diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json index 7cbde5a7529..e19c29412b1 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39325", "sourceIdentifier": "security@golang.org", "published": "2023-10-11T22:15:09.880", - "lastModified": "2023-12-01T06:15:47.707", + "lastModified": "2023-12-07T03:15:06.853", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -140,6 +140,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/", "source": "security@golang.org" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVZDNSMVDAQJ64LJC5I5U5LDM5753647/", + "source": "security@golang.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/", "source": "security@golang.org", @@ -202,6 +206,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTT7DG3QOF5ZNJLUGHDNLRUIN6OWZARP/", "source": "security@golang.org" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WCNCBYKZXLDFGAJUB7ZP5VLC3YTHJNVH/", + "source": "security@golang.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/", "source": "security@golang.org" diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40238.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40238.json new file mode 100644 index 00000000000..ef874c18179 --- /dev/null +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40238.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-40238", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-07T04:15:06.790", + "lastModified": "2023-12-07T04:15:06.790", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A LogoFAIL issue was discovered in BmpDecoderDxe in Insyde InsydeH2O with kernel 5.2 before 05.28.47, 5.3 before 05.37.47, 5.4 before 05.45.47, 5.5 before 05.53.47, and 5.6 before 05.60.47 for certain Lenovo devices. Image parsing of crafted BMP logo files can copy data to a specific address during the DXE phase of UEFI execution. This occurs because of an integer signedness error involving PixelHeight and PixelWidth during RLE4/RLE8 compression." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://binarly.io/posts/finding_logofail_the_dangers_of_image_parsing_during_system_boot/index.html", + "source": "cve@mitre.org" + }, + { + "url": "https://www.insyde.com/security-pledge", + "source": "cve@mitre.org" + }, + { + "url": "https://www.insyde.com/security-pledge/SA-2023053", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47627.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47627.json index d171afbb7b0..80f6dbc7292 100644 --- a/CVE-2023/CVE-2023-476xx/CVE-2023-47627.json +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47627.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47627", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-14T21:15:12.820", - "lastModified": "2023-11-22T22:40:55.880", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-07T03:15:07.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -61,7 +61,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -103,6 +103,14 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDKQ6HM3KNDU4OQI476ZWT4O7DMSIT35/", + "source": "security-advisories@github.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQYQL6WV535EEKSNH7KRARLLMOW5WXDM/", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 51272c96b8a..c82d5e33067 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-07T03:00:37.701742+00:00 +2023-12-07T05:01:02.585184+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-07T02:16:35.563000+00:00 +2023-12-07T04:15:06.790000+00:00 ``` ### Last Data Feed Release @@ -29,37 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -232431 +232432 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `1` -* [CVE-2023-46218](CVE-2023/CVE-2023-462xx/CVE-2023-46218.json) (`2023-12-07T01:15:07.160`) -* [CVE-2023-5710](CVE-2023/CVE-2023-57xx/CVE-2023-5710.json) (`2023-12-07T02:15:06.527`) -* [CVE-2023-5711](CVE-2023/CVE-2023-57xx/CVE-2023-5711.json) (`2023-12-07T02:15:06.770`) -* [CVE-2023-5712](CVE-2023/CVE-2023-57xx/CVE-2023-5712.json) (`2023-12-07T02:15:06.933`) -* [CVE-2023-5713](CVE-2023/CVE-2023-57xx/CVE-2023-5713.json) (`2023-12-07T02:15:07.110`) -* [CVE-2023-5714](CVE-2023/CVE-2023-57xx/CVE-2023-5714.json) (`2023-12-07T02:15:07.287`) -* [CVE-2023-5761](CVE-2023/CVE-2023-57xx/CVE-2023-5761.json) (`2023-12-07T02:15:07.450`) +* [CVE-2023-40238](CVE-2023/CVE-2023-402xx/CVE-2023-40238.json) (`2023-12-07T04:15:06.790`) ### CVEs modified in the last Commit -Recently modified CVEs: `11` +Recently modified CVEs: `2` -* [CVE-2018-25094](CVE-2018/CVE-2018-250xx/CVE-2018-25094.json) (`2023-12-07T02:08:09.830`) -* [CVE-2020-36768](CVE-2020/CVE-2020-367xx/CVE-2020-36768.json) (`2023-12-07T02:14:31.593`) -* [CVE-2022-4957](CVE-2022/CVE-2022-49xx/CVE-2022-4957.json) (`2023-12-07T02:16:35.563`) -* [CVE-2023-48804](CVE-2023/CVE-2023-488xx/CVE-2023-48804.json) (`2023-12-07T01:41:39.657`) -* [CVE-2023-48805](CVE-2023/CVE-2023-488xx/CVE-2023-48805.json) (`2023-12-07T01:45:40.237`) -* [CVE-2023-48806](CVE-2023/CVE-2023-488xx/CVE-2023-48806.json) (`2023-12-07T01:48:25.833`) -* [CVE-2023-48807](CVE-2023/CVE-2023-488xx/CVE-2023-48807.json) (`2023-12-07T01:51:07.597`) -* [CVE-2023-48808](CVE-2023/CVE-2023-488xx/CVE-2023-48808.json) (`2023-12-07T01:57:10.573`) -* [CVE-2023-48812](CVE-2023/CVE-2023-488xx/CVE-2023-48812.json) (`2023-12-07T01:59:25.967`) -* [CVE-2023-48810](CVE-2023/CVE-2023-488xx/CVE-2023-48810.json) (`2023-12-07T02:01:09.727`) -* [CVE-2023-48811](CVE-2023/CVE-2023-488xx/CVE-2023-48811.json) (`2023-12-07T02:06:00.230`) +* [CVE-2023-39325](CVE-2023/CVE-2023-393xx/CVE-2023-39325.json) (`2023-12-07T03:15:06.853`) +* [CVE-2023-47627](CVE-2023/CVE-2023-476xx/CVE-2023-47627.json) (`2023-12-07T03:15:07.040`) ## Download and Usage