Auto-Update: 2024-03-05T09:08:16.097596+00:00

This commit is contained in:
cad-safe-bot 2024-03-05 09:08:19 +00:00
parent c0b74d04e6
commit dc5b02b201
5 changed files with 78 additions and 26 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-30733",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2023-10-04T04:15:13.030",
"lastModified": "2023-11-07T04:14:03.443",
"lastModified": "2024-03-05T08:15:38.820",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Stack-based Buffer Overflow in vulnerability HDCP trustlet prior to SMR Oct-2023 Release 1 allows attacker to perform code execution."
"value": "Stack-based Buffer Overflow in vulnerability HDCP trustlet prior to SMR Oct-2023 Release 1 allows local privileged attackers to perform code execution."
},
{
"lang": "es",
@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "3af57064-a867-422c-b2ad-40307b65c458",
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-42531",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2023-11-07T08:15:15.247",
"lastModified": "2023-11-13T18:08:13.177",
"vulnStatus": "Analyzed",
"lastModified": "2024-03-05T08:15:39.120",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Improper access control vulnerability in SmsController prior to SMR Nov-2023 Release1 allows attacker to bypass restrictions on starting activities from the background."
"value": "Improper access control vulnerability in SmsController prior to SMR Nov-2023 Release1 allows local attackers to bypass restrictions on starting activities from the background."
},
{
"lang": "es",

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20833",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-03-05T08:15:39.260",
"lastModified": "2024-03-05T08:15:39.260",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Use after free vulnerability in pub_crypto_recv_msg prior to SMR Mar-2024 Release 1 due to race condition allows local attackers with system privilege to cause memory corruption."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=03",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-26333",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T08:15:39.500",
"lastModified": "2024-03-05T08:15:39.500",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "swftools v0.9.2 was discovered to contain a segmentation violation via the function free_lines at swftools/lib/modules/swfshape.c."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/matthiaskramm/swftools/issues/219",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-05T07:00:25.248602+00:00
2024-03-05T09:08:16.097596+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-05T06:15:53+00:00
2024-03-05T08:15:39.500000+00:00
```
### Last Data Feed Release
@ -29,34 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
240538
240540
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `2`
* [CVE-2023-52432](CVE-2023/CVE-2023-524xx/CVE-2023-52432.json) (`2024-03-05T05:15:08.070`)
* [CVE-2023-42419](CVE-2023/CVE-2023-424xx/CVE-2023-42419.json) (`2024-03-05T06:15:52.820`)
* [CVE-2024-20829](CVE-2024/CVE-2024-208xx/CVE-2024-20829.json) (`2024-03-05T05:15:08.703`)
* [CVE-2024-20830](CVE-2024/CVE-2024-208xx/CVE-2024-20830.json) (`2024-03-05T05:15:09.093`)
* [CVE-2024-20831](CVE-2024/CVE-2024-208xx/CVE-2024-20831.json) (`2024-03-05T05:15:09.403`)
* [CVE-2024-20832](CVE-2024/CVE-2024-208xx/CVE-2024-20832.json) (`2024-03-05T05:15:09.793`)
* [CVE-2024-20834](CVE-2024/CVE-2024-208xx/CVE-2024-20834.json) (`2024-03-05T05:15:10.207`)
* [CVE-2024-20835](CVE-2024/CVE-2024-208xx/CVE-2024-20835.json) (`2024-03-05T05:15:10.473`)
* [CVE-2024-20836](CVE-2024/CVE-2024-208xx/CVE-2024-20836.json) (`2024-03-05T05:15:10.813`)
* [CVE-2024-20837](CVE-2024/CVE-2024-208xx/CVE-2024-20837.json) (`2024-03-05T05:15:11.150`)
* [CVE-2024-20838](CVE-2024/CVE-2024-208xx/CVE-2024-20838.json) (`2024-03-05T05:15:11.517`)
* [CVE-2024-20839](CVE-2024/CVE-2024-208xx/CVE-2024-20839.json) (`2024-03-05T05:15:12.007`)
* [CVE-2024-20840](CVE-2024/CVE-2024-208xx/CVE-2024-20840.json) (`2024-03-05T05:15:12.363`)
* [CVE-2024-20841](CVE-2024/CVE-2024-208xx/CVE-2024-20841.json) (`2024-03-05T05:15:12.717`)
* [CVE-2024-20833](CVE-2024/CVE-2024-208xx/CVE-2024-20833.json) (`2024-03-05T08:15:39.260`)
* [CVE-2024-26333](CVE-2024/CVE-2024-263xx/CVE-2024-26333.json) (`2024-03-05T08:15:39.500`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `2`
* [CVE-2024-1062](CVE-2024/CVE-2024-10xx/CVE-2024-1062.json) (`2024-03-05T06:15:53.000`)
* [CVE-2023-30733](CVE-2023/CVE-2023-307xx/CVE-2023-30733.json) (`2024-03-05T08:15:38.820`)
* [CVE-2023-42531](CVE-2023/CVE-2023-425xx/CVE-2023-42531.json) (`2024-03-05T08:15:39.120`)
## Download and Usage