"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-12-13 02:00:36 +00:00
parent 72f590c755
commit 55a769ff61
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
48 changed files with 1017 additions and 64 deletions

View File

@ -76,6 +76,21 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT214037",
"url": "https://support.apple.com/kb/HT214037"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-4 macOS Sonoma 14.2",
"url": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-5 macOS Ventura 13.6.3",
"url": "http://seclists.org/fulldisclosure/2023/Dec/10"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-6 macOS Monterey 12.7.2",
"url": "http://seclists.org/fulldisclosure/2023/Dec/11"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT214037",
"url": "https://support.apple.com/kb/HT214037"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-4 macOS Sonoma 14.2",
"url": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -76,6 +76,21 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT214037",
"url": "https://support.apple.com/kb/HT214037"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-4 macOS Sonoma 14.2",
"url": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-5 macOS Ventura 13.6.3",
"url": "http://seclists.org/fulldisclosure/2023/Dec/10"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-6 macOS Monterey 12.7.2",
"url": "http://seclists.org/fulldisclosure/2023/Dec/11"
}
]
}

View File

@ -76,6 +76,21 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT214037",
"url": "https://support.apple.com/kb/HT214037"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-4 macOS Sonoma 14.2",
"url": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-5 macOS Ventura 13.6.3",
"url": "http://seclists.org/fulldisclosure/2023/Dec/10"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-6 macOS Monterey 12.7.2",
"url": "http://seclists.org/fulldisclosure/2023/Dec/11"
}
]
}

View File

@ -81,6 +81,21 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT214037",
"url": "https://support.apple.com/kb/HT214037"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-4 macOS Sonoma 14.2",
"url": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-5 macOS Ventura 13.6.3",
"url": "http://seclists.org/fulldisclosure/2023/Dec/10"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-6 macOS Monterey 12.7.2",
"url": "http://seclists.org/fulldisclosure/2023/Dec/11"
}
]
}

View File

@ -76,6 +76,21 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT214037",
"url": "https://support.apple.com/kb/HT214037"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-4 macOS Sonoma 14.2",
"url": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-5 macOS Ventura 13.6.3",
"url": "http://seclists.org/fulldisclosure/2023/Dec/10"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-6 macOS Monterey 12.7.2",
"url": "http://seclists.org/fulldisclosure/2023/Dec/11"
}
]
}

View File

@ -1,18 +1,76 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-42483",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-42483",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A TOCTOU race condition in Samsung Mobile Processor Exynos 9820, Exynos 980, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, and Exynos 1380 can cause unexpected termination of a system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:H/S:U/UI:R",
"version": "3.1"
}
}
}

View File

@ -73,6 +73,11 @@
"url": "https://support.apple.com/kb/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/kb/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -58,6 +58,11 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -131,6 +131,26 @@
"url": "https://support.apple.com/en-us/HT214041",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214041"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/7"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/8",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/8"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/6",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/6"
}
]
}

View File

@ -102,6 +102,26 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/7"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/10"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/8",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/8"
}
]
}

View File

@ -68,6 +68,21 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/10"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/11"
}
]
}

View File

@ -126,6 +126,21 @@
"url": "https://support.apple.com/en-us/HT214041",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214041"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/7"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/6",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/6"
}
]
}

View File

@ -68,6 +68,21 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/10"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/11"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -58,6 +58,11 @@
"url": "https://support.apple.com/en-us/HT214035",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214035"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/7"
}
]
}

View File

@ -109,6 +109,16 @@
"url": "https://support.apple.com/en-us/HT214041",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214041"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/7"
}
]
}

View File

@ -124,6 +124,31 @@
"url": "https://support.apple.com/en-us/HT214041",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214041"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/7"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/10"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/8",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/8"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/11"
}
]
}

View File

@ -58,6 +58,11 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -58,6 +58,11 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -58,6 +58,11 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -58,6 +58,11 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -58,6 +58,11 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -58,6 +58,11 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -58,6 +58,11 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -58,6 +58,11 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -124,6 +124,31 @@
"url": "https://support.apple.com/en-us/HT214041",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214041"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/7"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/10"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/8",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/8"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/11"
}
]
}

View File

@ -117,6 +117,21 @@
"url": "http://seclists.org/fulldisclosure/2023/Dec/3",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/3"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/4",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/4"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/5",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/5"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/8",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/8"
}
]
}

View File

@ -117,6 +117,21 @@
"url": "http://seclists.org/fulldisclosure/2023/Dec/3",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/3"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/4",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/4"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/5",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/5"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/8",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/8"
}
]
}

