Auto-Update: 2024-04-07T10:00:38.318313+00:00

This commit is contained in:
cad-safe-bot 2024-04-07 10:03:27 +00:00
parent c1ab5f8810
commit baf2ef6a24
15 changed files with 463 additions and 6 deletions

View File

@ -0,0 +1,96 @@
{
"id": "CVE-2021-4438",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-07T09:15:07.980",
"lastModified": "2024-04-07T09:15:07.980",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in kyivstarteam react-native-sms-user-consent up to 1.1.4 on Android. Affected by this issue is the function registerReceiver of the file android/src/main/java/ua/kyivstar/reactnativesmsuserconsent/SmsUserConsentModule.kt. The manipulation leads to improper export of android application components. Attacking locally is a requirement. Upgrading to version 1.1.5 is able to address this issue. The name of the patch is 5423dcb0cd3e4d573b5520a71fa08aa279e4c3c7. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-259508."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-926"
}
]
}
],
"references": [
{
"url": "https://github.com/kyivstarteam/react-native-sms-user-consent/commit/5423dcb0cd3e4d573b5520a71fa08aa279e4c3c7",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/kyivstarteam/react-native-sms-user-consent/pull/4",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/kyivstarteam/react-native-sms-user-consent/releases/tag/1.1.5",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259508",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259508",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-52382",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T09:15:08.317",
"lastModified": "2024-04-07T09:15:08.317",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of improper control over foreground service notifications in the notification module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-52713",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T09:15:08.377",
"lastModified": "2024-04-07T09:15:08.377",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability and confidentiality."
}
],
"metrics": {},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-52714",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T09:15:08.423",
"lastModified": "2024-04-07T09:15:08.423",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of defects introduced in the design process in the hwnff module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
},
{
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-52715",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T09:15:08.477",
"lastModified": "2024-04-07T09:15:08.477",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The SystemUI module has a vulnerability in permission management.\nImpact: Successful exploitation of this vulnerability may affect availability."
}
],
"metrics": {},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
},
{
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-52716",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T09:15:08.520",
"lastModified": "2024-04-07T09:15:08.520",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of starting activities in the background in the ActivityManagerService (AMS) module.\nImpact: Successful exploitation of this vulnerability will affect availability."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
},
{
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-52717",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T09:15:08.600",
"lastModified": "2024-04-07T09:15:08.600",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Permission verification vulnerability in the lock screen module.\nImpact: Successful exploitation of this vulnerability will affect availability."
}
],
"metrics": {},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-30413",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T08:15:07.227",
"lastModified": "2024-04-07T08:15:07.227",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability."
}
],
"metrics": {},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-30414",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T08:15:07.373",
"lastModified": "2024-04-07T08:15:07.373",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Command injection vulnerability in the AccountManager module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-30415",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T08:15:07.483",
"lastModified": "2024-04-07T08:15:07.483",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability."
}
],
"metrics": {},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-30416",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T09:15:08.650",
"lastModified": "2024-04-07T09:15:08.650",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Use After Free (UAF) vulnerability in the underlying driver module.\nImpact: Successful exploitation of this vulnerability will affect availability."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
},
{
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-30417",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T09:15:08.727",
"lastModified": "2024-04-07T09:15:08.727",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Path traversal vulnerability in the Bluetooth-based sharing module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-30418",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T09:15:08.810",
"lastModified": "2024-04-07T09:15:08.810",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of insufficient permission verification in the app management module.\nImpact: Successful exploitation of this vulnerability will affect availability."
