Auto-Update: 2023-09-22T22:00:24.022474+00:00

This commit is contained in:
cad-safe-bot 2023-09-22 22:00:27 +00:00
parent 0b232c3dba
commit f3a9a74b45
5 changed files with 44 additions and 36 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20593",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-07-24T20:15:10.237",
"lastModified": "2023-08-27T03:15:13.583",
"lastModified": "2023-09-22T21:15:09.800",
"vulnStatus": "Modified",
"descriptions": [
{
@ -2084,6 +2084,10 @@
"url": "http://www.openwall.com/lists/oss-security/2023/08/16/5",
"source": "psirt@amd.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/9",
"source": "psirt@amd.com"
},
{
"url": "http://xenbits.xen.org/xsa/advisory-433.html",
"source": "psirt@amd.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38408",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-20T03:15:10.170",
"lastModified": "2023-08-17T19:15:12.520",
"lastModified": "2023-09-22T21:15:16.973",
"vulnStatus": "Modified",
"descriptions": [
{
@ -121,6 +121,10 @@
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/9",
"source": "cve@mitre.org"
},
{
"url": "https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3817",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-07-31T16:15:10.497",
"lastModified": "2023-08-18T14:15:33.647",
"lastModified": "2023-09-22T21:15:20.033",
"vulnStatus": "Modified",
"descriptions": [
{
@ -428,6 +428,10 @@
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/9",
"source": "openssl-security@openssl.org"
},
{
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5",
"source": "openssl-security@openssl.org",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-40989",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-22T20:15:09.697",
"lastModified": "2023-09-22T20:15:09.697",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerbility in jeecgboot jeecg-boot v 3.0, 3.5.3 that allows a remote attacker to execute arbitrary code via a crafted request to the report/jeecgboot/jmreport/queryFieldBySql component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Zone1-Z/CVE-2023-40989/blob/main/CVE-2023-40989",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-22T20:00:24.443414+00:00
2023-09-22T22:00:24.022474+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-22T19:33:28.297000+00:00
2023-09-22T21:15:20.033000+00:00
```
### Last Data Feed Release
@ -29,47 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
226060
226061
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `1`
* [CVE-2023-43640](CVE-2023/CVE-2023-436xx/CVE-2023-43640.json) (`2023-09-22T18:15:12.243`)
* [CVE-2023-38346](CVE-2023/CVE-2023-383xx/CVE-2023-38346.json) (`2023-09-22T19:15:09.593`)
* [CVE-2023-43270](CVE-2023/CVE-2023-432xx/CVE-2023-43270.json) (`2023-09-22T19:15:11.130`)
* [CVE-2023-40989](CVE-2023/CVE-2023-409xx/CVE-2023-40989.json) (`2023-09-22T20:15:09.697`)
### CVEs modified in the last Commit
Recently modified CVEs: `35`
Recently modified CVEs: `3`
* [CVE-2023-40043](CVE-2023/CVE-2023-400xx/CVE-2023-40043.json) (`2023-09-22T18:32:28.627`)
* [CVE-2023-2508](CVE-2023/CVE-2023-25xx/CVE-2023-2508.json) (`2023-09-22T18:32:46.273`)
* [CVE-2023-42464](CVE-2023/CVE-2023-424xx/CVE-2023-42464.json) (`2023-09-22T18:33:38.487`)
* [CVE-2023-4236](CVE-2023/CVE-2023-42xx/CVE-2023-4236.json) (`2023-09-22T18:35:33.337`)
* [CVE-2023-43478](CVE-2023/CVE-2023-434xx/CVE-2023-43478.json) (`2023-09-22T18:36:45.253`)
* [CVE-2023-43477](CVE-2023/CVE-2023-434xx/CVE-2023-43477.json) (`2023-09-22T18:37:02.227`)
* [CVE-2023-43499](CVE-2023/CVE-2023-434xx/CVE-2023-43499.json) (`2023-09-22T18:37:32.613`)
* [CVE-2023-43500](CVE-2023/CVE-2023-435xx/CVE-2023-43500.json) (`2023-09-22T18:38:58.530`)
* [CVE-2023-39675](CVE-2023/CVE-2023-396xx/CVE-2023-39675.json) (`2023-09-22T18:43:26.797`)
* [CVE-2023-39677](CVE-2023/CVE-2023-396xx/CVE-2023-39677.json) (`2023-09-22T18:48:49.313`)
* [CVE-2023-3341](CVE-2023/CVE-2023-33xx/CVE-2023-3341.json) (`2023-09-22T18:51:05.490`)
* [CVE-2023-42447](CVE-2023/CVE-2023-424xx/CVE-2023-42447.json) (`2023-09-22T18:51:51.093`)
* [CVE-2023-34575](CVE-2023/CVE-2023-345xx/CVE-2023-34575.json) (`2023-09-22T19:02:44.837`)
* [CVE-2023-43501](CVE-2023/CVE-2023-435xx/CVE-2023-43501.json) (`2023-09-22T19:04:23.370`)
* [CVE-2023-43502](CVE-2023/CVE-2023-435xx/CVE-2023-43502.json) (`2023-09-22T19:05:59.897`)
* [CVE-2023-41325](CVE-2023/CVE-2023-413xx/CVE-2023-41325.json) (`2023-09-22T19:07:17.333`)
* [CVE-2023-40368](CVE-2023/CVE-2023-403xx/CVE-2023-40368.json) (`2023-09-22T19:11:36.147`)
* [CVE-2023-38718](CVE-2023/CVE-2023-387xx/CVE-2023-38718.json) (`2023-09-22T19:14:47.537`)
* [CVE-2023-41910](CVE-2023/CVE-2023-419xx/CVE-2023-41910.json) (`2023-09-22T19:15:10.370`)
* [CVE-2023-20594](CVE-2023/CVE-2023-205xx/CVE-2023-20594.json) (`2023-09-22T19:16:57.037`)
* [CVE-2023-42321](CVE-2023/CVE-2023-423xx/CVE-2023-42321.json) (`2023-09-22T19:22:09.960`)
* [CVE-2023-42444](CVE-2023/CVE-2023-424xx/CVE-2023-42444.json) (`2023-09-22T19:22:42.097`)
* [CVE-2023-3892](CVE-2023/CVE-2023-38xx/CVE-2023-3892.json) (`2023-09-22T19:23:28.753`)
* [CVE-2023-41834](CVE-2023/CVE-2023-418xx/CVE-2023-41834.json) (`2023-09-22T19:24:02.097`)
* [CVE-2023-38876](CVE-2023/CVE-2023-388xx/CVE-2023-38876.json) (`2023-09-22T19:25:49.123`)
* [CVE-2023-20593](CVE-2023/CVE-2023-205xx/CVE-2023-20593.json) (`2023-09-22T21:15:09.800`)
* [CVE-2023-38408](CVE-2023/CVE-2023-384xx/CVE-2023-38408.json) (`2023-09-22T21:15:16.973`)
* [CVE-2023-3817](CVE-2023/CVE-2023-38xx/CVE-2023-3817.json) (`2023-09-22T21:15:20.033`)
## Download and Usage