Skip to content

Commit

Permalink
Auto-Update: 2024-12-16T17:00:55.175005+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Dec 16, 2024
1 parent 648516c commit 67d727b
Show file tree
Hide file tree
Showing 178 changed files with 10,527 additions and 226 deletions.
52 changes: 26 additions & 26 deletions CVE-2023/CVE-2023-514xx/CVE-2023-51440.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-51440",
"sourceIdentifier": "[email protected]",
"published": "2024-02-13T09:15:46.830",
"lastModified": "2024-11-21T08:38:07.353",
"vulnStatus": "Modified",
"lastModified": "2024-12-16T15:17:29.160",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
Expand Down Expand Up @@ -90,9 +90,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:cp_343-1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BCBBA47B-610F-4226-83DB-D9D246D12274"
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:simatic_cp_343-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C100D7C1-EAD2-455D-8A72-5BBBD85F2F77"
}
]
},
Expand All @@ -101,9 +101,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:cp_343-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7750ADFE-975A-4996-97AF-564E92DBC2E1"
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:simatic_cp_343-1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "611E1F0F-D55F-4F40-87A0-4783876182B0"
}
]
}
Expand All @@ -117,9 +117,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:cp_343-1_lean_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DFF3729-82F1-42AD-AE58-D0E5216E7148"
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:simatic_cp_343-1_lean:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE2A18E2-F88F-4DC1-81E9-AC836C85A248"
}
]
},
Expand All @@ -128,9 +128,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:cp_343-1_lean:-:*:*:*:*:*:*:*",
"matchCriteriaId": "482D477B-0087-4531-9B69-0B3E13BE608C"
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:simatic_cp_343-1_lean_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "065874F0-45A3-45D8-8EAC-657B04567570"
}
]
}
Expand All @@ -144,9 +144,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:siplus_net_cp_343-1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5941347-0E16-41D1-BC6C-4FC62916F20F"
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:siplus_net_cp_343-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C04E90BF-FA49-40B2-AEA2-A64A6E5A8B77"
}
]
},
Expand All @@ -155,9 +155,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:siplus_net_cp_343-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C04E90BF-FA49-40B2-AEA2-A64A6E5A8B77"
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:siplus_net_cp_343-1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5941347-0E16-41D1-BC6C-4FC62916F20F"
}
]
}
Expand All @@ -171,9 +171,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:siplus_net_cp_343-1_lean_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98B87B82-1949-498F-A922-8DF26B9F6414"
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:siplus_net_cp_343-1_lean:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31A4A9A6-25FF-4FEF-8081-E827CCC87FAF"
}
]
},
Expand All @@ -182,9 +182,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:siplus_net_cp_343-1_lean:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31A4A9A6-25FF-4FEF-8081-E827CCC87FAF"
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:siplus_net_cp_343-1_lean_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98B87B82-1949-498F-A922-8DF26B9F6414"
}
]
}
Expand Down
92 changes: 86 additions & 6 deletions CVE-2024/CVE-2024-00xx/CVE-2024-0034.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2024-0034",
"sourceIdentifier": "[email protected]",
"published": "2024-02-16T02:15:50.933",
"lastModified": "2024-11-21T08:45:45.523",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-16T16:07:35.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
Expand All @@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
Expand All @@ -39,22 +59,82 @@
}
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
}
]
}
]
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/653f7b0d234693309dc86161af01831b64033fe6",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/653f7b0d234693309dc86161af01831b64033fe6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}
95 changes: 89 additions & 6 deletions CVE-2024/CVE-2024-00xx/CVE-2024-0035.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2024-0035",
"sourceIdentifier": "[email protected]",
"published": "2024-02-16T02:15:50.980",
"lastModified": "2024-11-21T08:45:45.710",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-16T15:59:54.053",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
Expand All @@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
Expand All @@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
Expand All @@ -51,22 +81,75 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
}
]
}
]
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/7b7fff1eb5014d12200a32ff9047da396c7ab6a4",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/7b7fff1eb5014d12200a32ff9047da396c7ab6a4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2024-02-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}
Loading

0 comments on commit 67d727b

Please sign in to comment.