Auto-Update: 2024-02-16T03:00:25.249802+00:00

This commit is contained in:
cad-safe-bot 2024-02-16 03:00:28 +00:00
parent 912aa53b80
commit 5f1ca0790d
21 changed files with 484 additions and 23 deletions

View File

@ -2,8 +2,12 @@
"id": "CVE-2020-3259",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2020-05-06T17:15:12.777",
"lastModified": "2023-08-16T16:17:07.960",
"lastModified": "2024-02-16T02:00:03.227",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2024-02-15",
"cisaActionDue": "2024-03-07",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Cisco ASA and FTD Information Disclosure Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-40093",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:49.963",
"lastModified": "2024-02-16T02:15:49.963",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In multiple files, there is a possible way that trimmed content could be included in PDF output due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/cts/+/a952c93009cc81c41a086d73a4030a83b7683a04",
"source": "security@android.com"
},
{
"url": "https://android.googlesource.com/platform/external/pdfium/+/03925281cf25fec70318bf2225356d022b12b566",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40122",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:50.513",
"lastModified": "2024-02-16T02:15:50.513",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In applyCustomDescription of SaveUi.java, there is a possible way to view other user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/55fc00a0788ea0995fe0851616b9ac21710a2931",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-0014",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:50.580",
"lastModified": "2024-02-16T02:15:50.580",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In startInstall of UpdateFetcher.java, there is a possible way to trigger a malicious config update due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-0029",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:50.633",
"lastModified": "2024-02-16T02:15:50.633",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In multiple files, there is a possible way to capture the device screen when disallowed by device policy due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/9b10fd9718f4e6f6843adbfc14e46a93aab93aad",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-0030",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:50.710",
"lastModified": "2024-02-16T02:15:50.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In btif_to_bta_response of btif_gatt_util.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/57b823f4f758e2ef530909da07552b5aa80c6a7d",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-0031",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:50.763",
"lastModified": "2024-02-16T02:15:50.763",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In attp_build_read_by_type_value_cmd of att_protocol.cc , there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/de53890aaca2ae08b3ee2d6e3fd25f702fdfa661",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-0032",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:50.823",
"lastModified": "2024-02-16T02:15:50.823",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In queryChildDocuments of FileSystemProvider.java, there is a possible way to request access to directories that should be hidden due to improper input validation. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/4af5db76f25348849252e0b8a08f4a517ef842b7",
"source": "security@android.com"
},
{
"url": "https://android.googlesource.com/platform/packages/providers/DownloadProvider/+/5acd646e0cf63e2c9c0862da7e03531ef0074394",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-0033",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:50.877",
"lastModified": "2024-02-16T02:15:50.877",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of ashmem-dev.cpp, there is a possible missing seal due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/native/+/aa98edf0ce9dde4886979658a459900ca987f193",
"source": "security@android.com"
},
{
"url": "https://android.googlesource.com/platform/system/core/+/46d46dc46446f14f26fbe8fb102dd36c1dfc1229",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-0034",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:50.933",
"lastModified": "2024-02-16T02:15:50.933",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In BackgroundLaunchProcessController, there is a possible way to launch arbitrary activity from the background due to BAL Bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/653f7b0d234693309dc86161af01831b64033fe6",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-0035",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:50.980",
"lastModified": "2024-02-16T02:15:50.980",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In onNullBinding of TileLifecycleManager.java, there is a possible way to launch an activity from the background due to a missing null check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/7b7fff1eb5014d12200a32ff9047da396c7ab6a4",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-0036",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:51.047",
"lastModified": "2024-02-16T02:15:51.047",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In startNextMatchingActivity of ActivityTaskManagerService.java, there is a possible way to bypass the restrictions on starting activities from the background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/3eaaa9687e90c65f51762deb343f18bef95d4e8e",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-0037",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:51.097",
"lastModified": "2024-02-16T02:15:51.097",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In applyCustomDescription of SaveUi.java, there is a possible way to view images belonging to a different user due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/55fc00a0788ea0995fe0851616b9ac21710a2931",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-0038",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:51.157",
"lastModified": "2024-02-16T02:15:51.157",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In injectInputEventToInputFilter of AccessibilityManagerService.java, there is a possible arbitrary input event injection due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/3e88d987235f5a2acd50a9b6bad78dbbf39cb079",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-0040",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:51.203",
"lastModified": "2024-02-16T02:15:51.203",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In setParameter of MtpPacket.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/2ca6c27dc0336fd98f47cfb96dc514efa98e8864",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-0041",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:51.253",
"lastModified": "2024-02-16T02:15:51.253",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In removePersistentDot of SystemStatusAnimationSchedulerImpl.kt, there is a possible race condition due to a logic error in the code. This could lead to local escalation of privilege that fails to remove the persistent dot with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/d6f7188773409c8f5ad5fc7d3eea5b1751439e26",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "security@android.com"
}
]
}

