Auto-Update: 2024-02-16T00:55:24.853976+00:00

This commit is contained in:
cad-safe-bot 2024-02-16 00:55:28 +00:00
parent cc9d1b42d5
commit 912aa53b80
16 changed files with 376 additions and 48 deletions

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-41299",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2022-12-09T19:15:13.300",
"lastModified": "2023-11-07T03:52:46.310",
"lastModified": "2024-02-16T00:15:47.360",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "IBM Cloud Transformation Advisor 2.0.1 through 3.3.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 237214."
},
{
"lang": "es",
"value": "IBM Cloud Transformation Advisor 2.0.1 a 3.3.1 es vulnerable a Cross-Site Scripting (XSS). Esta vulnerabilidad permite a los usuarios incrustar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista, lo que podr\u00eda conducir a la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n confiable. ID de IBM X-Force: 237214."
}
],
"metrics": {
@ -33,12 +37,12 @@
"impactScore": 2.7
},
{
"source": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "LOCAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
@ -46,10 +50,10 @@
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.9,
"baseSeverity": "LOW"
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
@ -66,7 +70,7 @@
]
},
{
"source": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40100",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:07.743",
"lastModified": "2024-02-15T23:15:07.743",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In discovery_thread of Dns64Configuration.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/modules/DnsResolver/+/8e1561fb603fdaec15798372f865fb1750537f4f",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2023-11-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40104",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.017",
"lastModified": "2024-02-15T23:15:08.017",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In ca-certificates, there is a possible way to read encrypted TLS data due to untrusted cryptographic certificates. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/system/ca-certificates/+/91204b9fdbd77b3f27f94b73868607b2dccbfdad",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2023-11-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40105",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.083",
"lastModified": "2024-02-15T23:15:08.083",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In backupAgentCreated of ActivityManagerService.java, there is a possible way to leak sensitive data due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/935eb5ed6be35860a99ea242fb753f687d54a308",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2023-11-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40106",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.137",
"lastModified": "2024-02-15T23:15:08.137",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In sanitizeSbn of NotificationManagerService.java, there is a possible way to launch an activity from the background due to BAL Bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/442b4390c1f04b0e74ae4a7e349418dad4e7522e",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2023-11-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40107",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.197",
"lastModified": "2024-02-15T23:15:08.197",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In ARTPWriter of ARTPWriter.cpp, there is a possible use after free due to uninitialized data. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/acb81624b4f50fed52cb1b3829809ee2f7377093",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2023-11-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40109",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.260",
"lastModified": "2024-02-15T23:15:08.260",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In createFromParcel of UsbConfiguration.java, there is a possible background activity launch (BAL) due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/387d258cf10a30537fc48dc0e48d28071efa92e7",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2023-11-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40110",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.420",
"lastModified": "2024-02-15T23:15:08.420",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of MtpPacket.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/53243faf690a49e00952b3d3956d2fff0b8d4a3c",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2023-11-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40111",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.487",
