"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-12-22 01:00:36 +00:00
parent f2f6707f93
commit 27a31fd9f8
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
49 changed files with 324 additions and 19 deletions

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is elevation of privilege."
"value": "In RGXUnbackingZSBuffer of rgxta3d.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is elevation of privilege."
"value": "In PMR_ReadBytes of pmr.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is elevation of privilege."
"value": "In DevmemIntMapPMR of devicemem_server.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is elevation of privilege."
"value": "In RGXBackingZSBuffer of rgxta3d.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is elevation of privilege."
"value": "In DevmemIntAcquireRemoteCtx of devicemem_server.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is elevation of privilege."
"value": "In PMRChangeSparseMemOSMem of physmem_osmem_linux.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is elevation of privilege."
"value": "In PMRWritePMPageList of TBD, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is elevation of privilege."
"value": "In PMRChangeSparseMemOSMem of physmem_osmem_linux.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is information disclosure."
"value": "In HTBLogKM of htbserver.c, there is a possible information disclosure due to log information disclosure. This could lead to local information disclosure in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is elevation of privilege."
"value": "In PMRChangeSparseMemOSMem of physmem_osmem_linux.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is elevation of privilege."
"value": " In OSMMapPMRGeneric of pmr_os.c, there is a possible out of bounds write due to an uncaught exception. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -65,6 +65,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/services/Telecomm/+/68dca62035c49e14ad26a54f614199cb29a3393f",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/services/Telecomm/+/68dca62035c49e14ad26a54f614199cb29a3393f"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is elevation of privilege."
"value": "In DevmemIntChangeSparse of devicemem_server.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is elevation of privilege."
"value": "In MMU_UnmapPages of mmu_common.c, there is a possible out of bounds read due to improper input validation. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is elevation of privilege."
"value": "In RGXDestroyZSBufferKM of rgxta3d.c, there is a possible arbitrary code execution due to an uncaught exception. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -65,6 +65,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/b7bd7df91740da680a5c3a84d8dd91b4ca6956dd",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/b7bd7df91740da680a5c3a84d8dd91b4ca6956dd"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is elevation of privilege."
"value": " In RGXDestroyHWRTData of rgxta3d.c, there is a possible arbitrary code execution due to an uncaught exception. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
}
]
},

