Auto-Update: 2023-05-17 16:00:34.046651+00:00

This commit is contained in:
cad-safe-bot 2023-05-17 16:00:37 +00:00
parent 4a5baecb77
commit 428ed21f14
16 changed files with 1795 additions and 85 deletions

View File

@ -2,19 +2,77 @@
"id": "CVE-2021-31711",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-09T16:15:14.197",
"lastModified": "2023-05-09T17:37:00.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T14:34:05.743",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability found in Trippo ResponsiveFilemanager v.9.14.0 and before allows a remote attacker to execute arbitrary code via the sort_by parameter in the dialog.php file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:responsivefilemanager:responsivefilemanager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.4.10",
"matchCriteriaId": "097E3AFD-7F03-4CD4-B4BB-6B73C8622F63"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/trippo/ResponsiveFilemanager/issues/661",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
}
]
}

View File

@ -2,19 +2,83 @@
"id": "CVE-2022-4008",
"sourceIdentifier": "security@octopus.com",
"published": "2023-05-10T06:15:09.000",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T14:42:11.513",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.9",
"versionEndExcluding": "2022.3.11043",
"matchCriteriaId": "355FEA41-8D02-4F48-A2E0-84C4688B6797"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022.4.791",
"versionEndExcluding": "2022.4.8401",
"matchCriteriaId": "73AB9EB2-02C2-4DD5-93B1-93B3AEE61203"
}
]
}
]
}
],
"references": [
{
"url": "https://advisories.octopus.com/post/2023/sa2023-08/",
"source": "security@octopus.com"
"source": "security@octopus.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,39 +2,150 @@
"id": "CVE-2023-22441",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:11.160",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T15:37:23.017",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Missing authentication for critical function exists in Seiko Solutions SkyBridge series, which may allow a remote attacker to obtain or alter the setting information of the product or execute some critical functions without authentication, e.g., rebooting the product. Affected products and versions are as follows: SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, and SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:seiko-sol:skybridge_basic_mb-a130_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.4.1",
"matchCriteriaId": "F81B98BA-4C78-4798-B118-299B530081E6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:seiko-sol:skybridge_basic_mb-a130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCACF50-F197-41A7-934C-6BDBD043A560"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:seiko-sol:skybridge_mb-a200_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "01.00.05",
"matchCriteriaId": "F23AF765-AF0C-48B7-A3DA-1A70A303C2D9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:seiko-sol:skybridge_mb-a200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45CE4F45-5595-47E3-9BD4-47EA3D4F6E0E"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN40604023/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.seiko-sol.co.jp/archives/73969/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2617",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-10T06:15:16.853",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T15:52:34.300",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -61,7 +83,7 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -69,24 +91,66 @@
"value": "CWE-476"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndIncluding": "4.7.0",
"matchCriteriaId": "2F329482-7377-4F5C-A4FE-1422E54D8BAA"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/GZTimeWalker/3ca70a8af2f5830711e9cccc73fb5270",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/opencv/opencv_contrib/pull/3480",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://vuldb.com/?ctiid.228547",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.228547",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2618",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-10T06:15:17.577",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T15:54:19.420",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,22 +93,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.7.0",
"matchCriteriaId": "1108CEC2-E3CC-4F9C-B772-3A9216B1E195"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/opencv/opencv_contrib/pull/3484",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/opencv/opencv_contrib/pull/3484/commits/2b62ff6181163eea029ed1cab11363b4996e9cd6",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://vuldb.com/?ctiid.228548",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.228548",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,16 +2,49 @@