"lastModified": "2024-02-15T23:15:08.487",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In setMediaButtonReceiver of MediaSessionRecord.java, there is a possible way to send a pending intent on behalf of system_server due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/55d3d57cbffc838c52d610af14a056dea87b422e",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2023-11-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40112",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.543",
"lastModified": "2024-02-15T23:15:08.543",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In ippSetValueTag of ipp.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure of past print jobs or other print-related information, with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/services/BuiltInPrintService/+/d7cb53cb5b47f4afdb84cb0e161d84fdc2c32ce7",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2023-11-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40113",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.597",
"lastModified": "2024-02-15T23:15:08.597",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible way for apps to access cross-user message data due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/providers/TelephonyProvider/+/64ca6ba981745875dbf2064e0b2a47f8194c4f0a",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2023-11-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40114",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.647",
"lastModified": "2024-02-15T23:15:08.647",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of MtpFfsHandle.cpp , there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/2fdf54b050f728fd965c9afdd03116e9b9dafbae",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2023-11-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40115",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.693",
"lastModified": "2024-02-15T23:15:08.693",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In readLogs of StatsService.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/modules/StatsD/+/e4cd2d8f75d1b7b83a759d752f38099a9aa9997e",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2023-11-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40124",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.743",
"lastModified": "2024-02-15T23:15:08.743",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible cross-user read due to a confused deputy. This could lead to local information disclosure of photos or other images with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/86c8421c1181816b6cb333eb62a78e32290c4b17",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2023-11-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-23674",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-15T23:15:08.827",
"lastModified": "2024-02-15T23:15:08.827",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Online-Ausweis-Funktion eID scheme in the German National Identity card through 2024-02-15 allows authentication bypass by spoofing. A man-in-the-middle attacker can assume a victim's identify for access to government, medical, and financial resources, and can also extract personal data from the card, aka the \"sPACE (Spoofing Password Authenticated Connection Establishment)\" issue. This occurs because of a combination of factors, such as insecure PIN entry (for basic readers) and eid:// deeplinking. The victim must be using a modified eID kernel, which may occur if the victim is tricked into installing a fake version of an official app. NOTE: the BSI position is \"ensuring a secure operational environment at the client side is an obligation of the ID card owner.\""
}
],
"metrics": {},
"references": [
{
"url": "https://ctrlalt.medium.com/space-attack-spoofing-eids-password-authenticated-connection-establishment-11561e5657b1",
"source": "cve@mitre.org"
},
{
"url": "https://www.ausweisapp.bund.de/",
"source": "cve@mitre.org"
},
{
"url": "https://www.dropbox.com/scl/fi/2powlii0dnmr7p7v5ijhc/2024_German_eID_02_Spoofing_PACE_final.pdf?rlkey=nx0ffmmbq3hffgxsuqwf0f45z&dl=0",
"source": "cve@mitre.org"
},
{
"url": "https://www.personalausweisportal.de/",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-15T23:00:24.830948+00:00
2024-02-16T00:55:24.853976+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-15T22:15:48.060000+00:00
2024-02-16T00:15:47.360000+00:00
```
### Last Data Feed Release
@ -29,54 +29,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
238702
238716
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `14`