View File

@ -2,12 +2,20 @@
"id": "CVE-2024-21410",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-02-13T18:15:59.680",
"lastModified": "2024-02-13T18:22:43.577",
"lastModified": "2024-02-16T02:00:03.233",
"vulnStatus": "Awaiting Analysis",
"cisaExploitAdd": "2024-02-15",
"cisaActionDue": "2024-03-07",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Exchange Server Privilege Escalation Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Server Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Microsoft Exchange Server"
}
],
"metrics": {

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-25413",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-16T02:15:51.307",
"lastModified": "2024-02-16T02:15:51.307",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A XSLT Server Side injection vulnerability in the Import Jobs function of FireBear Improved Import And Export v3.8.6 allows attackers to execute arbitrary commands via a crafted XSLT file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/capture0x/Magento-ver.-2.4.6",
"source": "cve@mitre.org"
},
{
"url": "https://packetstormsecurity.com/files/175801/FireBear-Improved-Import-And-Export-3.8.6-XSLT-Server-Side-Injection.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-25414",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-16T02:15:51.363",
"lastModified": "2024-02-16T02:15:51.363",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in /admin/upgrade of CSZ CMS v1.3.0 allows attackers to execute arbitrary code via uploading a crafted Zip file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/capture0x/CSZ_CMS",
"source": "cve@mitre.org"
},
{
"url": "https://packetstormsecurity.com/files/175889/CSZ-CMS-1.3.0-Shell-Upload.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-25415",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-16T02:15:51.443",
"lastModified": "2024-02-16T02:15:51.443",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A remote code execution (RCE) vulnerability in /admin/define_language.php of CE Phoenix v1.0.8.20 allows attackers to execute arbitrary PHP code via injecting a crafted payload into the file english.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/capture0x/Phoenix",
"source": "cve@mitre.org"
},
{
"url": "https://packetstormsecurity.com/files/175913/CE-Phoenix-1.0.8.20-Remote-Command-Execution.html",
"source": "cve@mitre.org"
},
{
"url": "https://vulners.com/zdt/1337DAY-ID-39172",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-16T00:55:24.853976+00:00
2024-02-16T03:00:25.249802+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-16T00:15:47.360000+00:00
2024-02-16T02:15:51.443000+00:00
```
### Last Data Feed Release
@ -23,40 +23,45 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-02-15T01:00:28.246777+00:00
2024-02-16T01:00:28.248035+00:00
```
### Total Number of included CVEs
```plain
238716
238734
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `18`
* [CVE-2023-40100](CVE-2023/CVE-2023-401xx/CVE-2023-40100.json) (`2024-02-15T23:15:07.743`)
* [CVE-2023-40104](CVE-2023/CVE-2023-401xx/CVE-2023-40104.json) (`2024-02-15T23:15:08.017`)
