Skip to content

Commit

Permalink
Auto-Update: 2024-12-12T03:00:47.263002+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Dec 12, 2024
1 parent d19a623 commit 9bbd097
Show file tree
Hide file tree
Showing 265 changed files with 14,477 additions and 310 deletions.
6 changes: 5 additions & 1 deletion CVE-2023/CVE-2023-234xx/CVE-2023-23456.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-23456",
"sourceIdentifier": "[email protected]",
"published": "2023-01-12T19:15:24.693",
"lastModified": "2024-11-21T07:46:14.223",
"lastModified": "2024-12-12T01:15:48.337",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -176,6 +176,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00013.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EL3BVKIGG3SH6I3KPOYQAWCBD4UMPOPI/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
Expand Down
26 changes: 25 additions & 1 deletion CVE-2023/CVE-2023-23xx/CVE-2023-2399.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-2399",
"sourceIdentifier": "[email protected]",
"published": "2023-06-19T11:15:10.100",
"lastModified": "2024-11-21T07:58:32.500",
"lastModified": "2024-12-12T01:20:24.127",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
Expand Down Expand Up @@ -69,6 +89,10 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/deca3cd3-f7cf-469f-9f7e-3612f7ae514d/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}
26 changes: 25 additions & 1 deletion CVE-2023/CVE-2023-25xx/CVE-2023-2527.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-2527",
"sourceIdentifier": "[email protected]",
"published": "2023-06-19T11:15:10.270",
"lastModified": "2024-11-21T07:58:46.827",
"lastModified": "2024-12-12T01:20:30.213",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
Expand Down Expand Up @@ -81,6 +101,10 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/8051142a-4e55-4dc2-9cb1-1b724c67574f/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}
22 changes: 21 additions & 1 deletion CVE-2023/CVE-2023-26xx/CVE-2023-2654.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-2654",
"sourceIdentifier": "[email protected]",
"published": "2023-06-19T11:15:10.380",
"lastModified": "2024-11-21T07:59:00.813",
"lastModified": "2024-12-12T01:20:35.933",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
Expand Down
22 changes: 21 additions & 1 deletion CVE-2023/CVE-2023-27xx/CVE-2023-2751.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-2751",
"sourceIdentifier": "[email protected]",
"published": "2023-06-19T11:15:10.600",
"lastModified": "2024-11-21T07:59:13.363",
"lastModified": "2024-12-12T01:20:40.913",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
Expand Down
16 changes: 8 additions & 8 deletions CVE-2023/CVE-2023-293xx/CVE-2023-29348.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-29348",
"sourceIdentifier": "[email protected]",
"published": "2023-10-10T18:15:11.830",
"lastModified": "2024-11-21T07:56:54.360",
"lastModified": "2024-12-12T01:19:43.200",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand All @@ -19,27 +19,27 @@
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Secondary",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "[email protected]",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-313xx/CVE-2023-31348.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,13 @@
"id": "CVE-2023-31348",
"sourceIdentifier": "[email protected]",
"published": "2024-08-13T17:15:21.307",
"lastModified": "2024-12-03T18:46:38.467",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-12T01:21:40.110",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DLL hijacking vulnerability in AMD ?Prof could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution."
"value": "A DLL hijacking vulnerability in AMD \u03bcProf could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution."
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-313xx/CVE-2023-31349.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,13 @@
"id": "CVE-2023-31349",
"sourceIdentifier": "[email protected]",
"published": "2024-08-13T17:15:21.500",
"lastModified": "2024-12-03T18:37:37.340",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-12T01:21:40.263",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect default permissions in the AMD ?Prof installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution."
"value": "Incorrect default permissions in the AMD \u03bcProf installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution."
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-313xx/CVE-2023-31366.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,13 @@
"id": "CVE-2023-31366",
"sourceIdentifier": "[email protected]",
"published": "2024-08-13T17:15:21.913",
"lastModified": "2024-12-03T18:30:25.240",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-12T01:21:40.487",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in AMD ?Prof could allow an attacker to perform a write to an invalid address, potentially resulting in denial of service."
"value": "Improper input validation in AMD \u03bcProf could allow an attacker to perform a write to an invalid address, potentially resulting in denial of service."
},
{
"lang": "es",
Expand Down
32 changes: 31 additions & 1 deletion CVE-2023/CVE-2023-341xx/CVE-2023-34158.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-34158",
"sourceIdentifier": "[email protected]",
"published": "2023-06-19T17:15:12.090",
"lastModified": "2024-11-21T08:06:40.440",
"lastModified": "2024-12-12T01:23:28.070",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
Expand All @@ -45,6 +65,16 @@
"value": "CWE-290"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"configurations": [
Expand Down
22 changes: 21 additions & 1 deletion CVE-2023/CVE-2023-341xx/CVE-2023-34159.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-34159",
"sourceIdentifier": "[email protected]",
"published": "2023-06-19T17:15:12.130",
"lastModified": "2024-11-21T08:06:40.560",
"lastModified": "2024-12-12T01:23:28.263",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
Expand Down
Loading

0 comments on commit 9bbd097

Please sign in to comment.