diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4733.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4733.json new file mode 100644 index 00000000000..779911c7ad0 --- /dev/null +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4733.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-4733", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-09-04T14:15:07.563", + "lastModified": "2023-09-04T14:15:07.563", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use After Free in GitHub repository vim/vim prior to 9.0.1840." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/vim/vim/commit/e1dc9a627536304bc4f738c21e909ad9fcf3974c", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/1ce1fd8c-050a-4373-8004-b35b61590217", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4750.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4750.json new file mode 100644 index 00000000000..80358600153 --- /dev/null +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4750.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-4750", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-09-04T14:15:08.263", + "lastModified": "2023-09-04T14:15:08.263", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use After Free in GitHub repository vim/vim prior to 9.0.1857." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/vim/vim/commit/fc68299d436cf87453e432daa77b6d545df4d7ed", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/1ab3ebdf-fe7d-4436-b483-9a586e03b0ea", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4752.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4752.json new file mode 100644 index 00000000000..0f615c0ee10 --- /dev/null +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4752.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-4752", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-09-04T14:15:08.450", + "lastModified": "2023-09-04T14:15:08.450", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use After Free in GitHub repository vim/vim prior to 9.0.1858." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/vim/vim/commit/ee9166eb3b41846661a39b662dc7ebe8b5e15139", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4755.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4755.json new file mode 100644 index 00000000000..e284783739d --- /dev/null +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4755.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-4755", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-09-04T14:15:08.593", + "lastModified": "2023-09-04T14:15:08.593", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use After Free in GitHub repository gpac/gpac prior to 2.3-DEV." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gpac/gpac/commit/895ac12da168435eb8db3f96978ffa4c69d66c3a", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/463474b7-a4e8-42b6-8b30-e648a77ee6b3", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b6ef7705504..29d81a0e60a 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-09-04T14:00:25.277392+00:00 +2023-09-04T16:00:24.886713+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-09-04T13:15:33.987000+00:00 +2023-09-04T14:15:08.593000+00:00 ``` ### Last Data Feed Release @@ -29,37 +29,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -224118 +224122 ``` ### CVEs added in the last Commit -Recently added CVEs: `24` +Recently added CVEs: `4` -* [CVE-2023-2813](CVE-2023/CVE-2023-28xx/CVE-2023-2813.json) (`2023-09-04T12:15:08.997`) -* [CVE-2023-30485](CVE-2023/CVE-2023-304xx/CVE-2023-30485.json) (`2023-09-04T12:15:09.140`) -* [CVE-2023-32102](CVE-2023/CVE-2023-321xx/CVE-2023-32102.json) (`2023-09-04T12:15:09.220`) -* [CVE-2023-32296](CVE-2023/CVE-2023-322xx/CVE-2023-32296.json) (`2023-09-04T12:15:09.313`) -* [CVE-2023-32578](CVE-2023/CVE-2023-325xx/CVE-2023-32578.json) (`2023-09-04T12:15:09.400`) -* [CVE-2023-3499](CVE-2023/CVE-2023-34xx/CVE-2023-3499.json) (`2023-09-04T12:15:09.493`) -* [CVE-2023-3814](CVE-2023/CVE-2023-38xx/CVE-2023-3814.json) (`2023-09-04T12:15:09.570`) -* [CVE-2023-40196](CVE-2023/CVE-2023-401xx/CVE-2023-40196.json) (`2023-09-04T12:15:09.647`) -* [CVE-2023-40197](CVE-2023/CVE-2023-401xx/CVE-2023-40197.json) (`2023-09-04T12:15:09.737`) -* [CVE-2023-40205](CVE-2023/CVE-2023-402xx/CVE-2023-40205.json) (`2023-09-04T12:15:09.823`) -* [CVE-2023-40214](CVE-2023/CVE-2023-402xx/CVE-2023-40214.json) (`2023-09-04T12:15:09.917`) -* [CVE-2023-4019](CVE-2023/CVE-2023-40xx/CVE-2023-4019.json) (`2023-09-04T12:15:10.037`) -* [CVE-2023-4059](CVE-2023/CVE-2023-40xx/CVE-2023-4059.json) (`2023-09-04T12:15:10.110`) -* [CVE-2023-4151](CVE-2023/CVE-2023-41xx/CVE-2023-4151.json) (`2023-09-04T12:15:10.187`) -* [CVE-2023-4216](CVE-2023/CVE-2023-42xx/CVE-2023-4216.json) (`2023-09-04T12:15:10.257`) -* [CVE-2023-4253](CVE-2023/CVE-2023-42xx/CVE-2023-4253.json) (`2023-09-04T12:15:10.333`) -* [CVE-2023-4254](CVE-2023/CVE-2023-42xx/CVE-2023-4254.json) (`2023-09-04T12:15:10.403`) -* [CVE-2023-4269](CVE-2023/CVE-2023-42xx/CVE-2023-4269.json) (`2023-09-04T12:15:10.470`) -* [CVE-2023-4279](CVE-2023/CVE-2023-42xx/CVE-2023-4279.json) (`2023-09-04T12:15:10.547`) -* [CVE-2023-4284](CVE-2023/CVE-2023-42xx/CVE-2023-4284.json) (`2023-09-04T12:15:10.627`) -* [CVE-2023-4298](CVE-2023/CVE-2023-42xx/CVE-2023-4298.json) (`2023-09-04T12:15:10.693`) -* [CVE-2023-4587](CVE-2023/CVE-2023-45xx/CVE-2023-4587.json) (`2023-09-04T12:15:10.760`) -* [CVE-2023-3221](CVE-2023/CVE-2023-32xx/CVE-2023-3221.json) (`2023-09-04T13:15:32.853`) -* [CVE-2023-3222](CVE-2023/CVE-2023-32xx/CVE-2023-3222.json) (`2023-09-04T13:15:33.987`) +* [CVE-2023-4733](CVE-2023/CVE-2023-47xx/CVE-2023-4733.json) (`2023-09-04T14:15:07.563`) +* [CVE-2023-4750](CVE-2023/CVE-2023-47xx/CVE-2023-4750.json) (`2023-09-04T14:15:08.263`) +* [CVE-2023-4752](CVE-2023/CVE-2023-47xx/CVE-2023-4752.json) (`2023-09-04T14:15:08.450`) +* [CVE-2023-4755](CVE-2023/CVE-2023-47xx/CVE-2023-4755.json) (`2023-09-04T14:15:08.593`) ### CVEs modified in the last Commit