"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-05-05 20:00:36 +00:00
parent 94fcadc3c6
commit 4b388c59e2
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
18 changed files with 519 additions and 415 deletions

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://www.kb.cert.org/vuls/id/730793",
"url": "https://www.kb.cert.org/vuls/id/730793"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230505-0010/",
"url": "https://security.netapp.com/advisory/ntap-20230505-0010/"
}
]
},

View File

@ -101,6 +101,11 @@
"refsource": "MISC",
"url": "https://github.com/kubernetes/kubernetes/issues/113757",
"name": "https://github.com/kubernetes/kubernetes/issues/113757"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230505-0007/",
"url": "https://security.netapp.com/advisory/ntap-20230505-0007/"
}
]
},

View File

@ -61,6 +61,11 @@
"url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.3",
"refsource": "MISC",
"name": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.3"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230505-0003/",
"url": "https://security.netapp.com/advisory/ntap-20230505-0003/"
}
]
}

View File

@ -61,6 +61,11 @@
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4f1dc7d9756e66f3f876839ea174df2e656b7f79",
"refsource": "MISC",
"name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4f1dc7d9756e66f3f876839ea174df2e656b7f79"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230505-0002/",
"url": "https://security.netapp.com/advisory/ntap-20230505-0002/"
}
]
}

View File

@ -58,6 +58,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230505-0004/",
"url": "https://security.netapp.com/advisory/ntap-20230505-0004/"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://lore.kernel.org/lkml/20211115165433.449951285@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20211115165433.449951285@linuxfoundation.org/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230505-0005/",
"url": "https://security.netapp.com/advisory/ntap-20230505-0005/"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://spring.io/security/cve-2023-20860",
"url": "https://spring.io/security/cve-2023-20860"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230505-0006/",
"url": "https://security.netapp.com/advisory/ntap-20230505-0006/"
}
]
},

View File

@ -91,6 +91,11 @@
"url": "https://discuss.hashicorp.com/t/hcsec-2023-07-vault-fails-to-verify-if-approle-secretid-belongs-to-role-during-a-destroy-operation/51305",
"refsource": "MISC",
"name": "https://discuss.hashicorp.com/t/hcsec-2023-07-vault-fails-to-verify-if-approle-secretid-belongs-to-role-during-a-destroy-operation/51305"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230505-0001/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230505-0001/"
}
]
},

View File

@ -74,6 +74,11 @@
"url": "https://lists.apache.org/thread/wkx6grrcjkh86crr49p4blc1v1nflj3t",
"refsource": "MISC",
"name": "https://lists.apache.org/thread/wkx6grrcjkh86crr49p4blc1v1nflj3t"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230505-0008/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230505-0008/"
}
]
},

View File

@ -71,6 +71,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20230331 [SECURITY] [DLA 3377-1] systemd security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00032.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230505-0009/",
"url": "https://security.netapp.com/advisory/ntap-20230505-0009/"
}
]
}

View File

@ -1,89 +1,89 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2023-2550",
"STATE": "PUBLIC",
"TITLE": "Cross-site Scripting (XSS) - Stored in thorsten/phpmyfaq"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "thorsten/phpmyfaq",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "3.1.13"
}
]
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2023-2550",
"STATE": "PUBLIC",
"TITLE": "Cross-site Scripting (XSS) - Stored in thorsten/phpmyfaq"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "thorsten/phpmyfaq",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "3.1.13"
}
]
}
}
]
},
"vendor_name": "thorsten"
}
}
]
},
"vendor_name": "thorsten"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b"
},
{
"name": "https://github.com/thorsten/phpmyfaq/commit/20ac51594db11604a4518aacc28a51f67d4f11bf",
"refsource": "MISC",
"url": "https://github.com/thorsten/phpmyfaq/commit/20ac51594db11604a4518aacc28a51f67d4f11bf"
}
]
},
"source": {
"advisory": "840c8d91-c97e-4116-a9f8-4ab1a38d239b",
"discovery": "EXTERNAL"
}
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b"
},
{
"name": "https://github.com/thorsten/phpmyfaq/commit/20ac51594db11604a4518aacc28a51f67d4f11bf",
"refsource": "MISC",
"url": "https://github.com/thorsten/phpmyfaq/commit/20ac51594db11604a4518aacc28a51f67d4f11bf"
}
]
},
"source": {
"advisory": "840c8d91-c97e-4116-a9f8-4ab1a38d239b",
"discovery": "EXTERNAL"
}
}

View File

@ -1,89 +1,89 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2023-2551",
"STATE": "PUBLIC",
"TITLE": "PHP Remote File Inclusion in unilogies/bumsys"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "unilogies/bumsys",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "2.1.1"
}
]
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2023-2551",
"STATE": "PUBLIC",
"TITLE": "PHP Remote File Inclusion in unilogies/bumsys"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "unilogies/bumsys",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "2.1.1"
}
]
}
}
]
},
"vendor_name": "unilogies"
}
}
]
},
"vendor_name": "unilogies"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "PHP Remote File Inclusion in GitHub repository unilogies/bumsys prior to 2.1.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')"
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "PHP Remote File Inclusion in GitHub repository unilogies/bumsys prior to 2.1.1."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/5723613c-55c6-4f18-9ed3-61ad44f5de9c",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/5723613c-55c6-4f18-9ed3-61ad44f5de9c"
},
{
"name": "https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a",
"refsource": "MISC",
"url": "https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a"
}
]
},
"source": {
"advisory": "5723613c-55c6-4f18-9ed3-61ad44f5de9c",
"discovery": "EXTERNAL"
}
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a",
"refsource": "MISC",
"url": "https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a"
},
{
"name": "https://huntr.dev/bounties/5723613c-55c6-4f18-9ed3-61ad44f5de9c",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/5723613c-55c6-4f18-9ed3-61ad44f5de9c"
}
]
},
"source": {
"advisory": "5723613c-55c6-4f18-9ed3-61ad44f5de9c",
"discovery": "EXTERNAL"
}
}

