mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
1528856671
commit
24f47e139b
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An attacker with physical access to the Kantech Gen1 ioSmart card reader with firmware version prior to 1.7.2 in certain circumstances can recover the reader's communication memory between the card and reader.\n\n"
|
||||
"value": "An attacker with physical access to the Kantech Gen1 ioSmart card reader with firmware version prior to 1.07.02 in certain circumstances can recover the reader's communication memory between the card and reader.\n\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,7 +51,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "0",
|
||||
"version_value": "1.7.2"
|
||||
"version_value": "1.07.02"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -89,10 +89,10 @@
|
||||
{
|
||||
"base64": false,
|
||||
"type": "text/html",
|
||||
"value": "Update ioSmart Gen1 card reader to firmware version 1.7.2 or higher.<br>Download the update here: <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.kantech.com/Resources/GetDoc.aspx?p=1&id=58679\">https://www.kantech.com/Resources/GetDoc.aspx?p=1&id=58679</a><br>Contact technical support for additional information.<br><br>ioSmart Gen2 readers are not affected by this behavior.<br>Contact your local sales representative for ordering information.<br>"
|
||||
"value": "Update ioSmart Gen1 card reader to firmware version 1.07.02 or higher.<br>Download the update here: <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.kantech.com/Resources/GetDoc.aspx?p=1&id=58679\">https://www.kantech.com/Resources/GetDoc.aspx?p=1&id=58679</a><br>Contact technical support for additional information.<br><br>ioSmart Gen2 readers are not affected by this behavior.<br>Contact your local sales representative for ordering information.<br>"
|
||||
}
|
||||
],
|
||||
"value": "Update ioSmart Gen1 card reader to firmware version 1.7.2 or higher.\nDownload the update here:\u00a0 https://www.kantech.com/Resources/GetDoc.aspx?p=1&id=58679 https://www.kantech.com/Resources/GetDoc.aspx \nContact technical support for additional information.\n\nioSmart Gen2 readers are not affected by this behavior.\nContact your local sales representative for ordering information.\n"
|
||||
"value": "Update ioSmart Gen1 card reader to firmware version 1.07.02 or higher.\nDownload the update here:\u00a0 https://www.kantech.com/Resources/GetDoc.aspx?p=1&id=58679 https://www.kantech.com/Resources/GetDoc.aspx \nContact technical support for additional information.\n\nioSmart Gen2 readers are not affected by this behavior.\nContact your local sales representative for ordering information.\n"
|
||||
}
|
||||
],
|
||||
"credits": [
|
||||
|
@ -77,7 +77,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.19041.3803"
|
||||
"version_value": "10.0.19044.3803"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,132 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-50728",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "security-advisories@github.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "octokit/webhooks is a GitHub webhook events toolset for Node.js. Starting in 9.26.0 and prior to 9.26.3, 10.9.2, 11.1.2, and 12.0.4, there is a problem caused by an issue with error handling in the @octokit/webhooks library because the error can be undefined in some cases. The resulting request was found to cause an uncaught exception that ends the nodejs process. The bug is fixed in octokit/webhooks.js 9.26.3, 10.9.2, 11.1.2, and 12.0.4, app.js 14.02, octokit.js 3.1.2, and Protobot 12.3.3."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-755: Improper Handling of Exceptional Conditions",
|
||||
"cweId": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "octokit",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "webhooks.js",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": ">= 9.26.0, < 9.26.3"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": ">= 10.9.0, < 10.9.2"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": ">= 11.1.0, < 11.1.2"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": ">= 12.0.0, < 12.0.4"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/octokit/webhooks.js/security/advisories/GHSA-pwfr-8pq7-x9qv",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/octokit/webhooks.js/security/advisories/GHSA-pwfr-8pq7-x9qv"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octokit/app.js/releases/tag/v14.0.2",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/octokit/app.js/releases/tag/v14.0.2"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octokit/octokit.js/releases/tag/v3.1.2",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/octokit/octokit.js/releases/tag/v3.1.2"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octokit/webhooks.js/releases/tag/v10.9.2",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/octokit/webhooks.js/releases/tag/v10.9.2"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octokit/webhooks.js/releases/tag/v11.1.2",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/octokit/webhooks.js/releases/tag/v11.1.2"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octokit/webhooks.js/releases/tag/v12.0.4",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/octokit/webhooks.js/releases/tag/v12.0.4"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octokit/webhooks.js/releases/tag/v9.26.3",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/octokit/webhooks.js/releases/tag/v9.26.3"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/probot/probot/releases/tag/v12.3.3",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/probot/probot/releases/tag/v12.3.3"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"advisory": "GHSA-pwfr-8pq7-x9qv",
|
||||
"discovery": "UNKNOWN"
|
||||
},
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"attackComplexity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "REQUIRED",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
|
||||
"version": "3.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
18
2023/50xxx/CVE-2023-50929.json
Normal file
18
2023/50xxx/CVE-2023-50929.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-50929",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2023/6xxx/CVE-2023-6878.json
Normal file
18
2023/6xxx/CVE-2023-6878.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-6878",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2023/6xxx/CVE-2023-6879.json
Normal file
18
2023/6xxx/CVE-2023-6879.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-6879",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2023/6xxx/CVE-2023-6880.json
Normal file
18
2023/6xxx/CVE-2023-6880.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-6880",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user