mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-09 03:57:14 +00:00
Auto-Update: 2024-02-05T11:00:24.474863+00:00
This commit is contained in:
parent
01a9140806
commit
de055df019
20
CVE-2021/CVE-2021-44xx/CVE-2021-4436.json
Normal file
20
CVE-2021/CVE-2021-44xx/CVE-2021-4436.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-4436",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-02-05T09:15:43.013",
|
||||
"lastModified": "2024-02-05T09:15:43.013",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The 3DPrint Lite WordPress plugin before 1.9.1.5 does not have any authorisation and does not check the uploaded file in its p3dlite_handle_upload AJAX action , allowing unauthenticated users to upload arbitrary file to the web server. However, there is a .htaccess, preventing the file to be accessed on Web servers such as Apache."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/c46ecd0d-a132-4ad6-b936-8acde3a09282/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-52xx/CVE-2023-5249.json
Normal file
32
CVE-2023/CVE-2023-52xx/CVE-2023-5249.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-5249",
|
||||
"sourceIdentifier": "arm-security@arm.com",
|
||||
"published": "2024-02-05T10:15:08.310",
|
||||
"lastModified": "2024-02-05T10:15:08.310",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver allows a local non-privileged user to make improper memory processing operations to exploit a software race condition. If the system\u2019s memory is carefully prepared by the user, then this in turn cause a use-after-free.This issue affects Bifrost GPU Kernel Driver: from r35p0 through r40p0; Valhall GPU Kernel Driver: from r35p0 through r40p0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "arm-security@arm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
|
||||
"source": "arm-security@arm.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-56xx/CVE-2023-5643.json
Normal file
32
CVE-2023/CVE-2023-56xx/CVE-2023-5643.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-5643",
|
||||
"sourceIdentifier": "arm-security@arm.com",
|
||||
"published": "2024-02-05T10:15:08.410",
|
||||
"lastModified": "2024-02-05T10:15:08.410",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out-of-bounds Write vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a\u00a0local non-privileged user to make improper GPU memory processing operations. Depending on the configuration of the Mali GPU Kernel Driver, and if the system\u2019s memory is carefully prepared by the user, then this in turn could write to memory outside of buffer bounds.This issue affects Bifrost GPU Kernel Driver: from r41p0 through r45p0; Valhall GPU Kernel Driver: from r41p0 through r45p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r45p0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "arm-security@arm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
|
||||
"source": "arm-security@arm.com"
|
||||
}
|
||||
]
|
||||
}
|
36
README.md
36
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-02-05T09:00:24.815968+00:00
|
||||
2024-02-05T11:00:24.474863+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-02-05T08:15:45.433000+00:00
|
||||
2024-02-05T10:15:08.410000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,42 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
237558
|
||||
237561
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `18`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* [CVE-2023-7077](CVE-2023/CVE-2023-70xx/CVE-2023-7077.json) (`2024-02-05T07:15:09.690`)
|
||||
* [CVE-2024-24838](CVE-2024/CVE-2024-248xx/CVE-2024-24838.json) (`2024-02-05T07:15:10.237`)
|
||||
* [CVE-2024-24839](CVE-2024/CVE-2024-248xx/CVE-2024-24839.json) (`2024-02-05T07:15:10.850`)
|
||||
* [CVE-2024-24841](CVE-2024/CVE-2024-248xx/CVE-2024-24841.json) (`2024-02-05T07:15:11.437`)
|
||||
* [CVE-2024-24846](CVE-2024/CVE-2024-248xx/CVE-2024-24846.json) (`2024-02-05T07:15:12.257`)
|
||||
* [CVE-2024-24847](CVE-2024/CVE-2024-248xx/CVE-2024-24847.json) (`2024-02-05T07:15:13.387`)
|
||||
* [CVE-2024-24848](CVE-2024/CVE-2024-248xx/CVE-2024-24848.json) (`2024-02-05T07:15:13.970`)
|
||||
* [CVE-2024-24865](CVE-2024/CVE-2024-248xx/CVE-2024-24865.json) (`2024-02-05T07:15:14.510`)
|
||||
* [CVE-2024-22386](CVE-2024/CVE-2024-223xx/CVE-2024-22386.json) (`2024-02-05T08:15:43.830`)
|
||||
* [CVE-2024-22667](CVE-2024/CVE-2024-226xx/CVE-2024-22667.json) (`2024-02-05T08:15:44.110`)
|
||||
* [CVE-2024-23196](CVE-2024/CVE-2024-231xx/CVE-2024-23196.json) (`2024-02-05T08:15:44.167`)
|
||||
* [CVE-2024-24855](CVE-2024/CVE-2024-248xx/CVE-2024-24855.json) (`2024-02-05T08:15:44.353`)
|
||||
* [CVE-2024-24857](CVE-2024/CVE-2024-248xx/CVE-2024-24857.json) (`2024-02-05T08:15:44.533`)
|
||||
* [CVE-2024-24858](CVE-2024/CVE-2024-248xx/CVE-2024-24858.json) (`2024-02-05T08:15:44.713`)
|
||||
* [CVE-2024-24859](CVE-2024/CVE-2024-248xx/CVE-2024-24859.json) (`2024-02-05T08:15:44.897`)
|
||||
* [CVE-2024-24860](CVE-2024/CVE-2024-248xx/CVE-2024-24860.json) (`2024-02-05T08:15:45.077`)
|
||||
* [CVE-2024-24861](CVE-2024/CVE-2024-248xx/CVE-2024-24861.json) (`2024-02-05T08:15:45.253`)
|
||||
* [CVE-2024-24864](CVE-2024/CVE-2024-248xx/CVE-2024-24864.json) (`2024-02-05T08:15:45.433`)
|
||||
* [CVE-2021-4436](CVE-2021/CVE-2021-44xx/CVE-2021-4436.json) (`2024-02-05T09:15:43.013`)
|
||||
* [CVE-2023-5249](CVE-2023/CVE-2023-52xx/CVE-2023-5249.json) (`2024-02-05T10:15:08.310`)
|
||||
* [CVE-2023-5643](CVE-2023/CVE-2023-56xx/CVE-2023-5643.json) (`2024-02-05T10:15:08.410`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `5`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2023-27043](CVE-2023/CVE-2023-270xx/CVE-2023-27043.json) (`2024-02-05T07:15:07.720`)
|
||||
* [CVE-2023-47038](CVE-2023/CVE-2023-470xx/CVE-2023-47038.json) (`2024-02-05T07:15:08.413`)
|
||||
* [CVE-2023-47627](CVE-2023/CVE-2023-476xx/CVE-2023-47627.json) (`2024-02-05T07:15:08.850`)
|
||||
* [CVE-2023-6111](CVE-2023/CVE-2023-61xx/CVE-2023-6111.json) (`2024-02-05T07:15:09.190`)
|
||||
* [CVE-2023-24676](CVE-2023/CVE-2023-246xx/CVE-2023-24676.json) (`2024-02-05T08:15:43.367`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user