diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json new file mode 100644 index 00000000000..77c273d684f --- /dev/null +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-6816", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-01-18T05:15:08.607", + "lastModified": "2024-01-18T05:15:08.607", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2023-6816", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 520d038ea18..e0e195a1287 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-18T05:00:25.134737+00:00 +2024-01-18T07:00:25.312732+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-18T03:15:59.433000+00:00 +2024-01-18T05:15:08.607000+00:00 ``` ### Last Data Feed Release @@ -29,52 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -236281 +236282 ``` ### CVEs added in the last Commit -Recently added CVEs: `22` +Recently added CVEs: `1` -* [CVE-2023-48339](CVE-2023/CVE-2023-483xx/CVE-2023-48339.json) (`2024-01-18T03:15:57.210`) -* [CVE-2023-48340](CVE-2023/CVE-2023-483xx/CVE-2023-48340.json) (`2024-01-18T03:15:57.287`) -* [CVE-2023-48341](CVE-2023/CVE-2023-483xx/CVE-2023-48341.json) (`2024-01-18T03:15:57.333`) -* [CVE-2023-48342](CVE-2023/CVE-2023-483xx/CVE-2023-48342.json) (`2024-01-18T03:15:57.380`) -* [CVE-2023-48343](CVE-2023/CVE-2023-483xx/CVE-2023-48343.json) (`2024-01-18T03:15:57.430`) -* [CVE-2023-48344](CVE-2023/CVE-2023-483xx/CVE-2023-48344.json) (`2024-01-18T03:15:57.470`) -* [CVE-2023-48345](CVE-2023/CVE-2023-483xx/CVE-2023-48345.json) (`2024-01-18T03:15:57.520`) -* [CVE-2023-48346](CVE-2023/CVE-2023-483xx/CVE-2023-48346.json) (`2024-01-18T03:15:57.560`) -* [CVE-2023-48347](CVE-2023/CVE-2023-483xx/CVE-2023-48347.json) (`2024-01-18T03:15:57.607`) -* [CVE-2023-48348](CVE-2023/CVE-2023-483xx/CVE-2023-48348.json) (`2024-01-18T03:15:57.650`) -* [CVE-2023-48349](CVE-2023/CVE-2023-483xx/CVE-2023-48349.json) (`2024-01-18T03:15:57.693`) -* [CVE-2023-48350](CVE-2023/CVE-2023-483xx/CVE-2023-48350.json) (`2024-01-18T03:15:57.737`) -* [CVE-2023-48351](CVE-2023/CVE-2023-483xx/CVE-2023-48351.json) (`2024-01-18T03:15:57.850`) -* [CVE-2023-48352](CVE-2023/CVE-2023-483xx/CVE-2023-48352.json) (`2024-01-18T03:15:57.917`) -* [CVE-2023-48353](CVE-2023/CVE-2023-483xx/CVE-2023-48353.json) (`2024-01-18T03:15:57.960`) -* [CVE-2023-48354](CVE-2023/CVE-2023-483xx/CVE-2023-48354.json) (`2024-01-18T03:15:58.013`) -* [CVE-2023-48355](CVE-2023/CVE-2023-483xx/CVE-2023-48355.json) (`2024-01-18T03:15:58.063`) -* [CVE-2023-48356](CVE-2023/CVE-2023-483xx/CVE-2023-48356.json) (`2024-01-18T03:15:58.107`) -* [CVE-2023-48357](CVE-2023/CVE-2023-483xx/CVE-2023-48357.json) (`2024-01-18T03:15:58.150`) -* [CVE-2023-48358](CVE-2023/CVE-2023-483xx/CVE-2023-48358.json) (`2024-01-18T03:15:58.193`) -* [CVE-2023-48359](CVE-2023/CVE-2023-483xx/CVE-2023-48359.json) (`2024-01-18T03:15:58.237`) -* [CVE-2024-0655](CVE-2024/CVE-2024-06xx/CVE-2024-0655.json) (`2024-01-18T03:15:59.433`) +* [CVE-2023-6816](CVE-2023/CVE-2023-68xx/CVE-2023-6816.json) (`2024-01-18T05:15:08.607`) ### CVEs modified in the last Commit -Recently modified CVEs: `11` +Recently modified CVEs: `0` -* [CVE-2022-41717](CVE-2022/CVE-2022-417xx/CVE-2022-41717.json) (`2024-01-18T03:15:55.570`) -* [CVE-2023-39325](CVE-2023/CVE-2023-393xx/CVE-2023-39325.json) (`2024-01-18T03:15:56.550`) -* [CVE-2023-40889](CVE-2023/CVE-2023-408xx/CVE-2023-40889.json) (`2024-01-18T03:15:56.877`) -* [CVE-2023-40890](CVE-2023/CVE-2023-408xx/CVE-2023-40890.json) (`2024-01-18T03:15:56.987`) -* [CVE-2023-41056](CVE-2023/CVE-2023-410xx/CVE-2023-41056.json) (`2024-01-18T03:15:57.067`) -* [CVE-2023-48795](CVE-2023/CVE-2023-487xx/CVE-2023-48795.json) (`2024-01-18T03:15:58.277`) -* [CVE-2023-51764](CVE-2023/CVE-2023-517xx/CVE-2023-51764.json) (`2024-01-18T03:15:58.667`) -* [CVE-2023-51765](CVE-2023/CVE-2023-517xx/CVE-2023-51765.json) (`2024-01-18T03:15:58.803`) -* [CVE-2023-51766](CVE-2023/CVE-2023-517xx/CVE-2023-51766.json) (`2024-01-18T03:15:58.937`) -* [CVE-2023-6548](CVE-2023/CVE-2023-65xx/CVE-2023-6548.json) (`2024-01-18T03:15:59.157`) -* [CVE-2023-6549](CVE-2023/CVE-2023-65xx/CVE-2023-6549.json) (`2024-01-18T03:15:59.360`) ## Download and Usage