mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-03-25T00:55:30.001748+00:00
This commit is contained in:
parent
86ed9504b2
commit
93ee4ce9a6
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-42739",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-10-20T07:15:09.140",
|
||||
"lastModified": "2023-11-07T03:39:14.253",
|
||||
"lastModified": "2024-03-24T23:15:08.387",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability."
|
||||
"value": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -188,10 +188,18 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ%40mwanda/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/oss-sec/2021/q2/46",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2022.html",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-6597",
|
||||
"sourceIdentifier": "cna@python.org",
|
||||
"published": "2024-03-19T16:15:08.743",
|
||||
"lastModified": "2024-03-19T16:33:58.680",
|
||||
"lastModified": "2024-03-24T23:15:08.920",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.2, 3.11.8, 3.10.13, 3.9.18, and 3.8.18 and prior.\n\nThe tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 un problema en la clase CPython `tempfile.TemporaryDirectory` que afecta a las versiones 3.12.2, 3.11.8, 3.10.13, 3.9.18 y 3.8.18 y anteriores. La clase tempfile.TemporaryDirectory eliminar\u00eda la referencia a enlaces simb\u00f3licos durante la limpieza de errores relacionados con permisos. Esto significa que los usuarios que pueden ejecutar programas privilegiados pueden modificar los permisos de los archivos a los que hacen referencia los enlaces simb\u00f3licos en algunas circunstancias."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -63,6 +67,10 @@
|
||||
"url": "https://github.com/python/cpython/issues/91133",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/Q5C6ATFC67K53XFV4KE45325S7NS62LD/",
|
||||
"source": "cna@python.org"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-0450",
|
||||
"sourceIdentifier": "cna@python.org",
|
||||
"published": "2024-03-19T16:15:09.180",
|
||||
"lastModified": "2024-03-19T16:33:58.680",
|
||||
"lastModified": "2024-03-24T23:15:09.027",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was found in the CPython `zipfile` module affecting versions 3.12.2, 3.11.8, 3.10.13, 3.9.18, and 3.8.18 and prior.\n\nThe zipfile module is vulnerable to \u201cquoted-overlap\u201d zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 un problema en el m\u00f3dulo `zipfile` de CPython que afecta a las versiones 3.12.2, 3.11.8, 3.10.13, 3.9.18 y 3.8.18 y anteriores. El m\u00f3dulo zipfile es vulnerable a bombas zip \"superpuestas entre comillas\" que explotan el formato zip para crear una bomba zip con una alta relaci\u00f3n de compresi\u00f3n. Las versiones fijas de CPython hacen que el m\u00f3dulo zipfile rechace archivos zip que se superponen con entradas en el archivo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -75,6 +79,14 @@
|
||||
"url": "https://github.com/python/cpython/issues/109858",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00024.html",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/XELNUX2L3IOHBTFU7RQHCY6OUVEWZ2FG/",
|
||||
"source": "cna@python.org"
|
||||
|
15
README.md
15
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-24T21:00:38.277899+00:00
|
||||
2024-03-25T00:55:30.001748+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-24T20:15:08.243000+00:00
