Auto-Update: 2024-01-24T05:00:25.051511+00:00

This commit is contained in:
cad-safe-bot 2024-01-24 05:00:28 +00:00
parent 847abb598a
commit b636ffa1d9
7 changed files with 102 additions and 18 deletions

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-48541",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:31.443",
"lastModified": "2024-01-23T03:15:11.287",
"lastModified": "2024-01-24T03:15:07.763",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A memory leak in ImageMagick 7.0.10-45 and 6.9.11-22 allows remote attackers to perform a denial of service via the \"identify -help\" command."
},
{
"lang": "es",
"value": "Una p\u00e9rdida de memoria en ImageMagick 7.0.10-45 y 6.9.11-22 permite a atacantes remotos realizar una denegaci\u00f3n de servicio mediante el comando \"identify -help\"."
}
],
"metrics": {
@ -81,6 +85,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LICYTADFJAFPZW3Y2MKNCJIUYODPAG4L/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YAULDP3GG5KI3XITQ5XSMRSILCBZS2VK/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0437",
"sourceIdentifier": "cna@mongodb.com",
"published": "2024-01-12T14:15:47.387",
"lastModified": "2024-01-18T21:18:53.223",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-24T03:15:07.967",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -106,6 +106,10 @@
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GUVOAFZFSYTNBF6R7H4XJM5DHWBRQ6P/",
"source": "cna@mongodb.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-31037",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-01-24T03:15:08.100",
"lastModified": "2024-01-24T03:15:08.100",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nNVIDIA Bluefield 2 and Bluefield 3 DPU BMC contains a vulnerability in ipmitool, where a root user may cause code injection by a network call. A successful exploit of this vulnerability may lead to code execution on the OS.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5511",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51257",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-16T02:15:28.537",
"lastModified": "2024-01-23T17:11:17.413",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-24T03:15:08.353",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -76,6 +76,14 @@
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNTGL7I5IJSQ4BZ5MGKWJPQYICUMHQ5I/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MBF5KYWCZVIDMITRX7GBVWGNWKAMQORZ/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5341",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-19T10:15:49.433",
"lastModified": "2024-01-23T03:15:12.360",
"lastModified": "2024-01-24T03:15:08.430",
"vulnStatus": "Modified",
"descriptions": [
{
@ -161,6 +161,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LICYTADFJAFPZW3Y2MKNCJIUYODPAG4L/",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAULDP3GG5KI3XITQ5XSMRSILCBZS2VK/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7008",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-12-23T13:15:07.573",
"lastModified": "2024-01-04T19:14:33.990",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-24T03:15:08.553",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -142,6 +142,10 @@
"tags": [
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHNBXGKJWISJETTTDTZKTBFIBJUOSLKL/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-01-24T03:00:24.562439+00:00
2024-01-24T05:00:25.051511+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-01-24T02:15:07.233000+00:00
2024-01-24T03:15:08.553000+00:00
```
### Last Data Feed Release
@ -29,24 +29,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
236698
236699
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `1`
* [CVE-2022-4964](CVE-2022/CVE-2022-49xx/CVE-2022-4964.json) (`2024-01-24T01:15:07.977`)
* [CVE-2024-21765](CVE-2024/CVE-2024-217xx/CVE-2024-21765.json) (`2024-01-24T02:15:07.110`)
* [CVE-2024-21796](CVE-2024/CVE-2024-217xx/CVE-2024-21796.json) (`2024-01-24T02:15:07.180`)
* [CVE-2024-22380](CVE-2024/CVE-2024-223xx/CVE-2024-22380.json) (`2024-01-24T02:15:07.233`)
* [CVE-2023-31037](CVE-2023/CVE-2023-310xx/CVE-2023-31037.json) (`2024-01-24T03:15:08.100`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `5`
* [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-01-24T02:00:01.397`)
* [CVE-2022-48541](CVE-2022/CVE-2022-485xx/CVE-2022-48541.json) (`2024-01-24T03:15:07.763`)
* [CVE-2023-0437](CVE-2023/CVE-2023-04xx/CVE-2023-0437.json) (`2024-01-24T03:15:07.967`)
* [CVE-2023-51257](CVE-2023/CVE-2023-512xx/CVE-2023-51257.json) (`2024-01-24T03:15:08.353`)
* [CVE-2023-5341](CVE-2023/CVE-2023-53xx/CVE-2023-5341.json) (`2024-01-24T03:15:08.430`)
* [CVE-2023-7008](CVE-2023/CVE-2023-70xx/CVE-2023-7008.json) (`2024-01-24T03:15:08.553`)
## Download and Usage