View File

@ -1,89 +1,89 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2023-2552",
"STATE": "PUBLIC",
"TITLE": "Cross-Site Request Forgery (CSRF) in unilogies/bumsys"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "unilogies/bumsys",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "2.1.1"
}
]
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2023-2552",
"STATE": "PUBLIC",
"TITLE": "Cross-Site Request Forgery (CSRF) in unilogies/bumsys"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "unilogies/bumsys",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "2.1.1"
}
]
}
}
]
},
"vendor_name": "unilogies"
}
}
]
},
"vendor_name": "unilogies"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-Site Request Forgery (CSRF) in GitHub repository unilogies/bumsys prior to 2.1.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-Site Request Forgery (CSRF) in GitHub repository unilogies/bumsys prior to 2.1.1."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/ab0b4655-f57a-4113-849b-2237eeb75b32",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/ab0b4655-f57a-4113-849b-2237eeb75b32"
},
{
"name": "https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a",
"refsource": "MISC",
"url": "https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a"
}
]
},
"source": {
"advisory": "ab0b4655-f57a-4113-849b-2237eeb75b32",
"discovery": "EXTERNAL"
}
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/ab0b4655-f57a-4113-849b-2237eeb75b32",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/ab0b4655-f57a-4113-849b-2237eeb75b32"
},
{
"name": "https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a",
"refsource": "MISC",
"url": "https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a"
}
]
},
"source": {
"advisory": "ab0b4655-f57a-4113-849b-2237eeb75b32",
"discovery": "EXTERNAL"
}
}

View File

@ -1,89 +1,89 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2023-2553",
"STATE": "PUBLIC",
"TITLE": "Cross-site Scripting (XSS) - Stored in unilogies/bumsys"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "unilogies/bumsys",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "2.2.0"
}
]
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2023-2553",
"STATE": "PUBLIC",
"TITLE": "Cross-site Scripting (XSS) - Stored in unilogies/bumsys"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "unilogies/bumsys",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "2.2.0"
}
]
}
}
]
},
"vendor_name": "unilogies"
}
}
]
},
"vendor_name": "unilogies"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository unilogies/bumsys prior to 2.2.0."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository unilogies/bumsys prior to 2.2.0."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/4e1f5b56-e846-40d8-a83c-533efd56aacf",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/4e1f5b56-e846-40d8-a83c-533efd56aacf"
},
{
"name": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978",
"refsource": "MISC",
"url": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978"
}
]
},
"source": {
"advisory": "4e1f5b56-e846-40d8-a83c-533efd56aacf",
"discovery": "EXTERNAL"
}
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978",
"refsource": "MISC",
"url": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978"
},
{
"name": "https://huntr.dev/bounties/4e1f5b56-e846-40d8-a83c-533efd56aacf",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/4e1f5b56-e846-40d8-a83c-533efd56aacf"
}
]
},
"source": {
"advisory": "4e1f5b56-e846-40d8-a83c-533efd56aacf",
"discovery": "EXTERNAL"
}
}

View File

@ -1,89 +1,89 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2023-2554",
"STATE": "PUBLIC",
"TITLE": "External Control of File Name or Path in unilogies/bumsys"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "unilogies/bumsys",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "2.2.0"
}
]
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2023-2554",
"STATE": "PUBLIC",
"TITLE": "External Control of File Name or Path in unilogies/bumsys"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "unilogies/bumsys",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "2.2.0"
}
]
}
}
]
},
"vendor_name": "unilogies"
}
}
]
},
"vendor_name": "unilogies"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "External Control of File Name or Path in GitHub repository unilogies/bumsys prior to 2.2.0."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-73 External Control of File Name or Path"
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "External Control of File Name or Path in GitHub repository unilogies/bumsys prior to 2.2.0."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/396785a0-7bb6-4db4-b4cb-607b0fd4ab4b",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/396785a0-7bb6-4db4-b4cb-607b0fd4ab4b"
},
{
"name": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978",
"refsource": "MISC",
"url": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978"
}
]
},
"source": {
"advisory": "396785a0-7bb6-4db4-b4cb-607b0fd4ab4b",
"discovery": "EXTERNAL"
}
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-73 External Control of File Name or Path"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/396785a0-7bb6-4db4-b4cb-607b0fd4ab4b",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/396785a0-7bb6-4db4-b4cb-607b0fd4ab4b"
},
{
"name": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978",
"refsource": "MISC",
"url": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978"
}
]
},
"source": {
"advisory": "396785a0-7bb6-4db4-b4cb-607b0fd4ab4b",
"discovery": "EXTERNAL"
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-2556",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-2557",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-2558",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}