Auto-Update: 2024-01-31T07:00:25.703618+00:00

This commit is contained in:
cad-safe-bot 2024-01-31 07:00:29 +00:00
parent efcfb19ff1
commit 91f892df53
3 changed files with 85 additions and 11 deletions

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2023-3934",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-31T06:15:45.870",
"lastModified": "2024-01-31T06:15:45.870",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Please discard this CVE, we are not using this anymore. The vulnerability turned out to be a non-security issue"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-0914",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-31T05:15:08.137",
"lastModified": "2024-01-31T05:15:08.137",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext decryption or signing, even without access to the corresponding private key."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-0914",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260407",
"source": "secalert@redhat.com"
},
{
"url": "https://people.redhat.com/~hkario/marvin/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-01-31T05:00:24.450116+00:00
2024-01-31T07:00:25.703618+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-01-31T03:15:08.573000+00:00
2024-01-31T06:15:45.870000+00:00
```
### Last Data Feed Release
@ -29,25 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
237168
237170
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `2`
* [CVE-2023-2439](CVE-2023/CVE-2023-24xx/CVE-2023-2439.json) (`2024-01-31T03:15:07.973`)
* [CVE-2023-31505](CVE-2023/CVE-2023-315xx/CVE-2023-31505.json) (`2024-01-31T03:15:08.160`)
* [CVE-2024-1069](CVE-2024/CVE-2024-10xx/CVE-2024-1069.json) (`2024-01-31T03:15:08.573`)
* [CVE-2023-3934](CVE-2023/CVE-2023-39xx/CVE-2023-3934.json) (`2024-01-31T06:15:45.870`)
* [CVE-2024-0914](CVE-2024/CVE-2024-09xx/CVE-2024-0914.json) (`2024-01-31T05:15:08.137`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `0`
* [CVE-2023-29491](CVE-2023/CVE-2023-294xx/CVE-2023-29491.json) (`2024-01-31T03:15:07.860`)
* [CVE-2023-48387](CVE-2023/CVE-2023-483xx/CVE-2023-48387.json) (`2024-01-31T03:15:08.213`)
* [CVE-2023-50495](CVE-2023/CVE-2023-504xx/CVE-2023-50495.json) (`2024-01-31T03:15:08.490`)
## Download and Usage