|
||||
2024-03-24T23:15:09.027000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -34,18 +34,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
* [CVE-2024-29034](CVE-2024/CVE-2024-290xx/CVE-2024-29034.json) (`2024-03-24T20:15:07.770`)
|
||||
* [CVE-2024-29187](CVE-2024/CVE-2024-291xx/CVE-2024-29187.json) (`2024-03-24T20:15:08.003`)
|
||||
* [CVE-2024-29188](CVE-2024/CVE-2024-291xx/CVE-2024-29188.json) (`2024-03-24T20:15:08.243`)
|
||||
* [CVE-2024-29194](CVE-2024/CVE-2024-291xx/CVE-2024-29194.json) (`2024-03-24T19:15:07.240`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
* [CVE-2021-42739](CVE-2021/CVE-2021-427xx/CVE-2021-42739.json) (`2024-03-24T23:15:08.387`)
|
||||
* [CVE-2023-6597](CVE-2023/CVE-2023-65xx/CVE-2023-6597.json) (`2024-03-24T23:15:08.920`)
|
||||
* [CVE-2024-0450](CVE-2024/CVE-2024-04xx/CVE-2024-0450.json) (`2024-03-24T23:15:09.027`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
14
_state.csv
14
_state.csv
@ -183778,7 +183778,7 @@ CVE-2021-42734,0,0,c213c12f1e363c4b93b0fb44e1419ee23740d21c1741644a3af29200a70d3
|
||||
CVE-2021-42735,0,0,16ffc05d739bfcd8aaced10b0a57f50452cd0545d89ef5b9a7d054212a8bdddf,2022-06-24T17:12:59.300000
|
||||
CVE-2021-42737,0,0,74f0ba8bfc7b204a964a1e6551a871e4b4850d9d63f461f3a8e7eb691a8057c5,2022-04-25T16:55:20.447000
|
||||
CVE-2021-42738,0,0,54822c3d74f1f1c0b2c5d62709187f2e64edd8ac1e56590e4ef6ec88a630d996,2022-04-25T16:55:25.493000
|
||||
CVE-2021-42739,0,0,85f8b85de918a65d21e91c1eb814d3f562f9e645975998c9eb0378f218350869,2023-11-07T03:39:14.253000
|
||||
CVE-2021-42739,0,1,f8b52214677ce7775d08e9286144ee6647c74dca1384cc2fe2e06ecf239767a2,2024-03-24T23:15:08.387000
|
||||
CVE-2021-4274,0,0,8d88ddf31ca9694033e8690f4446279066ee5d694eda7e78137ffb9099c860e8,2023-11-07T03:40:30.123000
|
||||
CVE-2021-42740,0,0,0b57a777fd9cea27248692650ca471d255707d96c8ed464c126815992727d5ce,2021-10-28T13:54:18.650000
|
||||
CVE-2021-42743,0,0,f10d57e2bd75d108d8e714e83051a8c39d13a6be1445f1e5d92b11e4d2015d58,2022-05-17T17:30:14.633000
|
||||
@ -237260,7 +237260,7 @@ CVE-2023-6592,0,0,64cc414903b2337cb0bd8a5539f823df2fd800285d9deb31df562c295ab75b
|
||||
CVE-2023-6593,0,0,e3b3e08c9100a5e7cf14c217c401234f02853669dddb630e64650e50aa403cb9,2023-12-15T14:38:03.057000
|
||||
CVE-2023-6594,0,0,d3868296aafc64b6514f2cb5804c13a0687b79a1bf9d5ede2da8f4a451319021,2024-01-11T23:32:17.207000
|
||||
CVE-2023-6595,0,0,36c4a8ec5f87bb2afaaafb9bf8ff027d48fb76423d85051bd988412db95a161f,2023-12-19T17:51:54.827000
|
||||
CVE-2023-6597,0,0,7472a232aea55645c35e230898a903aa023aac56248eba0028497076a7bd785d,2024-03-19T16:33:58.680000
|
||||
CVE-2023-6597,0,1,48497f87cf4dd48ac63984e1d9b1272e4b5e5c7985ff6b2afd6a88db77a41607,2024-03-24T23:15:08.920000
|
||||
CVE-2023-6598,0,0,8b8f7f87f85d85987c85ed76cf906c53121cfbe34e11294d4d2ee1e26a9f8779,2024-01-17T21:24:33.233000
|
||||
CVE-2023-6599,0,0,a782437846e35b14cfc1bab743463edcd34abeb3c74717f8ec091163e3cb6d86,2023-12-12T17:22:17.503000
|
||||
CVE-2023-6600,0,0,5f831a8b56a5e0738a2287ebfb92087ea24b0b41fd445ecae0c2fcd42b5f0965,2024-01-10T01:15:38.327000
|
||||
@ -238047,7 +238047,7 @@ CVE-2024-0446,0,0,177f0f6fa9da6f41d147a83b94c4a1a182c538433bae32bd44fabede9ad39c
|
||||
CVE-2024-0447,0,0,0c6016e0347b145a593fad6fcd7d63ca3384ae4f246f4c3ce15c3efcb70f925f,2024-03-13T18:16:18.563000
|
||||
CVE-2024-0448,0,0,34d135a6c32b742f6287060adde7fa7a1eec7917b9f747a74526de46b9fe8477,2024-02-13T18:33:30.020000