* [CVE-2023-40057](CVE-2023/CVE-2023-400xx/CVE-2023-40057.json) (`2024-02-15T21:15:08.247`)
* [CVE-2023-6123](CVE-2023/CVE-2023-61xx/CVE-2023-6123.json) (`2024-02-15T21:15:08.500`)
* [CVE-2024-0240](CVE-2024/CVE-2024-02xx/CVE-2024-0240.json) (`2024-02-15T21:15:08.673`)
* [CVE-2024-0622](CVE-2024/CVE-2024-06xx/CVE-2024-0622.json) (`2024-02-15T21:15:08.860`)
* [CVE-2024-21728](CVE-2024/CVE-2024-217xx/CVE-2024-21728.json) (`2024-02-15T21:15:09.220`)
* [CVE-2024-23476](CVE-2024/CVE-2024-234xx/CVE-2024-23476.json) (`2024-02-15T21:15:09.353`)
* [CVE-2024-23477](CVE-2024/CVE-2024-234xx/CVE-2024-23477.json) (`2024-02-15T21:15:09.603`)
* [CVE-2024-23478](CVE-2024/CVE-2024-234xx/CVE-2024-23478.json) (`2024-02-15T21:15:09.867`)
* [CVE-2024-23479](CVE-2024/CVE-2024-234xx/CVE-2024-23479.json) (`2024-02-15T21:15:10.213`)
* [CVE-2024-25123](CVE-2024/CVE-2024-251xx/CVE-2024-25123.json) (`2024-02-15T22:15:48.060`)
* [CVE-2023-40100](CVE-2023/CVE-2023-401xx/CVE-2023-40100.json) (`2024-02-15T23:15:07.743`)
* [CVE-2023-40104](CVE-2023/CVE-2023-401xx/CVE-2023-40104.json) (`2024-02-15T23:15:08.017`)
* [CVE-2023-40105](CVE-2023/CVE-2023-401xx/CVE-2023-40105.json) (`2024-02-15T23:15:08.083`)
* [CVE-2023-40106](CVE-2023/CVE-2023-401xx/CVE-2023-40106.json) (`2024-02-15T23:15:08.137`)
* [CVE-2023-40107](CVE-2023/CVE-2023-401xx/CVE-2023-40107.json) (`2024-02-15T23:15:08.197`)
* [CVE-2023-40109](CVE-2023/CVE-2023-401xx/CVE-2023-40109.json) (`2024-02-15T23:15:08.260`)
* [CVE-2023-40110](CVE-2023/CVE-2023-401xx/CVE-2023-40110.json) (`2024-02-15T23:15:08.420`)
* [CVE-2023-40111](CVE-2023/CVE-2023-401xx/CVE-2023-40111.json) (`2024-02-15T23:15:08.487`)
* [CVE-2023-40112](CVE-2023/CVE-2023-401xx/CVE-2023-40112.json) (`2024-02-15T23:15:08.543`)
* [CVE-2023-40113](CVE-2023/CVE-2023-401xx/CVE-2023-40113.json) (`2024-02-15T23:15:08.597`)
* [CVE-2023-40114](CVE-2023/CVE-2023-401xx/CVE-2023-40114.json) (`2024-02-15T23:15:08.647`)
* [CVE-2023-40115](CVE-2023/CVE-2023-401xx/CVE-2023-40115.json) (`2024-02-15T23:15:08.693`)
* [CVE-2023-40124](CVE-2023/CVE-2023-401xx/CVE-2023-40124.json) (`2024-02-15T23:15:08.743`)
* [CVE-2024-23674](CVE-2024/CVE-2024-236xx/CVE-2024-23674.json) (`2024-02-15T23:15:08.827`)
### CVEs modified in the last Commit
Recently modified CVEs: `44`
Recently modified CVEs: `1`
* [CVE-2009-3616](CVE-2009/CVE-2009-36xx/CVE-2009-3616.json) (`2024-02-15T21:06:20.270`)
* [CVE-2009-3547](CVE-2009/CVE-2009-35xx/CVE-2009-3547.json) (`2024-02-15T21:12:00.877`)
* [CVE-2009-2054](CVE-2009/CVE-2009-20xx/CVE-2009-2054.json) (`2024-02-15T21:15:40.407`)
* [CVE-2009-4017](CVE-2009/CVE-2009-40xx/CVE-2009-4017.json) (`2024-02-15T21:16:16.510`)
* [CVE-2009-1073](CVE-2009/CVE-2009-10xx/CVE-2009-1073.json) (`2024-02-15T21:31:04.530`)
* [CVE-2010-0249](CVE-2010/CVE-2010-02xx/CVE-2010-0249.json) (`2024-02-15T21:06:48.057`)
* [CVE-2013-1591](CVE-2013/CVE-2013-15xx/CVE-2013-1591.json) (`2024-02-15T21:08:00.480`)
* [CVE-2017-1000121](CVE-2017/CVE-2017-10001xx/CVE-2017-1000121.json) (`2024-02-15T21:22:29.757`)
* [CVE-2017-15100](CVE-2017/CVE-2017-151xx/CVE-2017-15100.json) (`2024-02-15T21:36:51.383`)
* [CVE-2019-9534](CVE-2019/CVE-2019-95xx/CVE-2019-9534.json) (`2024-02-15T21:20:26.287`)
* [CVE-2020-17087](CVE-2020/CVE-2020-170xx/CVE-2020-17087.json) (`2024-02-15T21:27:14.377`)
* [CVE-2021-3011](CVE-2021/CVE-2021-30xx/CVE-2021-3011.json) (`2024-02-15T21:20:33.287`)
* [CVE-2021-3116](CVE-2021/CVE-2021-31xx/CVE-2021-3116.json) (`2024-02-15T21:40:16.967`)
* [CVE-2022-31216](CVE-2022/CVE-2022-312xx/CVE-2022-31216.json) (`2024-02-15T21:22:59.000`)
* [CVE-2022-30310](CVE-2022/CVE-2022-303xx/CVE-2022-30310.json) (`2024-02-15T21:23:18.460`)
* [CVE-2022-30308](CVE-2022/CVE-2022-303xx/CVE-2022-30308.json) (`2024-02-15T21:23:56.537`)
* [CVE-2022-31001](CVE-2022/CVE-2022-310xx/CVE-2022-31001.json) (`2024-02-15T21:24:56.693`)
* [CVE-2022-26833](CVE-2022/CVE-2022-268xx/CVE-2022-26833.json) (`2024-02-15T21:26:52.767`)
* [CVE-2022-1796](CVE-2022/CVE-2022-17xx/CVE-2022-1796.json) (`2024-02-15T21:28:57.780`)
* [CVE-2022-1511](CVE-2022/CVE-2022-15xx/CVE-2022-1511.json) (`2024-02-15T21:31:56.087`)
* [CVE-2023-51480](CVE-2023/CVE-2023-514xx/CVE-2023-51480.json) (`2024-02-15T21:06:20.197`)
* [CVE-2023-3391](CVE-2023/CVE-2023-33xx/CVE-2023-3391.json) (`2024-02-15T21:18:21.387`)
* [CVE-2023-50858](CVE-2023/CVE-2023-508xx/CVE-2023-50858.json) (`2024-02-15T21:38:57.473`)
* [CVE-2023-45269](CVE-2023/CVE-2023-452xx/CVE-2023-45269.json) (`2024-02-15T21:47:21.370`)
* [CVE-2024-0646](CVE-2024/CVE-2024-06xx/CVE-2024-0646.json) (`2024-02-15T21:15:09.070`)
* [CVE-2022-41299](CVE-2022/CVE-2022-412xx/CVE-2022-41299.json) (`2024-02-16T00:15:47.360`)
## Download and Usage