Skip to content

Commit

Permalink
4 changes (1 new | 3 updated):
Browse files Browse the repository at this point in the history
      - 1 new CVEs:  CVE-2024-21924
      - 3 updated CVEs: CVE-2022-43293, CVE-2023-1013, CVE-2023-1712
  • Loading branch information
cvelistV5 Github Action committed Feb 11, 2025
1 parent 3bec0a5 commit 45e27df
Show file tree
Hide file tree
Showing 4 changed files with 296 additions and 9 deletions.
68 changes: 64 additions & 4 deletions cves/2022/43xxx/CVE-2022-43293.json
Original file line number Diff line number Diff line change
Expand Up @@ -6,16 +6,16 @@
"cveId": "CVE-2022-43293",
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"dateUpdated": "2024-08-03T13:26:02.903Z",
"dateReserved": "2022-10-17T00:00:00",
"datePublished": "2023-04-11T00:00:00"
"dateUpdated": "2025-02-11T20:20:01.243Z",
"dateReserved": "2022-10-17T00:00:00.000Z",
"datePublished": "2023-04-11T00:00:00.000Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2023-09-01T20:31:32.451772"
"dateUpdated": "2023-09-01T20:31:32.451Z"
},
"descriptions": [
{
Expand Down Expand Up @@ -95,6 +95,66 @@
]
}
]
},
{
"problemTypes": [
{
"descriptions": [
{
"type": "CWE",
"cweId": "CWE-59",
"lang": "en",
"description": "CWE-59 Improper Link Resolution Before File Access ('Link Following')"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"scope": "UNCHANGED",
"version": "3.1",
"baseScore": 5.9,
"attackVector": "PHYSICAL",
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"integrityImpact": "HIGH",
"userInteraction": "REQUIRED",
"attackComplexity": "LOW",
"availabilityImpact": "HIGH",
"privilegesRequired": "NONE",
"confidentialityImpact": "NONE"
}
},
{
"other": {
"type": "ssvc",
"content": {
"timestamp": "2025-02-11T20:18:55.857428Z",
"id": "CVE-2022-43293",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"version": "2.0.3"
}
}
}
],
"title": "CISA ADP Vulnrichment",
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-02-11T20:20:01.243Z"
}
}
]
}
Expand Down
34 changes: 33 additions & 1 deletion cves/2023/1xxx/CVE-2023-1013.json
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
"assignerShortName": "TR-CERT",
"dateReserved": "2023-02-24T13:53:12.593Z",
"datePublished": "2023-03-30T08:14:06.747Z",
"dateUpdated": "2024-08-02T05:32:46.301Z"
"dateUpdated": "2025-02-11T20:14:00.647Z"
},
"containers": {
"cna": {
Expand Down Expand Up @@ -139,6 +139,38 @@
"url": "https://www.usom.gov.tr/bildirim/tr-23-0183"
}
]
},
{
"metrics": [
{
"other": {
"type": "ssvc",
"content": {
"timestamp": "2025-02-11T20:13:56.354181Z",
"id": "CVE-2023-1013",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"version": "2.0.3"
}
}
}
],
"title": "CISA ADP Vulnrichment",
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-02-11T20:14:00.647Z"
}
}
]
}
Expand Down
40 changes: 36 additions & 4 deletions cves/2023/1xxx/CVE-2023-1712.json
Original file line number Diff line number Diff line change
Expand Up @@ -6,17 +6,17 @@
"cveId": "CVE-2023-1712",
"assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"assignerShortName": "@huntrdev",
"dateUpdated": "2024-08-02T05:57:24.785Z",
"dateReserved": "2023-03-30T00:00:00",
"datePublished": "2023-03-30T00:00:00"
"dateUpdated": "2025-02-11T20:14:55.996Z",
"dateReserved": "2023-03-30T00:00:00.000Z",
"datePublished": "2023-03-30T00:00:00.000Z"
},
"containers": {
"cna": {
"title": "Use of Hard-coded, Security-relevant Constants in deepset-ai/haystack",
"providerMetadata": {
"orgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"shortName": "@huntrdev",
"dateUpdated": "2023-03-30T00:00:00"
"dateUpdated": "2023-03-30T00:00:00.000Z"
},
"descriptions": [
{
Expand Down Expand Up @@ -103,6 +103,38 @@
]
}
]
},
{
"metrics": [
{
"other": {
"type": "ssvc",
"content": {
"timestamp": "2025-02-11T20:14:34.246401Z",
"id": "CVE-2023-1712",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"version": "2.0.3"
}
}
}
],
"title": "CISA ADP Vulnrichment",
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-02-11T20:14:55.996Z"
}
}
]
}
Expand Down
163 changes: 163 additions & 0 deletions cves/2024/21xxx/CVE-2024-21924.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,163 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-21924",
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"state": "PUBLISHED",
"assignerShortName": "AMD",
"dateReserved": "2024-01-03T16:43:09.232Z",
"datePublished": "2025-02-11T20:18:50.402Z",
"dateUpdated": "2025-02-11T20:18:50.402Z"
},
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "AMD EPYC™ 7002 Processors",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "Rome PI 1.0.0.K"
}
]
},
{
"defaultStatus": "unknown",
"product": "AMD Ryzen™ Threadripper™ PRO 3000WX Series Processors",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "ChagallWSPI-sWRX8 1.0.0.9"
}
]
},
{
"defaultStatus": "unknown",
"product": "AMD Ryzen™ Threadripper™ PRO 3000WX Series Processors",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "CastlePeakWSPI-sWRX8 1.0.0.E"
}
]
},
{
"defaultStatus": "unknown",
"product": "AMD Ryzen™ Threadripper™ PRO 5000WX- Series Desktop Processors",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "ChagallWSPI-sWRX8 1.0.0.9"
}
]
},
{
"defaultStatus": "unknown",
"product": "AMD Ryzen™ Threadripper™ PRO 7000 WX-Series Processors",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "StormPeakPI-SP6 1.1.0.0h"
}
]
},
{
"defaultStatus": "unknown",
"product": "AMD Ryzen™ Threadripper™ PRO 7000 WX-Series Processors",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "StormPeakPI-SP6 1.0.0.1j"
}
]
},
{
"defaultStatus": "unknown",
"product": "AMD EPYC™ Embedded 7002 Processors",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "EmbRomePI-SP3 1.0.0.D"
}
]
}
],
"datePublic": "2025-02-11T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "SMM callout vulnerability within the AmdPlatformRasSspSmm driver could allow a ring 0 attacker to modify boot services handlers, potentially resulting in arbitrary code execution."
}
],
"value": "SMM callout vulnerability within the AmdPlatformRasSspSmm driver could allow a ring 0 attacker to modify boot services handlers, potentially resulting in arbitrary code execution."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-250",
"description": "CWE-250 Execution with Unnecessary Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD",
"dateUpdated": "2025-02-11T20:18:50.402Z"
},
"references": [
{
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7028.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
}
}

0 comments on commit 45e27df

Please sign in to comment.