"id": "CVE-2023-28316",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-05-09T22:15:09.980",
"lastModified": "2023-05-10T02:29:55.237",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T14:55:34.737",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been discovered in the implementation of 2FA on the rocket.chat platform, where other active sessions are not invalidated upon activating 2FA. This could potentially allow an attacker to maintain access to a compromised account even after 2FA is enabled."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-384"
}
]
},
{
"source": "support@hackerone.com",
"type": "Secondary",
@ -23,10 +56,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rocket.chat:rocket.chat:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAE3A1B1-27A3-4FD5-BCE6-CC713F0C8B90"
}
]
}
]
}
],
"references": [
{
"url": "https://hackerone.com/reports/992280",
"source": "support@hackerone.com"
"source": "support@hackerone.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30837",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-08T17:15:12.007",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T15:11:27.660",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,14 +66,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vyper_project:vyper:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.3.8",
"matchCriteriaId": "BD6E3906-C87B-4245-9871-27CD85C32EEF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/vyperlang/vyper/commit/0bb7203b584e771b23536ba065a6efda457161bb",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-mgv8-gggw-mrg6",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30860",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-08T19:15:12.310",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T15:15:37.447",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,14 +66,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.4",
"matchCriteriaId": "C7827575-CC53-4298-AA70-AFD19408C79A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/WWBN/AVideo/security/advisories/GHSA-xr9h-p2rc-rpqm",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://youtu.be/Nke0Bmv5F-o",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31700",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-17T14:15:09.323",
"lastModified": "2023-05-17T14:15:09.323",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "TP-Link TL-WPA4530 KIT V2 (EU)_170406 and V2 (EU)_161115 is vulnerable to Command Injection via _httpRpmPlcDeviceAdd."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31701",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-17T14:15:09.383",
"lastModified": "2023-05-17T14:15:09.383",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "TP-Link TL-WPA4530 KIT V2 (EU)_170406 and V2 (EU)_161115 is vulnerable to Command Injection via _httpRpmPlcDeviceRemove."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31722",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-17T14:15:09.423",
"lastModified": "2023-05-17T14:15:09.423",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There exists a heap buffer overflow in nasm 2.16.02rc1 (GitHub commit: b952891)."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392857#c1",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-31723",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-17T15:15:08.873",
"lastModified": "2023-05-17T15:15:08.873",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function expand_mmac_params at /nasm/nasm-pp.c."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DaisyPo/fuzzing-vulncollect/blob/main/yasm/SEGV/nasm-pp.c:4008%20in%20expand_mmac_params/README.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yasm/yasm/issues/220",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-31724",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-17T15:15:08.917",
"lastModified": "2023-05-17T15:15:08.917",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function do_directive at /nasm/nasm-pp.c."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/SEGV/nasm-pp.c:3570%20in%20do_directive",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yasm/yasm/issues/222",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-31725",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-17T15:15:08.957",
"lastModified": "2023-05-17T15:15:08.957",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "yasm 1.3.0.55.g101bc was discovered to contain a heap-use-after-free via the function expand_mmac_params at yasm/modules/preprocs/nasm/nasm-pp.c."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yasm/yasm/issues/221",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-17T14:00:41.300725+00:00
2023-05-17T16:00:34.046651+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-17T13:57:44.233000+00:00
