From a25b61a347d75ac1bff3058b8014a12e7406ef7e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 3 Sep 2023 20:00:26 +0000 Subject: [PATCH] Auto-Update: 2023-09-03T20:00:23.347960+00:00 --- CVE-2023/CVE-2023-47xx/CVE-2023-4751.json | 59 +++++++++++++++++++++++ README.md | 35 ++------------ 2 files changed, 64 insertions(+), 30 deletions(-) create mode 100644 CVE-2023/CVE-2023-47xx/CVE-2023-4751.json diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4751.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4751.json new file mode 100644 index 00000000000..71175044026 --- /dev/null +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4751.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-4751", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-09-03T19:15:43.677", + "lastModified": "2023-09-03T19:15:43.677", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1331." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/vim/vim/commit/e1121b139480f53d1b06f84f3e4574048108fa0b", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/db7be8d6-6cb7-4ae5-9c4e-805423afa378", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index cfe6135199a..5576a725720 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-09-03T18:00:24.786225+00:00 +2023-09-03T20:00:23.347960+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-09-03T17:15:09.263000+00:00 +2023-09-03T19:15:43.677000+00:00 ``` ### Last Data Feed Release @@ -29,45 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -223973 +223974 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -* [CVE-2023-41180](CVE-2023/CVE-2023-411xx/CVE-2023-41180.json) (`2023-09-03T16:15:10.823`) +* [CVE-2023-4751](CVE-2023/CVE-2023-47xx/CVE-2023-4751.json) (`2023-09-03T19:15:43.677`) ### CVEs modified in the last Commit -Recently modified CVEs: `25` +Recently modified CVEs: `0` -* [CVE-2021-44792](CVE-2021/CVE-2021-447xx/CVE-2021-44792.json) (`2023-09-03T16:15:07.853`) -* [CVE-2021-44793](CVE-2021/CVE-2021-447xx/CVE-2021-44793.json) (`2023-09-03T16:15:08.613`) -* [CVE-2021-44794](CVE-2021/CVE-2021-447xx/CVE-2021-44794.json) (`2023-09-03T16:15:08.737`) -* [CVE-2021-44795](CVE-2021/CVE-2021-447xx/CVE-2021-44795.json) (`2023-09-03T16:15:08.840`) -* [CVE-2021-45031](CVE-2021/CVE-2021-450xx/CVE-2021-45031.json) (`2023-09-03T16:15:08.957`) -* [CVE-2021-45475](CVE-2021/CVE-2021-454xx/CVE-2021-45475.json) (`2023-09-03T16:15:09.107`) -* [CVE-2021-45476](CVE-2021/CVE-2021-454xx/CVE-2021-45476.json) (`2023-09-03T16:15:09.250`) -* [CVE-2021-45479](CVE-2021/CVE-2021-454xx/CVE-2021-45479.json) (`2023-09-03T16:15:09.367`) -* [CVE-2021-3806](CVE-2021/CVE-2021-38xx/CVE-2021-3806.json) (`2023-09-03T17:15:07.267`) -* [CVE-2021-3825](CVE-2021/CVE-2021-38xx/CVE-2021-3825.json) (`2023-09-03T17:15:08.317`) -* [CVE-2021-3958](CVE-2021/CVE-2021-39xx/CVE-2021-3958.json) (`2023-09-03T17:15:08.643`) -* [CVE-2021-43361](CVE-2021/CVE-2021-433xx/CVE-2021-43361.json) (`2023-09-03T17:15:08.977`) -* [CVE-2021-43362](CVE-2021/CVE-2021-433xx/CVE-2021-43362.json) (`2023-09-03T17:15:09.073`) -* [CVE-2021-44196](CVE-2021/CVE-2021-441xx/CVE-2021-44196.json) (`2023-09-03T17:15:09.147`) -* [CVE-2021-44197](CVE-2021/CVE-2021-441xx/CVE-2021-44197.json) (`2023-09-03T17:15:09.263`) -* [CVE-2022-0495](CVE-2022/CVE-2022-04xx/CVE-2022-0495.json) (`2023-09-03T16:15:09.510`) -* [CVE-2022-0900](CVE-2022/CVE-2022-09xx/CVE-2022-0900.json) (`2023-09-03T16:15:09.650`) -* [CVE-2022-1277](CVE-2022/CVE-2022-12xx/CVE-2022-1277.json) (`2023-09-03T16:15:09.773`) -* [CVE-2022-2177](CVE-2022/CVE-2022-21xx/CVE-2022-2177.json) (`2023-09-03T16:15:09.900`) -* [CVE-2022-2265](CVE-2022/CVE-2022-22xx/CVE-2022-2265.json) (`2023-09-03T16:15:10.027`) -* [CVE-2022-2266](CVE-2022/CVE-2022-22xx/CVE-2022-2266.json) (`2023-09-03T16:15:10.167`) -* [CVE-2022-2315](CVE-2022/CVE-2022-23xx/CVE-2022-2315.json) (`2023-09-03T16:15:10.280`) -* [CVE-2022-45085](CVE-2022/CVE-2022-450xx/CVE-2022-45085.json) (`2023-09-03T16:15:10.417`) -* [CVE-2023-0839](CVE-2023/CVE-2023-08xx/CVE-2023-0839.json) (`2023-09-03T16:15:10.543`) -* [CVE-2023-0882](CVE-2023/CVE-2023-08xx/CVE-2023-0882.json) (`2023-09-03T16:15:10.660`) ## Download and Usage