"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-12-15 22:00:33 +00:00
parent 1528856671
commit 24f47e139b
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
7 changed files with 196 additions and 9 deletions

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "An attacker with physical access to the Kantech Gen1 ioSmart card reader with firmware version prior to 1.7.2 in certain circumstances can recover the reader's communication memory between the card and reader.\n\n"
"value": "An attacker with physical access to the Kantech Gen1 ioSmart card reader with firmware version prior to 1.07.02 in certain circumstances can recover the reader's communication memory between the card and reader.\n\n"
}
]
},
@ -51,7 +51,7 @@
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.7.2"
"version_value": "1.07.02"
}
]
}
@ -89,10 +89,10 @@
{
"base64": false,
"type": "text/html",
"value": "Update ioSmart Gen1 card reader to firmware version 1.7.2 or higher.<br>Download the update here:&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://www.kantech.com/Resources/GetDoc.aspx?p=1&amp;id=58679\">https://www.kantech.com/Resources/GetDoc.aspx?p=1&amp;id=58679</a><br>Contact technical support for additional information.<br><br>ioSmart Gen2 readers are not affected by this behavior.<br>Contact your local sales representative for ordering information.<br>"
"value": "Update ioSmart Gen1 card reader to firmware version 1.07.02 or higher.<br>Download the update here:&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://www.kantech.com/Resources/GetDoc.aspx?p=1&amp;id=58679\">https://www.kantech.com/Resources/GetDoc.aspx?p=1&amp;id=58679</a><br>Contact technical support for additional information.<br><br>ioSmart Gen2 readers are not affected by this behavior.<br>Contact your local sales representative for ordering information.<br>"
}
],
"value": "Update ioSmart Gen1 card reader to firmware version 1.7.2 or higher.\nDownload the update here:\u00a0 https://www.kantech.com/Resources/GetDoc.aspx?p=1&id=58679 https://www.kantech.com/Resources/GetDoc.aspx \nContact technical support for additional information.\n\nioSmart Gen2 readers are not affected by this behavior.\nContact your local sales representative for ordering information.\n"
"value": "Update ioSmart Gen1 card reader to firmware version 1.07.02 or higher.\nDownload the update here:\u00a0 https://www.kantech.com/Resources/GetDoc.aspx?p=1&id=58679 https://www.kantech.com/Resources/GetDoc.aspx \nContact technical support for additional information.\n\nioSmart Gen2 readers are not affected by this behavior.\nContact your local sales representative for ordering information.\n"
}
],
"credits": [

View File

@ -77,7 +77,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3803"
"version_value": "10.0.19044.3803"
}
]
}

View File

@ -1,17 +1,132 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-50728",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security-advisories@github.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "octokit/webhooks is a GitHub webhook events toolset for Node.js. Starting in 9.26.0 and prior to 9.26.3, 10.9.2, 11.1.2, and 12.0.4, there is a problem caused by an issue with error handling in the @octokit/webhooks library because the error can be undefined in some cases. The resulting request was found to cause an uncaught exception that ends the nodejs process. The bug is fixed in octokit/webhooks.js 9.26.3, 10.9.2, 11.1.2, and 12.0.4, app.js 14.02, octokit.js 3.1.2, and Protobot 12.3.3."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-755: Improper Handling of Exceptional Conditions",
"cweId": "CWE-755"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "octokit",
"product": {
"product_data": [
{
"product_name": "webhooks.js",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": ">= 9.26.0, < 9.26.3"
},
{
"version_affected": "=",
"version_value": ">= 10.9.0, < 10.9.2"
},
{
"version_affected": "=",
"version_value": ">= 11.1.0, < 11.1.2"
},
{
"version_affected": "=",
"version_value": ">= 12.0.0, < 12.0.4"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/octokit/webhooks.js/security/advisories/GHSA-pwfr-8pq7-x9qv",
"refsource": "MISC",
"name": "https://github.com/octokit/webhooks.js/security/advisories/GHSA-pwfr-8pq7-x9qv"
},
{
"url": "https://github.com/octokit/app.js/releases/tag/v14.0.2",
"refsource": "MISC",
"name": "https://github.com/octokit/app.js/releases/tag/v14.0.2"
},
{
"url": "https://github.com/octokit/octokit.js/releases/tag/v3.1.2",
"refsource": "MISC",
"name": "https://github.com/octokit/octokit.js/releases/tag/v3.1.2"
},
{
"url": "https://github.com/octokit/webhooks.js/releases/tag/v10.9.2",
"refsource": "MISC",
"name": "https://github.com/octokit/webhooks.js/releases/tag/v10.9.2"
},
{
"url": "https://github.com/octokit/webhooks.js/releases/tag/v11.1.2",
"refsource": "MISC",
"name": "https://github.com/octokit/webhooks.js/releases/tag/v11.1.2"
},
{
"url": "https://github.com/octokit/webhooks.js/releases/tag/v12.0.4",
"refsource": "MISC",
"name": "https://github.com/octokit/webhooks.js/releases/tag/v12.0.4"
},
{
"url": "https://github.com/octokit/webhooks.js/releases/tag/v9.26.3",
"refsource": "MISC",
"name": "https://github.com/octokit/webhooks.js/releases/tag/v9.26.3"
},
{
"url": "https://github.com/probot/probot/releases/tag/v12.3.3",
"refsource": "MISC",
"name": "https://github.com/probot/probot/releases/tag/v12.3.3"
}
]
},
"source": {
"advisory": "GHSA-pwfr-8pq7-x9qv",
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-50929",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6878",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6879",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6880",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}