mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-03-05T09:08:16.097596+00:00
This commit is contained in:
parent
c0b74d04e6
commit
dc5b02b201
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-30733",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-10-04T04:15:13.030",
|
||||
"lastModified": "2023-11-07T04:14:03.443",
|
||||
"lastModified": "2024-03-05T08:15:38.820",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stack-based Buffer Overflow in vulnerability HDCP trustlet prior to SMR Oct-2023 Release 1 allows attacker to perform code execution."
|
||||
"value": "Stack-based Buffer Overflow in vulnerability HDCP trustlet prior to SMR Oct-2023 Release 1 allows local privileged attackers to perform code execution."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -37,7 +37,7 @@
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "3af57064-a867-422c-b2ad-40307b65c458",
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-42531",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-11-07T08:15:15.247",
|
||||
"lastModified": "2023-11-13T18:08:13.177",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-05T08:15:39.120",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper access control vulnerability in SmsController prior to SMR Nov-2023 Release1 allows attacker to bypass restrictions on starting activities from the background."
|
||||
"value": "Improper access control vulnerability in SmsController prior to SMR Nov-2023 Release1 allows local attackers to bypass restrictions on starting activities from the background."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
43
CVE-2024/CVE-2024-208xx/CVE-2024-20833.json
Normal file
43
CVE-2024/CVE-2024-208xx/CVE-2024-20833.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2024-20833",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-03-05T08:15:39.260",
|
||||
"lastModified": "2024-03-05T08:15:39.260",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free vulnerability in pub_crypto_recv_msg prior to SMR Mar-2024 Release 1 due to race condition allows local attackers with system privilege to cause memory corruption."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=03",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-263xx/CVE-2024-26333.json
Normal file
20
CVE-2024/CVE-2024-263xx/CVE-2024-26333.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-26333",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-05T08:15:39.500",
|
||||
"lastModified": "2024-03-05T08:15:39.500",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "swftools v0.9.2 was discovered to contain a segmentation violation via the function free_lines at swftools/lib/modules/swfshape.c."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/matthiaskramm/swftools/issues/219",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
README.md
29
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-05T07:00:25.248602+00:00
|
||||
2024-03-05T09:08:16.097596+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-05T06:15:53+00:00
|
||||
2024-03-05T08:15:39.500000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,34 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
240538
|
||||
240540
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
* [CVE-2023-52432](CVE-2023/CVE-2023-524xx/CVE-2023-52432.json) (`2024-03-05T05:15:08.070`)
|
||||
* [CVE-2023-42419](CVE-2023/CVE-2023-424xx/CVE-2023-42419.json) (`2024-03-05T06:15:52.820`)
|
||||
* [CVE-2024-20829](CVE-2024/CVE-2024-208xx/CVE-2024-20829.json) (`2024-03-05T05:15:08.703`)
|
||||
* [CVE-2024-20830](CVE-2024/CVE-2024-208xx/CVE-2024-20830.json) (`2024-03-05T05:15:09.093`)
|
||||
* [CVE-2024-20831](CVE-2024/CVE-2024-208xx/CVE-2024-20831.json) (`2024-03-05T05:15:09.403`)
|
||||
* [CVE-2024-20832](CVE-2024/CVE-2024-208xx/CVE-2024-20832.json) (`2024-03-05T05:15:09.793`)
|
||||
* [CVE-2024-20834](CVE-2024/CVE-2024-208xx/CVE-2024-20834.json) (`2024-03-05T05:15:10.207`)
|
||||
* [CVE-2024-20835](CVE-2024/CVE-2024-208xx/CVE-2024-20835.json) (`2024-03-05T05:15:10.473`)
|
||||
* [CVE-2024-20836](CVE-2024/CVE-2024-208xx/CVE-2024-20836.json) (`2024-03-05T05:15:10.813`)
|
||||
* [CVE-2024-20837](CVE-2024/CVE-2024-208xx/CVE-2024-20837.json) (`2024-03-05T05:15:11.150`)
|
||||
* [CVE-2024-20838](CVE-2024/CVE-2024-208xx/CVE-2024-20838.json) (`2024-03-05T05:15:11.517`)
|
||||
* [CVE-2024-20839](CVE-2024/CVE-2024-208xx/CVE-2024-20839.json) (`2024-03-05T05:15:12.007`)
|
||||
* [CVE-2024-20840](CVE-2024/CVE-2024-208xx/CVE-2024-20840.json) (`2024-03-05T05:15:12.363`)
|
||||
* [CVE-2024-20841](CVE-2024/CVE-2024-208xx/CVE-2024-20841.json) (`2024-03-05T05:15:12.717`)
|
||||
* [CVE-2024-20833](CVE-2024/CVE-2024-208xx/CVE-2024-20833.json) (`2024-03-05T08:15:39.260`)
|
||||
* [CVE-2024-26333](CVE-2024/CVE-2024-263xx/CVE-2024-26333.json) (`2024-03-05T08:15:39.500`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
* [CVE-2024-1062](CVE-2024/CVE-2024-10xx/CVE-2024-1062.json) (`2024-03-05T06:15:53.000`)
|
||||
* [CVE-2023-30733](CVE-2023/CVE-2023-307xx/CVE-2023-30733.json) (`2024-03-05T08:15:38.820`)
|
||||
* [CVE-2023-42531](CVE-2023/CVE-2023-425xx/CVE-2023-42531.json) (`2024-03-05T08:15:39.120`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user