CVE-2023/CVE-2023-42xx/CVE-2023-4236.json) (`2023-09-22T18:35:33.337`) -* [CVE-2023-43478](CVE-2023/CVE-2023-434xx/CVE-2023-43478.json) (`2023-09-22T18:36:45.253`) -* [CVE-2023-43477](CVE-2023/CVE-2023-434xx/CVE-2023-43477.json) (`2023-09-22T18:37:02.227`) -* [CVE-2023-43499](CVE-2023/CVE-2023-434xx/CVE-2023-43499.json) (`2023-09-22T18:37:32.613`) -* [CVE-2023-43500](CVE-2023/CVE-2023-435xx/CVE-2023-43500.json) (`2023-09-22T18:38:58.530`) -* [CVE-2023-39675](CVE-2023/CVE-2023-396xx/CVE-2023-39675.json) (`2023-09-22T18:43:26.797`) -* [CVE-2023-39677](CVE-2023/CVE-2023-396xx/CVE-2023-39677.json) (`2023-09-22T18:48:49.313`) -* [CVE-2023-3341](CVE-2023/CVE-2023-33xx/CVE-2023-3341.json) (`2023-09-22T18:51:05.490`) -* [CVE-2023-42447](CVE-2023/CVE-2023-424xx/CVE-2023-42447.json) (`2023-09-22T18:51:51.093`) -* [CVE-2023-34575](CVE-2023/CVE-2023-345xx/CVE-2023-34575.json) (`2023-09-22T19:02:44.837`) -* [CVE-2023-43501](CVE-2023/CVE-2023-435xx/CVE-2023-43501.json) (`2023-09-22T19:04:23.370`) -* [CVE-2023-43502](CVE-2023/CVE-2023-435xx/CVE-2023-43502.json) (`2023-09-22T19:05:59.897`) -* [CVE-2023-41325](CVE-2023/CVE-2023-413xx/CVE-2023-41325.json) (`2023-09-22T19:07:17.333`) -* [CVE-2023-40368](CVE-2023/CVE-2023-403xx/CVE-2023-40368.json) (`2023-09-22T19:11:36.147`) -* [CVE-2023-38718](CVE-2023/CVE-2023-387xx/CVE-2023-38718.json) (`2023-09-22T19:14:47.537`) -* [CVE-2023-41910](CVE-2023/CVE-2023-419xx/CVE-2023-41910.json) (`2023-09-22T19:15:10.370`) -* [CVE-2023-20594](CVE-2023/CVE-2023-205xx/CVE-2023-20594.json) (`2023-09-22T19:16:57.037`) -* [CVE-2023-42321](CVE-2023/CVE-2023-423xx/CVE-2023-42321.json) (`2023-09-22T19:22:09.960`) -* [CVE-2023-42444](CVE-2023/CVE-2023-424xx/CVE-2023-42444.json) (`2023-09-22T19:22:42.097`) -* [CVE-2023-3892](CVE-2023/CVE-2023-38xx/CVE-2023-3892.json) (`2023-09-22T19:23:28.753`) -* [CVE-2023-41834](CVE-2023/CVE-2023-418xx/CVE-2023-41834.json) (`2023-09-22T19:24:02.097`) -* [CVE-2023-38876](CVE-2023/CVE-2023-388xx/CVE-2023-38876.json) (`2023-09-22T19:25:49.123`) +* [CVE-2023-20593](CVE-2023/CVE-2023-205xx/CVE-2023-20593.json) (`2023-09-22T21:15:09.800`) +* [CVE-2023-38408](CVE-2023/CVE-2023-384xx/CVE-2023-38408.json) (`2023-09-22T21:15:16.973`) +* [CVE-2023-3817](CVE-2023/CVE-2023-38xx/CVE-2023-3817.json) (`2023-09-22T21:15:20.033`) ## Download and Usage