Auto-Update: 2023-08-01T10:00:31.536373+00:00

This commit is contained in:
cad-safe-bot 2023-08-01 10:00:35 +00:00
parent 0debce1ce5
commit 1f0f79d8b5
4 changed files with 28 additions and 26 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-39820", "id": "CVE-2021-39820",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2022-06-15T17:15:08.403", "published": "2022-06-15T17:15:08.403",
"lastModified": "2023-06-26T17:57:14.253", "lastModified": "2023-08-01T09:15:09.630",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Adobe InDesign versions 16.3 (and earlier), and 16.3.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability." "value": "Adobe InDesign versions 16.3 (and earlier), and 16.3.1 (and earlier) is affected by an Out-of-bounds Write vulnerability due to insecure handling of a malicious TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability."
}, },
{ {
"lang": "es", "lang": "es",
@ -21,8 +21,8 @@
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK", "attackVector": "LOCAL",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
"userInteraction": "REQUIRED", "userInteraction": "REQUIRED",
@ -30,10 +30,10 @@
"confidentialityImpact": "HIGH", "confidentialityImpact": "HIGH",
"integrityImpact": "HIGH", "integrityImpact": "HIGH",
"availabilityImpact": "HIGH", "availabilityImpact": "HIGH",
"baseScore": 8.8, "baseScore": 7.8,
"baseSeverity": "HIGH" "baseSeverity": "HIGH"
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 1.8,
"impactScore": 5.9 "impactScore": 5.9
} }
], ],
@ -65,7 +65,7 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "nvd@nist.gov", "source": "psirt@adobe.com",
"type": "Primary", "type": "Primary",
"description": [ "description": [
{ {
@ -75,12 +75,12 @@
] ]
}, },
{ {
"source": "psirt@adobe.com", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-788" "value": "CWE-787"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-43754", "id": "CVE-2021-43754",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2022-06-15T19:15:10.207", "published": "2022-06-15T19:15:10.207",
"lastModified": "2023-06-26T17:49:51.797", "lastModified": "2023-08-01T09:15:10.207",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Adobe Prelude version 22.1.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability." "value": "Adobe Prelude version 22.1.1 (and earlier) is affected by an Out-of-bounds Write vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability."
}, },
{ {
"lang": "es", "lang": "es",
@ -65,7 +65,7 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "nvd@nist.gov", "source": "psirt@adobe.com",
"type": "Primary", "type": "Primary",
"description": [ "description": [
{ {
@ -75,12 +75,12 @@
] ]
}, },
{ {
"source": "psirt@adobe.com", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-788" "value": "CWE-787"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-43755", "id": "CVE-2021-43755",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2022-06-15T20:15:17.440", "published": "2022-06-15T20:15:17.440",
"lastModified": "2023-06-26T17:49:31.020", "lastModified": "2023-08-01T09:15:10.330",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Adobe After Effects versions 22.0 (and earlier) and 18.4.2 (and earlier) are affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability." "value": "Adobe After Effects versions 22.0 (and earlier) and 18.4.2 (and earlier) are affected by an Out-of-bounds Write vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability."
}, },
{ {
"lang": "es", "lang": "es",
@ -65,7 +65,7 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "nvd@nist.gov", "source": "psirt@adobe.com",
"type": "Primary", "type": "Primary",
"description": [ "description": [
{ {
@ -75,12 +75,12 @@
] ]
}, },
{ {
"source": "psirt@adobe.com", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-788" "value": "CWE-787"
} }
] ]
} }

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-08-01T08:00:26.765302+00:00 2023-08-01T10:00:31.536373+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-08-01T06:15:09.880000+00:00 2023-08-01T09:15:10.330000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -40,9 +40,11 @@ Recently added CVEs: `0`
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `1` Recently modified CVEs: `3`
* [CVE-2023-32001](CVE-2023/CVE-2023-320xx/CVE-2023-32001.json) (`2023-08-01T06:15:09.880`) * [CVE-2021-39820](CVE-2021/CVE-2021-398xx/CVE-2021-39820.json) (`2023-08-01T09:15:09.630`)
* [CVE-2021-43754](CVE-2021/CVE-2021-437xx/CVE-2021-43754.json) (`2023-08-01T09:15:10.207`)
* [CVE-2021-43755](CVE-2021/CVE-2021-437xx/CVE-2021-43755.json) (`2023-08-01T09:15:10.330`)
## Download and Usage ## Download and Usage