Auto-Update: 2024-02-05T11:00:24.474863+00:00

This commit is contained in:
cad-safe-bot 2024-02-05 11:00:28 +00:00
parent 01a9140806
commit de055df019
4 changed files with 92 additions and 28 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-4436",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-02-05T09:15:43.013",
"lastModified": "2024-02-05T09:15:43.013",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The 3DPrint Lite WordPress plugin before 1.9.1.5 does not have any authorisation and does not check the uploaded file in its p3dlite_handle_upload AJAX action , allowing unauthenticated users to upload arbitrary file to the web server. However, there is a .htaccess, preventing the file to be accessed on Web servers such as Apache."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/c46ecd0d-a132-4ad6-b936-8acde3a09282/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-5249",
"sourceIdentifier": "arm-security@arm.com",
"published": "2024-02-05T10:15:08.310",
"lastModified": "2024-02-05T10:15:08.310",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver allows a local non-privileged user to make improper memory processing operations to exploit a software race condition. If the system\u2019s memory is carefully prepared by the user, then this in turn cause a use-after-free.This issue affects Bifrost GPU Kernel Driver: from r35p0 through r40p0; Valhall GPU Kernel Driver: from r35p0 through r40p0.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "arm-security@arm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
"source": "arm-security@arm.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-5643",
"sourceIdentifier": "arm-security@arm.com",
"published": "2024-02-05T10:15:08.410",
"lastModified": "2024-02-05T10:15:08.410",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds Write vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a\u00a0local non-privileged user to make improper GPU memory processing operations. Depending on the configuration of the Mali GPU Kernel Driver, and if the system\u2019s memory is carefully prepared by the user, then this in turn could write to memory outside of buffer bounds.This issue affects Bifrost GPU Kernel Driver: from r41p0 through r45p0; Valhall GPU Kernel Driver: from r41p0 through r45p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r45p0.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "arm-security@arm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
"source": "arm-security@arm.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-05T09:00:24.815968+00:00
2024-02-05T11:00:24.474863+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-05T08:15:45.433000+00:00
2024-02-05T10:15:08.410000+00:00
```
### Last Data Feed Release
@ -29,42 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
237558
237561
```
### CVEs added in the last Commit
Recently added CVEs: `18`
Recently added CVEs: `3`
* [CVE-2023-7077](CVE-2023/CVE-2023-70xx/CVE-2023-7077.json) (`2024-02-05T07:15:09.690`)
* [CVE-2024-24838](CVE-2024/CVE-2024-248xx/CVE-2024-24838.json) (`2024-02-05T07:15:10.237`)
* [CVE-2024-24839](CVE-2024/CVE-2024-248xx/CVE-2024-24839.json) (`2024-02-05T07:15:10.850`)
* [CVE-2024-24841](CVE-2024/CVE-2024-248xx/CVE-2024-24841.json) (`2024-02-05T07:15:11.437`)
* [CVE-2024-24846](CVE-2024/CVE-2024-248xx/CVE-2024-24846.json) (`2024-02-05T07:15:12.257`)
* [CVE-2024-24847](CVE-2024/CVE-2024-248xx/CVE-2024-24847.json) (`2024-02-05T07:15:13.387`)
* [CVE-2024-24848](CVE-2024/CVE-2024-248xx/CVE-2024-24848.json) (`2024-02-05T07:15:13.970`)
* [CVE-2024-24865](CVE-2024/CVE-2024-248xx/CVE-2024-24865.json) (`2024-02-05T07:15:14.510`)
* [CVE-2024-22386](CVE-2024/CVE-2024-223xx/CVE-2024-22386.json) (`2024-02-05T08:15:43.830`)
* [CVE-2024-22667](CVE-2024/CVE-2024-226xx/CVE-2024-22667.json) (`2024-02-05T08:15:44.110`)
* [CVE-2024-23196](CVE-2024/CVE-2024-231xx/CVE-2024-23196.json) (`2024-02-05T08:15:44.167`)
* [CVE-2024-24855](CVE-2024/CVE-2024-248xx/CVE-2024-24855.json) (`2024-02-05T08:15:44.353`)
* [CVE-2024-24857](CVE-2024/CVE-2024-248xx/CVE-2024-24857.json) (`2024-02-05T08:15:44.533`)
* [CVE-2024-24858](CVE-2024/CVE-2024-248xx/CVE-2024-24858.json) (`2024-02-05T08:15:44.713`)
* [CVE-2024-24859](CVE-2024/CVE-2024-248xx/CVE-2024-24859.json) (`2024-02-05T08:15:44.897`)
* [CVE-2024-24860](CVE-2024/CVE-2024-248xx/CVE-2024-24860.json) (`2024-02-05T08:15:45.077`)
* [CVE-2024-24861](CVE-2024/CVE-2024-248xx/CVE-2024-24861.json) (`2024-02-05T08:15:45.253`)
* [CVE-2024-24864](CVE-2024/CVE-2024-248xx/CVE-2024-24864.json) (`2024-02-05T08:15:45.433`)
* [CVE-2021-4436](CVE-2021/CVE-2021-44xx/CVE-2021-4436.json) (`2024-02-05T09:15:43.013`)
* [CVE-2023-5249](CVE-2023/CVE-2023-52xx/CVE-2023-5249.json) (`2024-02-05T10:15:08.310`)
* [CVE-2023-5643](CVE-2023/CVE-2023-56xx/CVE-2023-5643.json) (`2024-02-05T10:15:08.410`)
### CVEs modified in the last Commit
Recently modified CVEs: `5`
Recently modified CVEs: `0`
* [CVE-2023-27043](CVE-2023/CVE-2023-270xx/CVE-2023-27043.json) (`2024-02-05T07:15:07.720`)
* [CVE-2023-47038](CVE-2023/CVE-2023-470xx/CVE-2023-47038.json) (`2024-02-05T07:15:08.413`)
* [CVE-2023-47627](CVE-2023/CVE-2023-476xx/CVE-2023-47627.json) (`2024-02-05T07:15:08.850`)
* [CVE-2023-6111](CVE-2023/CVE-2023-61xx/CVE-2023-6111.json) (`2024-02-05T07:15:09.190`)
* [CVE-2023-24676](CVE-2023/CVE-2023-246xx/CVE-2023-24676.json) (`2024-02-05T08:15:43.367`)
## Download and Usage