Auto-Update: 2023-05-16T00:00:23.886731+00:00

This commit is contained in:
René Helmke 2023-05-16 02:00:27 +02:00
parent 2a59028166
commit 4cfd0dfca9
47 changed files with 1020 additions and 28 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-0877",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:10.163",
"lastModified": "2023-05-15T22:15:10.163",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Product: AndroidVersions: Android SoCAndroid ID: A-273754094"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-20338",
"sourceIdentifier": "security@android.com",
"published": "2022-08-12T15:15:12.997",
"lastModified": "2022-08-16T10:59:08.483",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-15T22:15:10.237",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In Core Utilities, there is a possible way to craft a malformed Uri object due to improper input validation. This could lead to local escalation of privilege, preventing processes from validating URIs correctly, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-171966843"
"value": "In HierarchicalUri.readFrom of Uri.java, there is a possible way to craft a malformed Uri object due to improper input validation. This could lead to a local escalation of privilege, preventing processes from validating URIs correctly, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-171966843"
},
{
"lang": "es",
@ -69,11 +69,8 @@
],
"references": [
{
"url": "https://source.android.com/security/bulletin/android-13",
"source": "security@android.com",
"tags": [
"Vendor Advisory"
]
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2023-1729",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-15T22:15:10.350",
"lastModified": "2023-05-15T22:15:10.350",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash."
}
],
"metrics": {},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188240",
"source": "secalert@redhat.com"
},
{
"url": "https://github.com/LibRaw/LibRaw/issues/557",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20673",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.427",
"lastModified": "2023-05-15T22:15:10.427",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In vcu, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519103; Issue ID: ALPS07519103."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20694",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.480",
"lastModified": "2023-05-15T22:15:10.480",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07733998 / ALPS07874388 (For MT6880 and MT6890 only); Issue ID: ALPS07733998 / ALPS07874388 (For MT6880 and MT6890 only)."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20695",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.523",
"lastModified": "2023-05-15T22:15:10.523",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734012 / ALPS07874363 (For MT6880, MT6890, MT6980 and MT6990 only); Issue ID: ALPS07734012 / ALPS07874363 (For MT6880, MT6890, MT6980 and MT6990 only)."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20696",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.563",
"lastModified": "2023-05-15T22:15:10.563",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07856356 / ALPS07874388 (For MT6880 and MT6890 only); Issue ID: ALPS07856356 / ALPS07874388 (For MT6880 and MT6890 only)."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20697",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.603",
"lastModified": "2023-05-15T22:15:10.603",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07589148; Issue ID: ALPS07589148."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20698",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.647",
"lastModified": "2023-05-15T22:15:10.647",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07589144; Issue ID: ALPS07589144."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20699",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.690",
"lastModified": "2023-05-15T22:15:10.690",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In adsp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07696073; Issue ID: ALPS07696073."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20700",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.743",
"lastModified": "2023-05-15T22:15:10.743",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In widevine, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07643304; Issue ID: ALPS07643304."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20701",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.787",
"lastModified": "2023-05-15T22:15:10.787",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In widevine, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07643270; Issue ID: ALPS07643270."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20703",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.830",
"lastModified": "2023-05-15T22:15:10.830",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767853; Issue ID: ALPS07767853."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20704",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.870",
"lastModified": "2023-05-15T22:15:10.870",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767826; Issue ID: ALPS07767826."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20705",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.910",
"lastModified": "2023-05-15T22:15:10.910",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767870; Issue ID: ALPS07767870."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20706",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.947",
"lastModified": "2023-05-15T22:15:10.947",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767860; Issue ID: ALPS07767860."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20707",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.993",
"lastModified": "2023-05-15T22:15:10.993",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628556; Issue ID: ALPS07628556."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20708",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.033",
"lastModified": "2023-05-15T22:15:11.033",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581655; Issue ID: ALPS07581655."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20709",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.073",
"lastModified": "2023-05-15T22:15:11.073",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07576951; Issue ID: ALPS07576951."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20710",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.113",
"lastModified": "2023-05-15T22:15:11.113",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07576935; Issue ID: ALPS07576935."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20711",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.150",
"lastModified": "2023-05-15T22:15:11.150",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581668; Issue ID: ALPS07581668."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20717",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.190",
"lastModified": "2023-05-15T22:15:11.190",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In vcu, there is a possible leak of dma buffer due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645185; Issue ID: ALPS07645185."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20718",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.230",
"lastModified": "2023-05-15T22:15:11.230",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645181; Issue ID: ALPS07645181."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20719",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.273",
"lastModified": "2023-05-15T22:15:11.273",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In pqframework, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629583; Issue ID: ALPS07629583."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20720",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.313",
"lastModified": "2023-05-15T22:15:11.313",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In pqframework, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629586; Issue ID: ALPS07629586."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20721",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.350",
"lastModified": "2023-05-15T22:15:11.350",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In isp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07162155; Issue ID: ALPS07162155."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20722",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.390",
"lastModified": "2023-05-15T22:15:11.390",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In m4u, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07771518; Issue ID: ALPS07680084."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20726",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.433",
"lastModified": "2023-05-15T22:15:11.433",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In mnld, there is a possible leak of GPS location due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only); Issue ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only)."
