From 5efd292ab8a2f556c8a65a35d2a415ae63c08dd7 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 13 Jul 2024 04:03:11 +0000 Subject: [PATCH] Auto-Update: 2024-07-13T04:00:17.759842+00:00 --- CVE-2023/CVE-2023-393xx/CVE-2023-39327.json | 60 +++++++++++++++++++++ CVE-2023/CVE-2023-393xx/CVE-2023-39329.json | 60 +++++++++++++++++++++ README.md | 13 ++--- _state.csv | 4 +- 4 files changed, 130 insertions(+), 7 deletions(-) create mode 100644 CVE-2023/CVE-2023-393xx/CVE-2023-39327.json create mode 100644 CVE-2023/CVE-2023-393xx/CVE-2023-39329.json diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39327.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39327.json new file mode 100644 index 00000000000..4a4bb61b095 --- /dev/null +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39327.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2023-39327", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-07-13T03:15:09.347", + "lastModified": "2024-07-13T03:15:09.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in OpenJPEG. Maliciously constructed pictures can cause the program to enter a large loop and continuously print warning messages on the terminal." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2023-39327", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295812", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39329.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39329.json new file mode 100644 index 00000000000..0067a6575fa --- /dev/null +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39329.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2023-39329", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-07-13T03:15:09.597", + "lastModified": "2024-07-13T03:15:09.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in OpenJPEG. A resource exhaustion can occur in the opj_t1_decode_cblks function in tcd.c through a crafted image file, causing a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2023-39329", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295816", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f28aa3b4018..25d02c3c64a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-13T02:00:17.870628+00:00 +2024-07-13T04:00:17.759842+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-13T00:15:04.950000+00:00 +2024-07-13T03:15:09.597000+00:00 ``` ### Last Data Feed Release @@ -33,20 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -256927 +256929 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `2` +- [CVE-2023-39327](CVE-2023/CVE-2023-393xx/CVE-2023-39327.json) (`2024-07-13T03:15:09.347`) +- [CVE-2023-39329](CVE-2023/CVE-2023-393xx/CVE-2023-39329.json) (`2024-07-13T03:15:09.597`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2024-38112](CVE-2024/CVE-2024-381xx/CVE-2024-38112.json) (`2024-07-13T00:15:04.950`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ace9dd1d21c..bba990a6a56 100644 --- a/_state.csv +++ b/_state.csv @@ -229320,7 +229320,9 @@ CVE-2023-39323,0,0,d2da5a246500965f999a8d84c29008728f75c547f230a13d2193b126917ed CVE-2023-39324,0,0,6ec2f79fc00f25fb9c6c7b8459112c051220341ced94e2f114cadb7ed5dacee0,2024-07-02T17:15:04.737000 CVE-2023-39325,0,0,58abd083daa7fb16a442cdfaef715883a0fb11da9a8652276862d7d26f2ab493,2024-04-28T04:15:09.877000 CVE-2023-39326,0,0,90a833293ecdbd92e4a1c1828cadca50fa959e82465478bc6c6b2b71065dacac,2024-01-20T04:15:07.890000 +CVE-2023-39327,1,1,29d3f00941834ca86a70f55073ea3ba2373a6280635f30c2062f26a3d3b33c84,2024-07-13T03:15:09.347000 CVE-2023-39328,0,0,5cd27bf9c6b82a9f2de8b6f4e16a5adae2ea884e954b836f4416e9d86d703d2c,2024-07-09T18:19:14.047000 +CVE-2023-39329,1,1,7b89aa566b14387890cd3786a1d72d46f6786a4e00abb5c5bf8e9e49dab43a3f,2024-07-13T03:15:09.597000 CVE-2023-3933,0,0,2d784fa3bad269d318314e0780fb5ab15203b6d9670481cab4bae609ef1ad2b5,2023-11-07T04:20:00.337000 CVE-2023-39331,0,0,0b3bb94930c7b603cf2498545fe912acbbb259488d38f9dc6f4da6943004dbbd,2024-06-18T15:09:45.857000 CVE-2023-39332,0,0,8b910ceea29382c3501406376a4083bac4d69f69380af431d3b75bb270bf2e58,2023-11-17T19:08:58.170000 @@ -254148,7 +254150,7 @@ CVE-2024-38102,0,0,b8f3bed70811e842b10b0e44e049aa13327d439097a470d245182f818341d CVE-2024-38104,0,0,934543cd72c92227418f82cc6731b22a50ac357f374ae5c93a97a0b40688cfaa,2024-07-11T18:32:06.187000 CVE-2024-38105,0,0,5ee7b6bcc3f23b6c027ef1e20204ab9e08d3961eefc81a59082038a3ba1cd79b,2024-07-11T18:31:05.480000 CVE-2024-3811,0,0,06c7e681130e5c23fc15839cbcd4895e2d61ac5545ff467d39f3bf28a1e3b8cd,2024-05-20T13:00:34.807000 -CVE-2024-38112,0,1,f5d04dd24034822a51d80d554640736bed9f2c0a96bc6eed6acb547c42c42e9c,2024-07-13T00:15:04.950000 +CVE-2024-38112,0,0,f5d04dd24034822a51d80d554640736bed9f2c0a96bc6eed6acb547c42c42e9c,2024-07-13T00:15:04.950000 CVE-2024-3812,0,0,f751171253b8aec65ad3eb6d2474d3ee930fd7bd925f44cbf577354bd9ac3c24,2024-05-20T13:00:34.807000 CVE-2024-3813,0,0,86c7d7a0e1d2bdb1014ab3bb60ae32f55f8deca1eac3a0f16e2b300f92de13c6,2024-06-17T12:42:04.623000 CVE-2024-3814,0,0,6acb0a54e9f66c1fa69cea6ef32be45b05b60edf6b85ffbcc82a92f37f75e3c1,2024-06-17T12:42:04.623000