View File

@ -107,6 +107,31 @@
"url": "https://support.apple.com/en-us/HT214041",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214041"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/7"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/10"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/8",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/8"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/11"
}
]
}

View File

@ -90,6 +90,11 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -58,6 +58,11 @@
"url": "https://support.apple.com/en-us/HT214035",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214035"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/7"
}
]
}

View File

@ -63,6 +63,16 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/10"
}
]
}

View File

@ -58,6 +58,11 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -92,6 +92,16 @@
"url": "https://support.apple.com/en-us/HT214041",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214041"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/7"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://support.apple.com/en-us/HT214036",
"refsource": "MISC",
"name": "https://support.apple.com/en-us/HT214036"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -1,18 +1,76 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-43122",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-43122",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Samsung Mobile Processor and Wearable Processor (Exynos 980, 850, 1080, 2100, 2200, 1280, 1380, 1330, and W920) allow Information Disclosure in the Bootloader."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AC:L/AV:P/A:N/C:H/I:N/PR:H/S:C/UI:R",
"version": "3.1"
}
}
}

View File

@ -1,17 +1,88 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-45800",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vuln@krcert.or.kr",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Hanbiro Hanbiro groupware allows Information Elicitation.This issue affects Hanbiro groupware: from V3.8.79 before V3.8.81.1.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Hanbiro",
"product": {
"product_data": [
{
"product_name": "Hanbiro groupware",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "V3.8.79",
"version_value": "V3.8.81.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://hanbiro.com/",
"refsource": "MISC",
"name": "https://hanbiro.com/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
]
}

View File

@ -1,18 +1,76 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-45864",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-45864",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A race condition issue discovered in Samsung Mobile Processor Exynos 9820, 980, 1080, 2100, 2200, 1280, and 1380 allows unintended modifications of values within certain areas."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"refsource": "MISC",
"name": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AC:H/AV:L/A:N/C:N/I:H/PR:H/S:U/UI:R",
"version": "3.1"
}
}
}

View File

@ -91,6 +91,11 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT214035",
"url": "https://support.apple.com/kb/HT214035"
},
{
"refsource": "FULLDISC",
"name": "20231212 APPLE-SA-12-11-2023-4 macOS Sonoma 14.2",
"url": "http://seclists.org/fulldisclosure/2023/Dec/9"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47573",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-47573",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue discovered in Relyum RELY-PCIe 22.2.1 devices. The authorization mechanism is not enforced in the web interface, allowing a low-privileged user to execute administrative functions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.relyum.com/web/support/vulnerability-report/",
"url": "https://www.relyum.com/web/support/vulnerability-report/"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47574",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-47574",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered on Relyum RELY-PCIe 22.2.1 and RELY-REC 23.1.0 devices. There is a Weak SMB configuration with signing disabled."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.relyum.com/web/support/vulnerability-report/",
"url": "https://www.relyum.com/web/support/vulnerability-report/"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47575",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-47575",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered on Relyum RELY-PCIe 22.2.1 and RELY-REC 23.1.0 devices. The web interfaces of the Relyum devices are susceptible to reflected XSS."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.relyum.com/web/support/vulnerability-report/",
"url": "https://www.relyum.com/web/support/vulnerability-report/"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47576",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-47576",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in Relyum RELY-PCIe 22.2.1 and RELY-REC 23.1.0 devices, allowing authenticated command injection through the web interface."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.relyum.com/web/support/vulnerability-report/",
"url": "https://www.relyum.com/web/support/vulnerability-report/"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47577",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-47577",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue discovered in Relyum RELY-PCIe 22.2.1 and RELY-REC 23.1.0 allows for unauthorized password changes due to no check for current password."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.relyum.com/web/support/vulnerability-report/",
"url": "https://www.relyum.com/web/support/vulnerability-report/"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47578",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-47578",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Relyum RELY-PCIe 22.2.1 and RELY-REC 23.1.0 devices are susceptible to Cross Site Request Forgery (CSRF) attacks due to the absence of CSRF protection in the web interface."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.relyum.com/web/support/vulnerability-report/",
"url": "https://www.relyum.com/web/support/vulnerability-report/"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47579",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-47579",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Relyum RELY-PCIe 22.2.1 devices suffer from a system group misconfiguration, allowing read access to the central password hash file of the operating system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.relyum.com/web/support/vulnerability-report/",
"url": "https://www.relyum.com/web/support/vulnerability-report/"
}
]
}

View File

@ -94,6 +94,21 @@
"url": "https://support.apple.com/kb/HT214037",
"refsource": "MISC",
"name": "https://support.apple.com/kb/HT214037"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/9"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/10"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2023/Dec/11"
}
]
},