}
],
"metrics": {},
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/May-2023",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20914",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.473",
"lastModified": "2023-05-15T22:15:11.473",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In onSetRuntimePermissionGrantStateByDeviceAdmin of AdminRestrictedPermissionsUtils.java, there is a possible way for the work profile to read SMS messages due to a permissions bypass. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-189942529"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-20930",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.513",
"lastModified": "2023-05-15T22:15:11.513",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In pushDynamicShortcut of ShortcutPackage.java, there is a possible way to get the device into a boot loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-250576066"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-20993",
"sourceIdentifier": "security@android.com",
"published": "2023-03-24T20:15:12.130",
"lastModified": "2023-03-29T14:50:09.937",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-15T22:15:11.553",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of SnoozeHelper.java, there is a possible failure to persist settings due to an uncaught exception. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-261588851"
"value": "In multiple functions of SnoozeHelper.java, there is a possible failure to persist settings due to an uncaught exception. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-261588851"
}
],
"metrics": {
@ -65,11 +65,8 @@
],
"references": [
{
"url": "https://www.tenable.com/cve/CVE-2023-20993",
"source": "nvd@nist.gov",
"tags": [
"Third Party Advisory"
]
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21102",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.623",
"lastModified": "2023-05-15T22:15:11.623",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21103",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.687",
"lastModified": "2023-05-15T22:15:11.687",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In registerPhoneAccount of PhoneAccountRegistrar.java, uncaught exceptions in parsing persisted user data could lead to local persistent denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-259064622"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21104",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.737",
"lastModified": "2023-05-15T22:15:11.737",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In applySyncTransaction of WindowOrganizer.java, a missing permission check could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-259938771"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21106",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.777",
"lastModified": "2023-05-15T22:15:11.777",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In adreno_set_param of adreno_gpu.c, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-265016072References: Upstream kernel"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21107",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.830",
"lastModified": "2023-05-15T22:15:11.830",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In retrieveAppEntry of NotificationAccessDetails.java, there is a missing permission check. This could lead to local escalation of privilege across user boundaries with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-259385017"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21109",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.870",
"lastModified": "2023-05-15T22:15:11.870",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In multiple places of AccessibilityService, there is a possible way to hide the app from the user due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-261589597"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21110",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.910",
"lastModified": "2023-05-15T22:15:11.910",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In several functions of SnoozeHelper.java, there is a possible way to grant notifications access due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-258422365"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21111",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.950",
"lastModified": "2023-05-15T22:15:11.950",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In several functions of PhoneAccountRegistrar.java, there is a possible way to prevent an access to emergency services due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-256819769"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21112",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.987",
"lastModified": "2023-05-15T22:15:11.987",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In AnalyzeMfcResp of NxpMfcReader.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-252763983"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21116",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:12.027",
"lastModified": "2023-05-15T22:15:12.027",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In verifyReplacingVersionCode of InstallPackageHelper.java, there is a possible way to downgrade system apps below system image version due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-256202273"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21117",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:12.067",
"lastModified": "2023-05-15T22:15:12.067",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In registerReceiverWithFeature of ActivityManagerService.java, there is a possible way for isolated processes to register a broadcast receiver due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-263358101"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21118",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:12.107",
"lastModified": "2023-05-15T22:15:12.107",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In unflattenString8 of Sensor.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-269014004"
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2124",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-15T22:15:12.150",
"lastModified": "2023-05-15T22:15:12.150",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system."
}
],
"metrics": {},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-2700",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-15T22:15:12.207",
"lastModified": "2023-05-15T22:15:12.207",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in libvirt. This security flaw ouccers due to repeatedly querying an SR-IOV PCI device's capabilities that exposes a memory leak caused by a failure to free the virPCIVirtualFunction array within the parent struct's g_autoptr cleanup."