}
],
"metrics": {},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",
"source": "psirt@huawei.com"
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689",
"source": "psirt@huawei.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-07T08:00:38.092428+00:00
2024-04-07T10:00:38.318313+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-07T06:15:08.223000+00:00
2024-04-07T09:15:08.810000+00:00
```
### Last Data Feed Release
@ -33,14 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
244301
244314
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `13`
- [CVE-2024-3417](CVE-2024/CVE-2024-34xx/CVE-2024-3417.json) (`2024-04-07T06:15:08.223`)
- [CVE-2021-4438](CVE-2021/CVE-2021-44xx/CVE-2021-4438.json) (`2024-04-07T09:15:07.980`)
- [CVE-2023-52382](CVE-2023/CVE-2023-523xx/CVE-2023-52382.json) (`2024-04-07T09:15:08.317`)
- [CVE-2023-52713](CVE-2023/CVE-2023-527xx/CVE-2023-52713.json) (`2024-04-07T09:15:08.377`)
- [CVE-2023-52714](CVE-2023/CVE-2023-527xx/CVE-2023-52714.json) (`2024-04-07T09:15:08.423`)
- [CVE-2023-52715](CVE-2023/CVE-2023-527xx/CVE-2023-52715.json) (`2024-04-07T09:15:08.477`)
- [CVE-2023-52716](CVE-2023/CVE-2023-527xx/CVE-2023-52716.json) (`2024-04-07T09:15:08.520`)
- [CVE-2023-52717](CVE-2023/CVE-2023-527xx/CVE-2023-52717.json) (`2024-04-07T09:15:08.600`)
- [CVE-2024-30413](CVE-2024/CVE-2024-304xx/CVE-2024-30413.json) (`2024-04-07T08:15:07.227`)
- [CVE-2024-30414](CVE-2024/CVE-2024-304xx/CVE-2024-30414.json) (`2024-04-07T08:15:07.373`)
- [CVE-2024-30415](CVE-2024/CVE-2024-304xx/CVE-2024-30415.json) (`2024-04-07T08:15:07.483`)
- [CVE-2024-30416](CVE-2024/CVE-2024-304xx/CVE-2024-30416.json) (`2024-04-07T09:15:08.650`)
- [CVE-2024-30417](CVE-2024/CVE-2024-304xx/CVE-2024-30417.json) (`2024-04-07T09:15:08.727`)
- [CVE-2024-30418](CVE-2024/CVE-2024-304xx/CVE-2024-30418.json) (`2024-04-07T09:15:08.810`)
### CVEs modified in the last Commit

View File

@ -185016,6 +185016,7 @@ CVE-2021-44376,0,0,ef70a3af0a788bfe441fa3cea7278b2fd1473c6bd37e6305118fc4225d7cc
CVE-2021-44377,0,0,82d9f1ee7625cf617c5207ed67c52743ff5cd59a53b29fd20eaab2bedc0c3c65,2022-10-25T17:45:19.107000
CVE-2021-44378,0,0,870e0612881d8a665fabb9b00101d49ceaddb187df8ea88f52e7214e1e791834,2022-10-25T17:45:12.060000
CVE-2021-44379,0,0,51327504aa3cccaa51d1f682f6476074bb5b893fa6786d25ec532872024e3202,2022-10-25T17:44:33.863000
CVE-2021-4438,1,1,6990a0cce9d4303ae05d808caa0961520276040bea73ecf742bf42148acf73aa,2024-04-07T09:15:07.980000
CVE-2021-44380,0,0,443a97fca81c1b1c154ed9d4148e2b7583b2c41b9af3ee8cf674d3756df1b0fc,2022-10-25T17:44:25.900000
CVE-2021-44381,0,0,dba69d3bc7ac8803c1636b3170844432e2975cb35137a1f5631b90e20981faa3,2022-10-25T17:44:17.347000
CVE-2021-44382,0,0,1708be32e649249e0730e3064dd46b522eaf902f954fe0c6d8964a709e7b95b1,2022-10-25T17:44:29.867000
@ -236153,6 +236154,7 @@ CVE-2023-52379,0,0,ca682d4d897e50937e81bcdf7730d5c2894d90bd816224171ff8486a1fbed
CVE-2023-5238,0,0,a261b85ed6b7b17d61d99dc1a4da76845d0517dc6639c69481ed60057b693590,2023-11-08T18:37:35.557000
CVE-2023-52380,0,0,d58f8abe62c6a33934f8c0dca186b52f3ce877c05545d71e6b6419ff9d811f02,2024-02-20T19:50:53.960000
CVE-2023-52381,0,0,472b65e10275d2947c6588b1ef901c2b36df20ae38152db3173d8780f82018ab,2024-02-20T19:50:53.960000
CVE-2023-52382,1,1,f973ee9d583d8e697e8b4f7637a6e5190862ca7e889e9b6c9293a012c3392d53,2024-04-07T09:15:08.317000
CVE-2023-52387,0,0,5d67110ecd6bd3e11c6d9a0b6111500c254e06ec210161b97966bed3e04d85cb,2024-02-20T19:50:53.960000
CVE-2023-52389,0,0,0fee7704e079ab3b4f714b445118b41a4b2e46d55413f0fbef2c2dadc64f3a04,2024-02-08T16:43:22.473000