2023-05-17T15:54:19.420000+00:00
```
### Last Data Feed Release
@ -29,53 +29,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
215524
215530
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `6`
* [CVE-2023-2679](CVE-2023/CVE-2023-26xx/CVE-2023-2679.json) (`2023-05-17T13:15:09.283`)
* [CVE-2023-30438](CVE-2023/CVE-2023-304xx/CVE-2023-30438.json) (`2023-05-17T13:15:09.380`)
* [CVE-2023-31698](CVE-2023/CVE-2023-316xx/CVE-2023-31698.json) (`2023-05-17T13:15:09.463`)
* [CVE-2023-31699](CVE-2023/CVE-2023-316xx/CVE-2023-31699.json) (`2023-05-17T13:15:09.517`)
* [CVE-2023-31702](CVE-2023/CVE-2023-317xx/CVE-2023-31702.json) (`2023-05-17T13:15:09.567`)
* [CVE-2023-31703](CVE-2023/CVE-2023-317xx/CVE-2023-31703.json) (`2023-05-17T13:15:09.617`)
* [CVE-2023-31902](CVE-2023/CVE-2023-319xx/CVE-2023-31902.json) (`2023-05-17T13:15:09.667`)
* [CVE-2023-31903](CVE-2023/CVE-2023-319xx/CVE-2023-31903.json) (`2023-05-17T13:15:09.720`)
* [CVE-2023-31904](CVE-2023/CVE-2023-319xx/CVE-2023-31904.json) (`2023-05-17T13:15:09.777`)
* [CVE-2023-31700](CVE-2023/CVE-2023-317xx/CVE-2023-31700.json) (`2023-05-17T14:15:09.323`)
* [CVE-2023-31701](CVE-2023/CVE-2023-317xx/CVE-2023-31701.json) (`2023-05-17T14:15:09.383`)
* [CVE-2023-31722](CVE-2023/CVE-2023-317xx/CVE-2023-31722.json) (`2023-05-17T14:15:09.423`)
* [CVE-2023-31723](CVE-2023/CVE-2023-317xx/CVE-2023-31723.json) (`2023-05-17T15:15:08.873`)
* [CVE-2023-31724](CVE-2023/CVE-2023-317xx/CVE-2023-31724.json) (`2023-05-17T15:15:08.917`)
* [CVE-2023-31725](CVE-2023/CVE-2023-317xx/CVE-2023-31725.json) (`2023-05-17T15:15:08.957`)
### CVEs modified in the last Commit
Recently modified CVEs: `59`
Recently modified CVEs: `9`
* [CVE-2023-29280](CVE-2023/CVE-2023-292xx/CVE-2023-29280.json) (`2023-05-17T12:49:06.630`)
* [CVE-2023-29279](CVE-2023/CVE-2023-292xx/CVE-2023-29279.json) (`2023-05-17T12:49:18.707`)
* [CVE-2023-29277](CVE-2023/CVE-2023-292xx/CVE-2023-29277.json) (`2023-05-17T12:49:25.880`)
* [CVE-2023-29278](CVE-2023/CVE-2023-292xx/CVE-2023-29278.json) (`2023-05-17T12:49:36.830`)
* [CVE-2023-27385](CVE-2023/CVE-2023-273xx/CVE-2023-27385.json) (`2023-05-17T12:49:42.820`)
* [CVE-2023-29276](CVE-2023/CVE-2023-292xx/CVE-2023-29276.json) (`2023-05-17T12:49:50.070`)
* [CVE-2023-29275](CVE-2023/CVE-2023-292xx/CVE-2023-29275.json) (`2023-05-17T12:50:00.397`)
* [CVE-2023-29274](CVE-2023/CVE-2023-292xx/CVE-2023-29274.json) (`2023-05-17T12:50:06.257`)
* [CVE-2023-29273](CVE-2023/CVE-2023-292xx/CVE-2023-29273.json) (`2023-05-17T12:50:17.923`)
* [CVE-2023-2662](CVE-2023/CVE-2023-26xx/CVE-2023-2662.json) (`2023-05-17T12:53:16.877`)
* [CVE-2023-27889](CVE-2023/CVE-2023-278xx/CVE-2023-27889.json) (`2023-05-17T12:54:41.750`)
* [CVE-2023-29791](CVE-2023/CVE-2023-297xx/CVE-2023-29791.json) (`2023-05-17T12:54:44.870`)
* [CVE-2023-2661](CVE-2023/CVE-2023-26xx/CVE-2023-2661.json) (`2023-05-17T12:56:37.437`)
* [CVE-2023-27918](CVE-2023/CVE-2023-279xx/CVE-2023-27918.json) (`2023-05-17T12:56:58.967`)
* [CVE-2023-2660](CVE-2023/CVE-2023-26xx/CVE-2023-2660.json) (`2023-05-17T12:57:04.227`)
* [CVE-2023-2659](CVE-2023/CVE-2023-26xx/CVE-2023-2659.json) (`2023-05-17T12:57:38.140`)
* [CVE-2023-22720](CVE-2023/CVE-2023-227xx/CVE-2023-22720.json) (`2023-05-17T12:58:27.107`)
* [CVE-2023-2658](CVE-2023/CVE-2023-26xx/CVE-2023-2658.json) (`2023-05-17T12:58:56.517`)
* [CVE-2023-2657](CVE-2023/CVE-2023-26xx/CVE-2023-2657.json) (`2023-05-17T12:59:22.743`)
* [CVE-2023-29286](CVE-2023/CVE-2023-292xx/CVE-2023-29286.json) (`2023-05-17T13:01:05.513`)
* [CVE-2023-29285](CVE-2023/CVE-2023-292xx/CVE-2023-29285.json) (`2023-05-17T13:01:12.327`)
* [CVE-2023-29284](CVE-2023/CVE-2023-292xx/CVE-2023-29284.json) (`2023-05-17T13:01:17.987`)
* [CVE-2023-2656](CVE-2023/CVE-2023-26xx/CVE-2023-2656.json) (`2023-05-17T13:02:41.120`)
* [CVE-2023-2630](CVE-2023/CVE-2023-26xx/CVE-2023-2630.json) (`2023-05-17T13:16:52.083`)
* [CVE-2023-32066](CVE-2023/CVE-2023-320xx/CVE-2023-32066.json) (`2023-05-17T13:57:44.233`)
* [CVE-2021-31711](CVE-2021/CVE-2021-317xx/CVE-2021-31711.json) (`2023-05-17T14:34:05.743`)
* [CVE-2022-4008](CVE-2022/CVE-2022-40xx/CVE-2022-4008.json) (`2023-05-17T14:42:11.513`)
* [CVE-2023-27973](CVE-2023/CVE-2023-279xx/CVE-2023-27973.json) (`2023-05-17T14:53:00.670`)
* [CVE-2023-28316](CVE-2023/CVE-2023-283xx/CVE-2023-28316.json) (`2023-05-17T14:55:34.737`)
* [CVE-2023-30837](CVE-2023/CVE-2023-308xx/CVE-2023-30837.json) (`2023-05-17T15:11:27.660`)
* [CVE-2023-30860](CVE-2023/CVE-2023-308xx/CVE-2023-30860.json) (`2023-05-17T15:15:37.447`)
* [CVE-2023-22441](CVE-2023/CVE-2023-224xx/CVE-2023-22441.json) (`2023-05-17T15:37:23.017`)
* [CVE-2023-2617](CVE-2023/CVE-2023-26xx/CVE-2023-2617.json) (`2023-05-17T15:52:34.300`)
* [CVE-2023-2618](CVE-2023/CVE-2023-26xx/CVE-2023-2618.json) (`2023-05-17T15:54:19.420`)
## Download and Usage