}
],
"metrics": {},
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-2700",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203653",
"source": "secalert@redhat.com"
},
{
"url": "https://gitlab.com/libvirt/libvirt/-/commit/6425a311b8ad19d6f9c0b315bf1d722551ea3585#874a1e768ade6ceb4538931cbc06248e73223306",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-31131",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-15T22:15:12.273",
"lastModified": "2023-05-15T22:15:12.273",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Greenplum Database (GPDB) is an open source data warehouse based on PostgreSQL. In versions prior to 6.22.3 Greenplum Database used an unsafe methods to extract tar files within GPPKGs. greenplum-db is vulnerable to path traversal leading to arbitrary file writes. An attacker can use this vulnerability to overwrite data or system files potentially leading to crash or malfunction of the system. Any files which are accessible to the running process are at risk. All users are requested to upgrade to Greenplum Database version 6.23.2 or higher. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/greenplum-db/gpdb/commit/1ec4affbba7c9745f64edbd80a6680ad29b09471",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/greenplum-db/gpdb/security/advisories/GHSA-hgm9-2q42-c7f3",
"source": "security-advisories@github.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-15T21:55:24.188190+00:00
2023-05-16T00:00:23.886731+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-15T21:15:09.607000+00:00
2023-05-15T22:15:12.273000+00:00
```
### Last Data Feed Release
@ -29,26 +29,65 @@ Download and Changelog: [Click](releases/latest)
### Total Number of included CVEs
```plain
215291
215335
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `44`
* [CVE-2023-31145](CVE-2023/CVE-2023-311xx/CVE-2023-31145.json) (`2023-05-15T21:15:09.293`)
* [CVE-2023-32068](CVE-2023/CVE-2023-320xx/CVE-2023-32068.json) (`2023-05-15T21:15:09.367`)
* [CVE-2023-32308](CVE-2023/CVE-2023-323xx/CVE-2023-32308.json) (`2023-05-15T21:15:09.530`)
* [CVE-2023-32309](CVE-2023/CVE-2023-323xx/CVE-2023-32309.json) (`2023-05-15T21:15:09.607`)
* [CVE-2023-32313](CVE-2023/CVE-2023-323xx/CVE-2023-32313.json) (`2023-05-15T20:15:09.070`)
* [CVE-2023-32314](CVE-2023/CVE-2023-323xx/CVE-2023-32314.json) (`2023-05-15T20:15:09.177`)
* [CVE-2021-0877](CVE-2021/CVE-2021-08xx/CVE-2021-0877.json) (`2023-05-15T22:15:10.163`)
* [CVE-2023-1729](CVE-2023/CVE-2023-17xx/CVE-2023-1729.json) (`2023-05-15T22:15:10.350`)
* [CVE-2023-20673](CVE-2023/CVE-2023-206xx/CVE-2023-20673.json) (`2023-05-15T22:15:10.427`)
* [CVE-2023-20694](CVE-2023/CVE-2023-206xx/CVE-2023-20694.json) (`2023-05-15T22:15:10.480`)
* [CVE-2023-20695](CVE-2023/CVE-2023-206xx/CVE-2023-20695.json) (`2023-05-15T22:15:10.523`)
* [CVE-2023-20696](CVE-2023/CVE-2023-206xx/CVE-2023-20696.json) (`2023-05-15T22:15:10.563`)
* [CVE-2023-20697](CVE-2023/CVE-2023-206xx/CVE-2023-20697.json) (`2023-05-15T22:15:10.603`)
* [CVE-2023-20698](CVE-2023/CVE-2023-206xx/CVE-2023-20698.json) (`2023-05-15T22:15:10.647`)
* [CVE-2023-20699](CVE-2023/CVE-2023-206xx/CVE-2023-20699.json) (`2023-05-15T22:15:10.690`)
* [CVE-2023-20700](CVE-2023/CVE-2023-207xx/CVE-2023-20700.json) (`2023-05-15T22:15:10.743`)
* [CVE-2023-20701](CVE-2023/CVE-2023-207xx/CVE-2023-20701.json) (`2023-05-15T22:15:10.787`)