CVE-2023-5239,0,0,7c3185e021110163a371df48ac7e58ad34571a8f388d20b4e340a0c44f625d88,2023-12-01T19:22:45.963000
@ -236386,6 +236388,11 @@ CVE-2023-5268,0,0,0962b04b5f2e0bf762a96ebb8616f9140fd2d59b16626fe338dc7cc8ec8b84
CVE-2023-5269,0,0,4f38ec3d168762c5ca24d91f141ea3b0d5a2670e2027eea13a5d8bb7213d80e9,2024-03-21T02:50:12.440000
CVE-2023-5270,0,0,45e6e373740d9b24137c078ed2725b31491b15b24a5a3abd78c46fdf4eea0b37,2024-03-21T02:50:12.537000
CVE-2023-5271,0,0,72c78ae7eeaf234a144e38c51597ad336e62e29aa3a60522a770290559a4b05f,2024-03-21T02:50:12.613000
CVE-2023-52713,1,1,9344407565b28aac5555737da721952ecb27b6ada3641a2503337c56c7efa958,2024-04-07T09:15:08.377000
CVE-2023-52714,1,1,78b60c9f9e8cb02e8f71cd5f0cd761b045b65e9fef89079ea15dd3d7b855db81,2024-04-07T09:15:08.423000
CVE-2023-52715,1,1,2cb5ced073851f70984636b09da9983fbac0efc453e117e436da6440da236c1e,2024-04-07T09:15:08.477000
CVE-2023-52716,1,1,24c1ad970d25cbdd030294ff3f96772405729e13b1f4ae00c63e18bdd429535b,2024-04-07T09:15:08.520000
CVE-2023-52717,1,1,3d4ee5754b53d2a9bd6433f121f5706b2bb7f0d39cf2c21fa3aebd9c29809199,2024-04-07T09:15:08.600000
CVE-2023-5272,0,0,0bb9b4e6b6780e8183edbfb5c097d850776c156d93382f68f3552c771fa7f059,2024-03-21T02:50:12.690000
CVE-2023-5273,0,0,3768d104890d72f805182c048009a35b3050621fe725bc64a0e78c6c7372d88f,2024-03-21T02:50:12.773000
CVE-2023-5274,0,0,230ef4c0e160801f289163632d814f7177c2b1395a715b72f33c8d0b5d876249,2023-12-05T18:20:39.937000
@ -243917,6 +243924,12 @@ CVE-2024-30371,0,0,b1d655f20dce1a124d87b962baf334d2a249a3ceff7f094651f12c5849e1f
CVE-2024-3039,0,0,81922daeb5016788549747eb633cf2cb36e0064f861b28dab53687d178ed51a9,2024-03-28T16:07:30.893000
CVE-2024-3040,0,0,e987ce224402b7c6ae92dea1553b3428b1d1ea83a8843974e3829b4ae2d222f5,2024-03-28T16:07:30.893000
CVE-2024-3041,0,0,6c17e75e5a23e8d64473e423f0739f5cbb4a4c0a92a00e74133d2d0cbfd4b93a,2024-03-28T16:07:30.893000
CVE-2024-30413,1,1,a0e1eff62222949cb8be10b864594acd8caba3617db28ac986f09688d43d6c7d,2024-04-07T08:15:07.227000
CVE-2024-30414,1,1,b27e1b4a39f9ba55e05dec2a6c8ff8717b4f2f33aba1895c77fb7100c6339363,2024-04-07T08:15:07.373000
CVE-2024-30415,1,1,ec66a60a1026f4f723633cee4d5d5ef7a809aa29bf0dad743231374275b4777c,2024-04-07T08:15:07.483000
CVE-2024-30416,1,1,2eceeea5f7d0943fabd5fe204f55f71ab3347211ad22117142e558cb5cae7c37,2024-04-07T09:15:08.650000
CVE-2024-30417,1,1,afb8c378fd1228b6529f12ca1a856b8988ffcab3ce1021e751ec2a439341979d,2024-04-07T09:15:08.727000
CVE-2024-30418,1,1,84ef1f436dd42d3e7bc9f5048cf9f0789a32fb90e830e451d8583fea4a305c1c,2024-04-07T09:15:08.810000
CVE-2024-3042,0,0,c14582e836c58b6dd5a313f7fba974623fe7cf38c96ce08ac4814f262bd27396,2024-03-28T16:07:30.893000
CVE-2024-30421,0,0,8cfd124574a85b45cac2d52527d901d612a69bb0525bed810c2e40b98978560c,2024-03-28T12:42:56.150000
CVE-2024-30422,0,0,ba819084ec2bbeb55fdd38ba0e9a54a8d622d3ff700a26bbbbcd13ded8068264,2024-03-28T12:42:56.150000
@ -244299,4 +244312,4 @@ CVE-2024-3413,0,0,e1d44a7f6ecaa59001e0c3b7293038f73b00022993d5cfe2b006c5f004dd07
CVE-2024-3414,0,0,865b8b9a463ec948dc343c4a30756496edcf661fb9a023649606bd76ffc5f79d,2024-04-06T21:15:20.167000
CVE-2024-3415,0,0,23cc20be89e4c811c9f035ba78dae2c60f0134aa8421de0bb9bfdc4f8027ffdc,2024-04-06T23:15:07.630000
CVE-2024-3416,0,0,200d89ec70de0812fd3c5d8005f173692de3332633ae40be8d1d14b8003608f6,2024-04-07T04:15:07.853000
CVE-2024-3417,1,1,b709776032706fffe344a55daccb44666332d7c2f5bd28c6517d5f92d2dba641,2024-04-07T06:15:08.223000
CVE-2024-3417,0,0,b709776032706fffe344a55daccb44666332d7c2f5bd28c6517d5f92d2dba641,2024-04-07T06:15:08.223000

Can't render this file because it is too large.