View File

@ -69,6 +69,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/fe6fef4f9c1f75c12bffa4a1d16d9990cc3fbc35",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/fe6fef4f9c1f75c12bffa4a1d16d9990cc3fbc35"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -65,6 +65,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/40e4ea759743737958dde018f3606d778f7a53f3",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/40e4ea759743737958dde018f3606d778f7a53f3"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -69,6 +69,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/ae768fbb9975fdab267f525831cb52f485ab0ecc",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/ae768fbb9975fdab267f525831cb52f485ab0ecc"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -53,6 +53,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/9b68987df85b681f9362a3cadca6496796d23bbc",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/9b68987df85b681f9362a3cadca6496796d23bbc"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -69,6 +69,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/58fd993a89a3a22fa5a4a1a4548125c6783ec80c",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/av/+/58fd993a89a3a22fa5a4a1a4548125c6783ec80c"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -53,6 +53,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/6cdf985a664476659b84d8c74698cb3dfa28f82b",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/6cdf985a664476659b84d8c74698cb3dfa28f82b"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -53,6 +53,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/96e0524c48c6e58af7d15a2caf35082186fc8de2",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/96e0524c48c6e58af7d15a2caf35082186fc8de2"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -57,6 +57,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/7b30443dac7bb9138275c909549110191bcbcae9",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/7b30443dac7bb9138275c909549110191bcbcae9"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -69,6 +69,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/1a42ae5379269b9e4dac9f5fbf803c6c731c655d",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/1a42ae5379269b9e4dac9f5fbf803c6c731c655d"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -53,6 +53,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Virtualization/+/0cf463e9949db2d30755fc63a79225a6158928d3",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Virtualization/+/0cf463e9949db2d30755fc63a79225a6158928d3"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -65,6 +65,16 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/a218e5be5e4049eae3b321f2a535a128d65d00b6",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/a218e5be5e4049eae3b321f2a535a128d65d00b6"
},
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/ea81185c89097500559d61b3d49fb9633899e848",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/ea81185c89097500559d61b3d49fb9633899e848"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -69,6 +69,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/system/netd/+/1b8bddd96b2efd4074b6d4eee377b62077c031bd",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/system/netd/+/1b8bddd96b2efd4074b6d4eee377b62077c031bd"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -69,6 +69,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/243fdf1c0d53bda9e829b4bec9f7c2a824b4d3d1",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/243fdf1c0d53bda9e829b4bec9f7c2a824b4d3d1"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -69,6 +69,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/5bfd817719fcf55cbb3476e6b5539a3db4c437fc",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/5bfd817719fcf55cbb3476e6b5539a3db4c437fc"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -53,6 +53,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/e2e05f488da6abc765a62e7faf10cb74e729732e",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/e2e05f488da6abc765a62e7faf10cb74e729732e"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -69,6 +69,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/495417bd068c35de0729d9a332639bd0699153ff",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/495417bd068c35de0729d9a332639bd0699153ff"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -69,6 +69,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/0ec7b119d41adcbba23f9349e16de9e7e11683f6",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/0ec7b119d41adcbba23f9349e16de9e7e11683f6"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -69,6 +69,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/a5e55363e69b3c84d3f4011c7b428edb1a25752c",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/a5e55363e69b3c84d3f4011c7b428edb1a25752c"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -69,6 +69,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/1120bc7e511710b1b774adf29ba47106292365e7",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/1120bc7e511710b1b774adf29ba47106292365e7"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -69,6 +69,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/d98abeef8f870b60510feafbadcea0c2f9cbae65",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/d98abeef8f870b60510feafbadcea0c2f9cbae65"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -69,6 +69,26 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/b0f6558fb36eb76df35c516ec5a65030a34a8734",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/b0f6558fb36eb76df35c516ec5a65030a34a8734"
},
{
"url": "https://android.googlesource.com/platform/frameworks/native/+/9ddecd3d2b88de5ff7aa890d7ba9967c30d8b183",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/native/+/9ddecd3d2b88de5ff7aa890d7ba9967c30d8b183"
},
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/148aeea373febc959c429f2cabd8323508c38ad8",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/av/+/148aeea373febc959c429f2cabd8323508c38ad8"
},
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/5f401fc9f214789d691798620fea60015962370a",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/av/+/5f401fc9f214789d691798620fea60015962370a"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -65,6 +65,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/apps/Launcher3/+/6c9a41117d5a9365cf34e770bbb00138f6bf997e",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/apps/Launcher3/+/6c9a41117d5a9365cf34e770bbb00138f6bf997e"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -65,6 +65,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -53,6 +53,21 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/e4a821b10a1b020f18fc6fc316b13b90fa450bae",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/e4a821b10a1b020f18fc6fc316b13b90fa450bae"
},
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/58fa254a5d1aee2206de90d5396c01e177483e3a",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/58fa254a5d1aee2206de90d5396c01e177483e3a"
},
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/c3bc12c484ef3bbca4cec19234437c45af5e584d",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/c3bc12c484ef3bbca4cec19234437c45af5e584d"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -57,6 +57,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/7b30443dac7bb9138275c909549110191bcbcae9",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/7b30443dac7bb9138275c909549110191bcbcae9"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -69,6 +69,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/f229f0e55b07416badaca0e3493db5af0943c9eb",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/f229f0e55b07416badaca0e3493db5af0943c9eb"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -53,6 +53,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8e3b3fc918b3ea77754c6d82ab0f09cce81e145b",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8e3b3fc918b3ea77754c6d82ab0f09cce81e145b"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -53,6 +53,11 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8e3b3fc918b3ea77754c6d82ab0f09cce81e145b",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8e3b3fc918b3ea77754c6d82ab0f09cce81e145b"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -57,6 +57,16 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/f810d81839af38ee121c446105ca67cb12992fc6",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/f810d81839af38ee121c446105ca67cb12992fc6"
},
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/f4644b55d36a549710ba35b6fb797ba744807da6",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/frameworks/base/+/f4644b55d36a549710ba35b6fb797ba744807da6"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -65,6 +65,16 @@
},
"references": {
"reference_data": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/a218e5be5e4049eae3b321f2a535a128d65d00b6",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/a218e5be5e4049eae3b321f2a535a128d65d00b6"
},
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/ea81185c89097500559d61b3d49fb9633899e848",
"refsource": "MISC",
"name": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/ea81185c89097500559d61b3d49fb9633899e848"
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"refsource": "MISC",

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-51703",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -1,17 +1,104 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-7052",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in PHPGurukul Online Notes Sharing System 1.0. It has been classified as problematic. This affects an unknown part of the file /user/profile.php. The manipulation of the argument name leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248739."
},
{
"lang": "deu",
"value": "Es wurde eine Schwachstelle in PHPGurukul Online Notes Sharing System 1.0 ausgemacht. Sie wurde als problematisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei /user/profile.php. Durch das Manipulieren des Arguments name mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery",
"cweId": "CWE-352"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PHPGurukul",
"product": {
"product_data": [
{
"product_name": "Online Notes Sharing System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.248739",
"refsource": "MISC",
"name": "https://vuldb.com/?id.248739"
},
{
"url": "https://vuldb.com/?ctiid.248739",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.248739"
},
{
"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_profile_notes.md",
"refsource": "MISC",
"name": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_profile_notes.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "dhabaleshwar (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 4.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 4.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
}
]
}