Auto-Update: 2024-01-24T07:00:25.165948+00:00

This commit is contained in:
cad-safe-bot 2024-01-24 07:00:28 +00:00
parent b636ffa1d9
commit e4500e065f
18 changed files with 155 additions and 32 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-25613",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-10-06T13:15:13.823",
"lastModified": "2023-11-07T03:20:17.137",
"lastModified": "2024-01-24T05:15:08.827",
"vulnStatus": "Modified",
"descriptions": [
{
@ -162,6 +162,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTZURYROG3FFED3TYCQOBV66BS4K6WOV/",
"source": "cve@mitre.org"
},
{
"url": "https://security.gentoo.org/glsa/202401-27",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20210115-0008/",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-31810",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-07-13T13:15:09.243",
"lastModified": "2023-11-07T03:35:00.337",
"lastModified": "2024-01-24T05:15:09.683",
"vulnStatus": "Modified",
"descriptions": [
{
@ -176,6 +176,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/",
"source": "cve@mitre.org"
},
{
"url": "https://security.gentoo.org/glsa/202401-27",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20210917-0001/",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-32066",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-08-01T19:15:07.697",
"lastModified": "2023-04-30T23:15:45.157",
"lastModified": "2024-01-24T05:15:10.040",
"vulnStatus": "Modified",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-326"
"value": "CWE-755"
}
]
}
@ -153,6 +153,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html",
"source": "cve@mitre.org"
},
{
"url": "https://security.gentoo.org/glsa/202401-27",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20210902-0004/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-33479",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2021-11-17T18:15:07.900",
"lastModified": "2022-12-21T15:01:19.963",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-24T05:15:10.363",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -112,6 +112,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-28",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://sourceforge.net/p/jocr/bugs/39/",
"source": "patrick@puiterwijk.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-33480",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2021-11-17T18:15:07.960",
"lastModified": "2022-12-21T15:01:19.963",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-24T05:15:10.610",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -112,6 +112,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-28",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://sourceforge.net/p/jocr/bugs/40/",
"source": "patrick@puiterwijk.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-33481",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2021-11-17T18:15:08.017",
"lastModified": "2022-12-21T15:01:19.963",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-24T05:15:10.700",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -113,6 +113,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-28",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://sourceforge.net/p/jocr/bugs/42/",
"source": "patrick@puiterwijk.org",