* [CVE-2023-40105](CVE-2023/CVE-2023-401xx/CVE-2023-40105.json) (`2024-02-15T23:15:08.083`)
* [CVE-2023-40106](CVE-2023/CVE-2023-401xx/CVE-2023-40106.json) (`2024-02-15T23:15:08.137`)
* [CVE-2023-40107](CVE-2023/CVE-2023-401xx/CVE-2023-40107.json) (`2024-02-15T23:15:08.197`)
* [CVE-2023-40109](CVE-2023/CVE-2023-401xx/CVE-2023-40109.json) (`2024-02-15T23:15:08.260`)
* [CVE-2023-40110](CVE-2023/CVE-2023-401xx/CVE-2023-40110.json) (`2024-02-15T23:15:08.420`)
* [CVE-2023-40111](CVE-2023/CVE-2023-401xx/CVE-2023-40111.json) (`2024-02-15T23:15:08.487`)
* [CVE-2023-40112](CVE-2023/CVE-2023-401xx/CVE-2023-40112.json) (`2024-02-15T23:15:08.543`)
* [CVE-2023-40113](CVE-2023/CVE-2023-401xx/CVE-2023-40113.json) (`2024-02-15T23:15:08.597`)
* [CVE-2023-40114](CVE-2023/CVE-2023-401xx/CVE-2023-40114.json) (`2024-02-15T23:15:08.647`)
* [CVE-2023-40115](CVE-2023/CVE-2023-401xx/CVE-2023-40115.json) (`2024-02-15T23:15:08.693`)
* [CVE-2023-40124](CVE-2023/CVE-2023-401xx/CVE-2023-40124.json) (`2024-02-15T23:15:08.743`)
* [CVE-2024-23674](CVE-2024/CVE-2024-236xx/CVE-2024-23674.json) (`2024-02-15T23:15:08.827`)
* [CVE-2023-40093](CVE-2023/CVE-2023-400xx/CVE-2023-40093.json) (`2024-02-16T02:15:49.963`)
* [CVE-2023-40122](CVE-2023/CVE-2023-401xx/CVE-2023-40122.json) (`2024-02-16T02:15:50.513`)
* [CVE-2024-0014](CVE-2024/CVE-2024-00xx/CVE-2024-0014.json) (`2024-02-16T02:15:50.580`)
* [CVE-2024-0029](CVE-2024/CVE-2024-00xx/CVE-2024-0029.json) (`2024-02-16T02:15:50.633`)
* [CVE-2024-0030](CVE-2024/CVE-2024-00xx/CVE-2024-0030.json) (`2024-02-16T02:15:50.710`)
* [CVE-2024-0031](CVE-2024/CVE-2024-00xx/CVE-2024-0031.json) (`2024-02-16T02:15:50.763`)
* [CVE-2024-0032](CVE-2024/CVE-2024-00xx/CVE-2024-0032.json) (`2024-02-16T02:15:50.823`)
* [CVE-2024-0033](CVE-2024/CVE-2024-00xx/CVE-2024-0033.json) (`2024-02-16T02:15:50.877`)
* [CVE-2024-0034](CVE-2024/CVE-2024-00xx/CVE-2024-0034.json) (`2024-02-16T02:15:50.933`)
* [CVE-2024-0035](CVE-2024/CVE-2024-00xx/CVE-2024-0035.json) (`2024-02-16T02:15:50.980`)
* [CVE-2024-0036](CVE-2024/CVE-2024-00xx/CVE-2024-0036.json) (`2024-02-16T02:15:51.047`)
* [CVE-2024-0037](CVE-2024/CVE-2024-00xx/CVE-2024-0037.json) (`2024-02-16T02:15:51.097`)
* [CVE-2024-0038](CVE-2024/CVE-2024-00xx/CVE-2024-0038.json) (`2024-02-16T02:15:51.157`)
* [CVE-2024-0040](CVE-2024/CVE-2024-00xx/CVE-2024-0040.json) (`2024-02-16T02:15:51.203`)
* [CVE-2024-0041](CVE-2024/CVE-2024-00xx/CVE-2024-0041.json) (`2024-02-16T02:15:51.253`)
* [CVE-2024-25413](CVE-2024/CVE-2024-254xx/CVE-2024-25413.json) (`2024-02-16T02:15:51.307`)
* [CVE-2024-25414](CVE-2024/CVE-2024-254xx/CVE-2024-25414.json) (`2024-02-16T02:15:51.363`)
* [CVE-2024-25415](CVE-2024/CVE-2024-254xx/CVE-2024-25415.json) (`2024-02-16T02:15:51.443`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `2`
* [CVE-2022-41299](CVE-2022/CVE-2022-412xx/CVE-2022-41299.json) (`2024-02-16T00:15:47.360`)
* [CVE-2020-3259](CVE-2020/CVE-2020-32xx/CVE-2020-3259.json) (`2024-02-16T02:00:03.227`)
* [CVE-2024-21410](CVE-2024/CVE-2024-214xx/CVE-2024-21410.json) (`2024-02-16T02:00:03.233`)
## Download and Usage