|
||||
CVE-2024-0449,0,0,04b2f76b62eb26ddbf7fa5138c96f420527f366e1f0ea44623218005ce795988,2024-03-13T18:16:18.563000
|
||||
CVE-2024-0450,0,0,3137a53cb968388f1eefc5402831d276dae0411f707bdfd8590d197472b5828f,2024-03-19T16:33:58.680000
|
||||
CVE-2024-0450,0,1,144fdd447d50ab903f6c168928a81af3859ad4a2ee14436ed430ccf9ec371666,2024-03-24T23:15:09.027000
|
||||
CVE-2024-0454,0,0,810f9e73f945a577a0ff7132f31c0f57509a3b365a63653925f66b4427090389,2024-01-22T16:10:47.897000
|
||||
CVE-2024-0455,0,0,ad0560da6bb8e515170fb5f5abe4324ffa964b23a03e1a8f57d4bad150093bdc,2024-02-26T16:32:25.577000
|
||||
CVE-2024-0456,0,0,b7149a60bcad100dc614ada7456561f1d7527e1b845005213074d4fe4b957d52,2024-01-31T20:12:00.077000
|
||||
@ -242401,7 +242401,7 @@ CVE-2024-29027,0,0,0443c0a5c3d136c6828a405e5e82a90c05a4f9edd7fbc1d30ba3bd5c5a4c0
|
||||
CVE-2024-29031,0,0,7f58d37a0fe973dfcea39547446f82cfc81d56a030b41fe804de053f1e911236,2024-03-22T12:45:36.130000
|
||||
CVE-2024-29032,0,0,fb02d2202c95545e773ec7caf494a1bc4414b85dfda56ba00a602bc4c558e262,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29033,0,0,3da47380cd3a71a38fcec215b864d4658478d80ec3a2925a5a05224fec9ea170,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29034,1,1,c0fed86dcd6c7532587f1b2d451e1c3ed9af00ed24fc64ae5ebafba5f3f0c7f4,2024-03-24T20:15:07.770000
|
||||
CVE-2024-29034,0,0,c0fed86dcd6c7532587f1b2d451e1c3ed9af00ed24fc64ae5ebafba5f3f0c7f4,2024-03-24T20:15:07.770000
|
||||
CVE-2024-29036,0,0,9e006ee4d248b12879916fd5a38e3fbf7a89f45ed6265666710ccd15d4bd0aa4,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29037,0,0,522cff780a141ed0cb980da4de92689da8f883cb35906d0c7290ad955ce6a80b,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29042,0,0,94be04c88512f8801f1a0b7e8a0fe44bc1e2661493f643835e5309c09e2ba389,2024-03-22T19:02:10.300000
|
||||
@ -242464,10 +242464,10 @@ CVE-2024-29180,0,0,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d1252
|
||||
CVE-2024-29184,0,0,f7b8833969ca9d0c0710d9e673438a664414c13b1764f6ae8189b2b9b95caa65,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29185,0,0,87ad89bc08b625b0d76de9def6a9a3830774fb10e68a03b7a7a4beff2b51d9e3,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29186,0,0,4d22f13bcc9a989b4457971fb422d0f63596eb5c598cc015a08c44b1e3975e55,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29187,1,1,12e55670ae717a0fa3c389e1038799e5b6153a98cc51d9cf3b16dea7e31e7120,2024-03-24T20:15:08.003000
|
||||
CVE-2024-29188,1,1,cc3730d2ebdf75dd84c4f607d536a8234c6ddeae1a6d8a368b62080f9fb1b7d5,2024-03-24T20:15:08.243000
|
||||
CVE-2024-29187,0,0,12e55670ae717a0fa3c389e1038799e5b6153a98cc51d9cf3b16dea7e31e7120,2024-03-24T20:15:08.003000
|
||||
CVE-2024-29188,0,0,cc3730d2ebdf75dd84c4f607d536a8234c6ddeae1a6d8a368b62080f9fb1b7d5,2024-03-24T20:15:08.243000
|
||||
CVE-2024-29190,0,0,4d7a2612081971332e8caf786004f0b15e412bf1a77fc6c71f244026d2d902dc,2024-03-22T23:15:07.123000
|
||||
CVE-2024-29194,1,1,030a3bec3652a048acc5c4a5abf5deee4b1337b5551659bdbb915c80ccb7ecc9,2024-03-24T19:15:07.240000
|
||||
CVE-2024-29194,0,0,030a3bec3652a048acc5c4a5abf5deee4b1337b5551659bdbb915c80ccb7ecc9,2024-03-24T19:15:07.240000
|
||||
CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000
|
||||
CVE-2024-29271,0,0,86d82853285296d2653b2954b1f865b89755729787a00c9a08bf8b4da2a10347,2024-03-22T12:45:36.130000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user