View File

@ -2,12 +2,16 @@
"id": "CVE-2021-33621",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-18T23:15:18.987",
"lastModified": "2023-11-07T03:35:53.323",
"lastModified": "2024-01-24T05:15:10.787",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object."
},
{
"lang": "es",
"value": "La gema cgi anterior a 0.1.0.2, 0.2.x anterior a 0.2.2 y 0.3.x anterior a 0.3.5 para Ruby permite la divisi\u00f3n de respuestas HTTP. Esto es relevante para aplicaciones que utilizan entradas de usuarios que no son de confianza, ya sea para generar una respuesta HTTP o para crear un objeto CGI::Cookie."
}
],
"metrics": {
@ -151,6 +155,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YACE6ORF2QBXXBK2V2CM36D7TZMEJVAS/",
"source": "cve@mitre.org"
},
{
"url": "https://security.gentoo.org/glsa/202401-27",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20221228-0004/",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-41816",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-02-06T21:15:07.887",
"lastModified": "2023-11-07T03:39:01.280",
"lastModified": "2024-01-24T05:15:11.280",
"vulnStatus": "Modified",
"descriptions": [
{
@ -197,6 +197,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-27",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20220303-0006/",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-41817",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-01T05:15:08.197",
"lastModified": "2023-11-07T03:39:01.370",
"lastModified": "2024-01-24T05:15:11.520",
"vulnStatus": "Modified",
"descriptions": [
{
@ -259,6 +259,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/",
"source": "cve@mitre.org"
},
{
"url": "https://security.gentoo.org/glsa/202401-27",
"source": "cve@mitre.org"
},
{
"url": "https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-41819",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-01T06:15:07.293",
"lastModified": "2023-11-07T03:39:01.443",
"lastModified": "2024-01-24T05:15:11.853",
"vulnStatus": "Modified",
"descriptions": [
{
@ -249,6 +249,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/",
"source": "cve@mitre.org"
},
{
"url": "https://security.gentoo.org/glsa/202401-27",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20220121-0003/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28738",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-09T18:15:08.490",
"lastModified": "2022-11-29T17:18:23.413",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-24T05:15:12.147",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -118,6 +118,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-27",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20220624-0002/",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-28739",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-09T18:15:08.540",
"lastModified": "2023-06-09T13:15:09.503",
"lastModified": "2024-01-24T05:15:12.390",
"vulnStatus": "Modified",
"descriptions": [
{
@ -207,6 +207,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-27",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20220624-0002/",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28755",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-31T04:15:09.037",
"lastModified": "2023-11-07T04:10:50.830",
"lastModified": "2024-01-24T05:15:12.900",
"vulnStatus": "Modified",
"descriptions": [
{
@ -137,6 +137,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMIOPLBAAM3FEQNAXA2L7BDKOGSVUT5Z/",
"source": "cve@mitre.org"
},
{
"url": "https://security.gentoo.org/glsa/202401-27",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230526-0003/",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28756",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-31T04:15:09.090",
"lastModified": "2023-11-07T04:10:51.830",
"lastModified": "2024-01-24T05:15:13.297",
"vulnStatus": "Modified",
"descriptions": [
{
@ -132,6 +132,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMIOPLBAAM3FEQNAXA2L7BDKOGSVUT5Z/",
"source": "cve@mitre.org"
},
{
"url": "https://security.gentoo.org/glsa/202401-27",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230526-0004/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42465",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-22T16:15:08.057",
"lastModified": "2024-01-03T17:40:23.540",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-24T05:15:13.660",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -91,6 +91,10 @@
"Release Notes"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-29",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2023/12/21/9",
"source": "cve@mitre.org",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-22366",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-01-24T05:15:13.823",
"lastModified": "2024-01-24T05:15:13.823",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier."
}
],
"metrics": {},
"references": [
{
"url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU99896362/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-22372",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-01-24T05:15:14.137",
"lastModified": "2024-01-24T05:15:14.137",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Affected products and versions are as follows: WRC-X1800GS-B v1.17 and earlier, WRC-X1800GSA-B v1.17 and earlier, WRC-X1800GSH-B v1.17 and earlier, WRC-X6000XS-G v1.09, and WRC-X6000XST-G v1.12 and earlier."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU90908488/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.elecom.co.jp/news/security/20240123-01/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-01-24T05:00:25.051511+00:00
2024-01-24T07:00:25.165948+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-01-24T03:15:08.553000+00:00
2024-01-24T05:15:14.137000+00:00
```
### Last Data Feed Release
@ -29,25 +29,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
236699
236701
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `2`
* [CVE-2023-31037](CVE-2023/CVE-2023-310xx/CVE-2023-31037.json) (`2024-01-24T03:15:08.100`)
* [CVE-2024-22366](CVE-2024/CVE-2024-223xx/CVE-2024-22366.json) (`2024-01-24T05:15:13.823`)
* [CVE-2024-22372](CVE-2024/CVE-2024-223xx/CVE-2024-22372.json) (`2024-01-24T05:15:14.137`)
### CVEs modified in the last Commit
Recently modified CVEs: `5`
Recently modified CVEs: `15`
* [CVE-2022-48541](CVE-2022/CVE-2022-485xx/CVE-2022-48541.json) (`2024-01-24T03:15:07.763`)
* [CVE-2023-0437](CVE-2023/CVE-2023-04xx/CVE-2023-0437.json) (`2024-01-24T03:15:07.967`)
* [CVE-2023-51257](CVE-2023/CVE-2023-512xx/CVE-2023-51257.json) (`2024-01-24T03:15:08.353`)
* [CVE-2023-5341](CVE-2023/CVE-2023-53xx/CVE-2023-5341.json) (`2024-01-24T03:15:08.430`)
* [CVE-2023-7008](CVE-2023/CVE-2023-70xx/CVE-2023-7008.json) (`2024-01-24T03:15:08.553`)
* [CVE-2020-25613](CVE-2020/CVE-2020-256xx/CVE-2020-25613.json) (`2024-01-24T05:15:08.827`)
* [CVE-2021-31810](CVE-2021/CVE-2021-318xx/CVE-2021-31810.json) (`2024-01-24T05:15:09.683`)
* [CVE-2021-32066](CVE-2021/CVE-2021-320xx/CVE-2021-32066.json) (`2024-01-24T05:15:10.040`)
* [CVE-2021-33479](CVE-2021/CVE-2021-334xx/CVE-2021-33479.json) (`2024-01-24T05:15:10.363`)
* [CVE-2021-33480](CVE-2021/CVE-2021-334xx/CVE-2021-33480.json) (`2024-01-24T05:15:10.610`)
* [CVE-2021-33481](CVE-2021/CVE-2021-334xx/CVE-2021-33481.json) (`2024-01-24T05:15:10.700`)
* [CVE-2021-33621](CVE-2021/CVE-2021-336xx/CVE-2021-33621.json) (`2024-01-24T05:15:10.787`)
* [CVE-2021-41816](CVE-2021/CVE-2021-418xx/CVE-2021-41816.json) (`2024-01-24T05:15:11.280`)
* [CVE-2021-41817](CVE-2021/CVE-2021-418xx/CVE-2021-41817.json) (`2024-01-24T05:15:11.520`)
* [CVE-2021-41819](CVE-2021/CVE-2021-418xx/CVE-2021-41819.json) (`2024-01-24T05:15:11.853`)
* [CVE-2022-28738](CVE-2022/CVE-2022-287xx/CVE-2022-28738.json) (`2024-01-24T05:15:12.147`)
* [CVE-2022-28739](CVE-2022/CVE-2022-287xx/CVE-2022-28739.json) (`2024-01-24T05:15:12.390`)
* [CVE-2023-28755](CVE-2023/CVE-2023-287xx/CVE-2023-28755.json) (`2024-01-24T05:15:12.900`)
* [CVE-2023-28756](CVE-2023/CVE-2023-287xx/CVE-2023-28756.json) (`2024-01-24T05:15:13.297`)
* [CVE-2023-42465](CVE-2023/CVE-2023-424xx/CVE-2023-42465.json) (`2024-01-24T05:15:13.660`)
## Download and Usage