diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7245.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7245.json new file mode 100644 index 00000000000..5539ad48228 --- /dev/null +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7245.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-7245", + "sourceIdentifier": "security@openvpn.net", + "published": "2024-02-20T11:15:07.750", + "lastModified": "2024-02-20T11:15:07.750", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@openvpn.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-95" + } + ] + } + ], + "references": [ + { + "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/", + "source": "security@openvpn.net" + }, + { + "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/", + "source": "security@openvpn.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0182.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0182.json index 6129b8bd611..17bd592a404 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0182.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0182.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0182", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-01T21:15:24.777", - "lastModified": "2024-01-08T19:25:18.583", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-20T12:15:07.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24793.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24793.json new file mode 100644 index 00000000000..4874a6905db --- /dev/null +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24793.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-24793", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-02-20T11:15:08.090", + "lastModified": "2024-02-20T11:15:08.090", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A use-after-free vulnerability exists in the DICOM Element Parsing as implemented in Imaging Data Commons libdicom 1.0.5. A specially crafted DICOM file can cause premature freeing of memory that is used later. To trigger this vulnerability, an attacker would need to induce the vulnerable application to process a malicious DICOM image.The Use-After-Free happens in the `parse_meta_element_create()` parsing the elements in the File Meta Information header." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1931", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24794.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24794.json new file mode 100644 index 00000000000..68f11a7f223 --- /dev/null +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24794.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-24794", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-02-20T11:15:08.343", + "lastModified": "2024-02-20T11:15:08.343", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A use-after-free vulnerability exists in the DICOM Element Parsing as implemented in Imaging Data Commons libdicom 1.0.5. A specially crafted DICOM file can cause premature freeing of memory that is used later. To trigger this vulnerability, an attacker would need to induce the vulnerable application to process a malicious DICOM image.The Use-After-Free happens in the `parse_meta_sequence_end()` parsing the Sequence Value Represenations." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1931", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d1890d0b4e7..bc3bdda49fc 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-20T11:08:23.981471+00:00 +2024-02-20T13:00:29.200429+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-20T10:15:08.707000+00:00 +2024-02-20T12:15:07.780000+00:00 ``` ### Last Data Feed Release @@ -29,31 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -238938 +238941 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `3` -* [CVE-2023-49109](CVE-2023/CVE-2023-491xx/CVE-2023-49109.json) (`2024-02-20T10:15:07.927`) -* [CVE-2023-49250](CVE-2023/CVE-2023-492xx/CVE-2023-49250.json) (`2024-02-20T10:15:08.040`) -* [CVE-2023-50270](CVE-2023/CVE-2023-502xx/CVE-2023-50270.json) (`2024-02-20T10:15:08.140`) -* [CVE-2023-51770](CVE-2023/CVE-2023-517xx/CVE-2023-51770.json) (`2024-02-20T10:15:08.243`) -* [CVE-2024-1608](CVE-2024/CVE-2024-16xx/CVE-2024-1608.json) (`2024-02-20T09:15:08.877`) -* [CVE-2024-25604](CVE-2024/CVE-2024-256xx/CVE-2024-25604.json) (`2024-02-20T09:15:09.057`) -* [CVE-2024-25605](CVE-2024/CVE-2024-256xx/CVE-2024-25605.json) (`2024-02-20T09:15:09.323`) -* [CVE-2024-25606](CVE-2024/CVE-2024-256xx/CVE-2024-25606.json) (`2024-02-20T09:15:09.533`) -* [CVE-2024-25607](CVE-2024/CVE-2024-256xx/CVE-2024-25607.json) (`2024-02-20T10:15:08.333`) -* [CVE-2024-25608](CVE-2024/CVE-2024-256xx/CVE-2024-25608.json) (`2024-02-20T10:15:08.530`) -* [CVE-2024-25609](CVE-2024/CVE-2024-256xx/CVE-2024-25609.json) (`2024-02-20T10:15:08.707`) +* [CVE-2023-7245](CVE-2023/CVE-2023-72xx/CVE-2023-7245.json) (`2024-02-20T11:15:07.750`) +* [CVE-2024-24793](CVE-2024/CVE-2024-247xx/CVE-2024-24793.json) (`2024-02-20T11:15:08.090`) +* [CVE-2024-24794](CVE-2024/CVE-2024-247xx/CVE-2024-24794.json) (`2024-02-20T11:15:08.343`) ### CVEs modified in the last Commit Recently modified CVEs: `1` -* [CVE-2024-0646](CVE-2024/CVE-2024-06xx/CVE-2024-0646.json) (`2024-02-20T09:15:08.593`) +* [CVE-2024-0182](CVE-2024/CVE-2024-01xx/CVE-2024-0182.json) (`2024-02-20T12:15:07.780`) ## Download and Usage