mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-03-01T07:00:25.595145+00:00
This commit is contained in:
parent
8840308a99
commit
b9f38cb9d3
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-44821",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-09T20:15:10.583",
|
||||
"lastModified": "2023-11-07T04:21:40.703",
|
||||
"lastModified": "2024-03-01T06:15:48.007",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,6 +85,14 @@
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3I6Z7VAHUYX3Q4DULJ76NFD2CIFZJYH5/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WLTXJS6AIKPGVOAJ7EYC4HL3NEG6CGF/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46009",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-18T16:15:08.900",
|
||||
"lastModified": "2023-10-25T01:25:00.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-01T06:15:48.187",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,14 @@
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3I6Z7VAHUYX3Q4DULJ76NFD2CIFZJYH5/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WLTXJS6AIKPGVOAJ7EYC4HL3NEG6CGF/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-0446",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2024-02-22T00:15:51.903",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"lastModified": "2024-03-01T05:15:08.440",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted STP, CATPART or MODEL file when parsed in ASMKERN228A.dll through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.\u00a0\n"
|
||||
"value": "A maliciously crafted STP, CATPART or MODEL file in ASMKERN228A.dll when\nparsed through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious\nactor can leverage this vulnerability to cause a crash, write sensitive data,\nor execute arbitrary code in the context of the current process.\n\n\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -31,6 +31,10 @@
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002",
|
||||
"source": "psirt@autodesk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004",
|
||||
"source": "psirt@autodesk.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-228xx/CVE-2024-22891.json
Normal file
20
CVE-2024/CVE-2024-228xx/CVE-2024-22891.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-22891",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T06:15:48.280",
|
||||
"lastModified": "2024-03-01T06:15:48.280",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nteract v.0.28.0 was discovered to contain a remote code execution (RCE) vulnerability via the Markdown link."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/EQSTLab/PoC/tree/main/2024/RCE/CVE-2024-22891",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-252xx/CVE-2024-25293.json
Normal file
20
CVE-2024/CVE-2024-252xx/CVE-2024-25293.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-25293",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T06:15:48.347",
|
||||
"lastModified": "2024-03-01T06:15:48.347",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "mjml-app versions 3.0.4 and 3.1.0-beta were discovered to contain a remote code execution (RCE) via the href attribute."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/EQSTLab/PoC/tree/main/2024/LCE/CVE-2024-25293",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-253xx/CVE-2024-25386.json
Normal file
24
CVE-2024/CVE-2024-253xx/CVE-2024-25386.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-25386",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T06:15:48.390",
|
||||
"lastModified": "2024-03-01T06:15:48.390",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directory Traversal vulnerability in DICOM\u00ae Connectivity Framework by laurelbridge before v.2.7.6b allows a remote attacker to execute arbitrary code via the format_logfile.pl file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Shulelk/15c9ba8d6b54dd4256a50a24ac7dd0a2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.1i6w31fen9.top/2024/02/02/dcf-operations-window-remote-command-execute/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
19
README.md
19
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-01T05:00:24.680840+00:00
|
||||
2024-03-01T07:00:25.595145+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-01T04:15:06.080000+00:00
|
||||
2024-03-01T06:15:48.390000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,24 +29,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
240168
|
||||
240171
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* [CVE-2023-38366](CVE-2023/CVE-2023-383xx/CVE-2023-38366.json) (`2024-03-01T03:15:06.077`)
|
||||
* [CVE-2023-47716](CVE-2023/CVE-2023-477xx/CVE-2023-47716.json) (`2024-03-01T03:15:06.280`)
|
||||
* [CVE-2023-50312](CVE-2023/CVE-2023-503xx/CVE-2023-50312.json) (`2024-03-01T03:15:06.620`)
|
||||
* [CVE-2024-22891](CVE-2024/CVE-2024-228xx/CVE-2024-22891.json) (`2024-03-01T06:15:48.280`)
|
||||
* [CVE-2024-25293](CVE-2024/CVE-2024-252xx/CVE-2024-25293.json) (`2024-03-01T06:15:48.347`)
|
||||
* [CVE-2024-25386](CVE-2024/CVE-2024-253xx/CVE-2024-25386.json) (`2024-03-01T06:15:48.390`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
* [CVE-2023-4886](CVE-2023/CVE-2023-48xx/CVE-2023-4886.json) (`2024-03-01T03:15:06.487`)
|
||||
* [CVE-2024-21338](CVE-2024/CVE-2024-213xx/CVE-2024-21338.json) (`2024-03-01T04:15:06.080`)
|
||||
* [CVE-2023-44821](CVE-2023/CVE-2023-448xx/CVE-2023-44821.json) (`2024-03-01T06:15:48.007`)
|
||||
* [CVE-2023-46009](CVE-2023/CVE-2023-460xx/CVE-2023-46009.json) (`2024-03-01T06:15:48.187`)
|
||||
* [CVE-2024-0446](CVE-2024/CVE-2024-04xx/CVE-2024-0446.json) (`2024-03-01T05:15:08.440`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user