* [CVE-2023-20703](CVE-2023/CVE-2023-207xx/CVE-2023-20703.json) (`2023-05-15T22:15:10.830`)
* [CVE-2023-20704](CVE-2023/CVE-2023-207xx/CVE-2023-20704.json) (`2023-05-15T22:15:10.870`)
* [CVE-2023-20705](CVE-2023/CVE-2023-207xx/CVE-2023-20705.json) (`2023-05-15T22:15:10.910`)
* [CVE-2023-20706](CVE-2023/CVE-2023-207xx/CVE-2023-20706.json) (`2023-05-15T22:15:10.947`)
* [CVE-2023-20707](CVE-2023/CVE-2023-207xx/CVE-2023-20707.json) (`2023-05-15T22:15:10.993`)
* [CVE-2023-20708](CVE-2023/CVE-2023-207xx/CVE-2023-20708.json) (`2023-05-15T22:15:11.033`)
* [CVE-2023-20709](CVE-2023/CVE-2023-207xx/CVE-2023-20709.json) (`2023-05-15T22:15:11.073`)
* [CVE-2023-20710](CVE-2023/CVE-2023-207xx/CVE-2023-20710.json) (`2023-05-15T22:15:11.113`)
* [CVE-2023-20711](CVE-2023/CVE-2023-207xx/CVE-2023-20711.json) (`2023-05-15T22:15:11.150`)
* [CVE-2023-20717](CVE-2023/CVE-2023-207xx/CVE-2023-20717.json) (`2023-05-15T22:15:11.190`)
* [CVE-2023-20718](CVE-2023/CVE-2023-207xx/CVE-2023-20718.json) (`2023-05-15T22:15:11.230`)
* [CVE-2023-20719](CVE-2023/CVE-2023-207xx/CVE-2023-20719.json) (`2023-05-15T22:15:11.273`)
* [CVE-2023-20720](CVE-2023/CVE-2023-207xx/CVE-2023-20720.json) (`2023-05-15T22:15:11.313`)
* [CVE-2023-20721](CVE-2023/CVE-2023-207xx/CVE-2023-20721.json) (`2023-05-15T22:15:11.350`)
* [CVE-2023-20722](CVE-2023/CVE-2023-207xx/CVE-2023-20722.json) (`2023-05-15T22:15:11.390`)
* [CVE-2023-20726](CVE-2023/CVE-2023-207xx/CVE-2023-20726.json) (`2023-05-15T22:15:11.433`)
* [CVE-2023-20914](CVE-2023/CVE-2023-209xx/CVE-2023-20914.json) (`2023-05-15T22:15:11.473`)
* [CVE-2023-20930](CVE-2023/CVE-2023-209xx/CVE-2023-20930.json) (`2023-05-15T22:15:11.513`)
* [CVE-2023-21102](CVE-2023/CVE-2023-211xx/CVE-2023-21102.json) (`2023-05-15T22:15:11.623`)
* [CVE-2023-21103](CVE-2023/CVE-2023-211xx/CVE-2023-21103.json) (`2023-05-15T22:15:11.687`)
* [CVE-2023-21104](CVE-2023/CVE-2023-211xx/CVE-2023-21104.json) (`2023-05-15T22:15:11.737`)
* [CVE-2023-21106](CVE-2023/CVE-2023-211xx/CVE-2023-21106.json) (`2023-05-15T22:15:11.777`)
* [CVE-2023-21107](CVE-2023/CVE-2023-211xx/CVE-2023-21107.json) (`2023-05-15T22:15:11.830`)
* [CVE-2023-21109](CVE-2023/CVE-2023-211xx/CVE-2023-21109.json) (`2023-05-15T22:15:11.870`)
* [CVE-2023-21110](CVE-2023/CVE-2023-211xx/CVE-2023-21110.json) (`2023-05-15T22:15:11.910`)
* [CVE-2023-21111](CVE-2023/CVE-2023-211xx/CVE-2023-21111.json) (`2023-05-15T22:15:11.950`)
* [CVE-2023-21112](CVE-2023/CVE-2023-211xx/CVE-2023-21112.json) (`2023-05-15T22:15:11.987`)
* [CVE-2023-21116](CVE-2023/CVE-2023-211xx/CVE-2023-21116.json) (`2023-05-15T22:15:12.027`)
* [CVE-2023-21117](CVE-2023/CVE-2023-211xx/CVE-2023-21117.json) (`2023-05-15T22:15:12.067`)
* [CVE-2023-21118](CVE-2023/CVE-2023-211xx/CVE-2023-21118.json) (`2023-05-15T22:15:12.107`)
* [CVE-2023-2124](CVE-2023/CVE-2023-21xx/CVE-2023-2124.json) (`2023-05-15T22:15:12.150`)
* [CVE-2023-2700](CVE-2023/CVE-2023-27xx/CVE-2023-2700.json) (`2023-05-15T22:15:12.207`)
* [CVE-2023-31131](CVE-2023/CVE-2023-311xx/CVE-2023-31131.json) (`2023-05-15T22:15:12.273`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `2`
* [CVE-2023-32233](CVE-2023/CVE-2023-322xx/CVE-2023-32233.json) (`2023-05-15T21:15:09.447`)
* [CVE-2022-20338](CVE-2022/CVE-2022-203xx/CVE-2022-20338.json) (`2023-05-15T22:15:10.237`)
* [CVE-2023-20993](CVE-2023/CVE-2023-209xx/CVE-2023-20993.json) (`2023-05-15T22:15:11.553`)
## Download and Usage