diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28072.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28072.json new file mode 100644 index 00000000000..f43652703c4 --- /dev/null +++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28072.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28072", + "sourceIdentifier": "security_alert@emc.com", + "published": "2023-09-04T16:15:07.767", + "lastModified": "2023-09-04T16:15:07.767", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nDell Alienware Command Center, versions prior to 5.5.51.0, contain a deserialization of untrusted data vulnerability. A local malicious user could potentially send specially crafted requests to the .NET Remoting server to run arbitrary code on the system.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-in/000212982/dsa-2023-158", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4758.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4758.json new file mode 100644 index 00000000000..0deccee1d08 --- /dev/null +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4758.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-4758", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-09-04T16:15:08.143", + "lastModified": "2023-09-04T16:15:08.143", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Over-read in GitHub repository gpac/gpac prior to 2.3-DEV." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gpac/gpac/commit/193633b1648582444fc99776cd741d7ba0125e86", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/2f496261-1090-45ac-bc89-cc93c82090d6", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 29d81a0e60a..a350f0d106e 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-09-04T16:00:24.886713+00:00 +2023-09-04T18:00:24.984246+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-09-04T14:15:08.593000+00:00 +2023-09-04T16:15:08.143000+00:00 ``` ### Last Data Feed Release @@ -29,17 +29,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -224122 +224124 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `2` -* [CVE-2023-4733](CVE-2023/CVE-2023-47xx/CVE-2023-4733.json) (`2023-09-04T14:15:07.563`) -* [CVE-2023-4750](CVE-2023/CVE-2023-47xx/CVE-2023-4750.json) (`2023-09-04T14:15:08.263`) -* [CVE-2023-4752](CVE-2023/CVE-2023-47xx/CVE-2023-4752.json) (`2023-09-04T14:15:08.450`) -* [CVE-2023-4755](CVE-2023/CVE-2023-47xx/CVE-2023-4755.json) (`2023-09-04T14:15:08.593`) +* [CVE-2023-28072](CVE-2023/CVE-2023-280xx/CVE-2023-28072.json) (`2023-09-04T16:15:07.767`) +* [CVE-2023-4758](CVE-2023/CVE-2023-47xx/CVE-2023-4758.json) (`2023-09-04T16:15:08.143`) ### CVEs modified in the last Commit