diff --git a/2019/19xxx/CVE-2019-19450.json b/2019/19xxx/CVE-2019-19450.json index c34e8c2bf01..5cacc81f24c 100644 --- a/2019/19xxx/CVE-2019-19450.json +++ b/2019/19xxx/CVE-2019-19450.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://pastebin.com/5MicRrr4", "url": "https://pastebin.com/5MicRrr4" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230929 [SECURITY] [DLA 3590-1] python-reportlab security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html" } ] } diff --git a/2020/21xxx/CVE-2020-21490.json b/2020/21xxx/CVE-2020-21490.json index bb4c5077828..232d3fdeced 100644 --- a/2020/21xxx/CVE-2020-21490.json +++ b/2020/21xxx/CVE-2020-21490.json @@ -61,6 +61,11 @@ "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=378fd436405b3051df34ac995b2e03fe1f3d1907", "refsource": "MISC", "name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=378fd436405b3051df34ac995b2e03fe1f3d1907" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230929-0007/", + "url": "https://security.netapp.com/advisory/ntap-20230929-0007/" } ] } diff --git a/2020/28xxx/CVE-2020-28463.json b/2020/28xxx/CVE-2020-28463.json index 58d08a8e6b8..79f4c0d0b86 100644 --- a/2020/28xxx/CVE-2020-28463.json +++ b/2020/28xxx/CVE-2020-28463.json @@ -66,6 +66,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-04bfae8300", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZQSFCID67K6BTC655EQY6MNOF35QI44/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230929 [SECURITY] [DLA 3590-1] python-reportlab security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html" } ] }, diff --git a/2021/32xxx/CVE-2021-32292.json b/2021/32xxx/CVE-2021-32292.json index d3ce940610d..63422fd6c65 100644 --- a/2021/32xxx/CVE-2021-32292.json +++ b/2021/32xxx/CVE-2021-32292.json @@ -61,6 +61,11 @@ "refsource": "DEBIAN", "name": "DSA-5486", "url": "https://www.debian.org/security/2023/dsa-5486" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230929-0010/", + "url": "https://security.netapp.com/advisory/ntap-20230929-0010/" } ] } diff --git a/2022/48xxx/CVE-2022-48560.json b/2022/48xxx/CVE-2022-48560.json index 2e7e34956cd..a948c744e4f 100644 --- a/2022/48xxx/CVE-2022-48560.json +++ b/2022/48xxx/CVE-2022-48560.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230920 [SECURITY] [DLA 3575-1] python2.7 security update", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230929-0008/", + "url": "https://security.netapp.com/advisory/ntap-20230929-0008/" } ] } diff --git a/2022/48xxx/CVE-2022-48564.json b/2022/48xxx/CVE-2022-48564.json index 43438c30ee3..1c075c299c6 100644 --- a/2022/48xxx/CVE-2022-48564.json +++ b/2022/48xxx/CVE-2022-48564.json @@ -56,6 +56,11 @@ "url": "https://bugs.python.org/issue42103", "refsource": "MISC", "name": "https://bugs.python.org/issue42103" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230929-0009/", + "url": "https://security.netapp.com/advisory/ntap-20230929-0009/" } ] } diff --git a/2022/4xxx/CVE-2022-4269.json b/2022/4xxx/CVE-2022-4269.json index fbedfac3da4..49780b6808d 100644 --- a/2022/4xxx/CVE-2022-4269.json +++ b/2022/4xxx/CVE-2022-4269.json @@ -63,6 +63,11 @@ "url": "https://www.debian.org/security/2023/dsa-5480", "refsource": "MISC", "name": "https://www.debian.org/security/2023/dsa-5480" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230929-0001/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230929-0001/" } ] } diff --git a/2023/1xxx/CVE-2023-1206.json b/2023/1xxx/CVE-2023-1206.json index 7568852e898..a979bc18d22 100644 --- a/2023/1xxx/CVE-2023-1206.json +++ b/2023/1xxx/CVE-2023-1206.json @@ -58,6 +58,11 @@ "refsource": "DEBIAN", "name": "DSA-5492", "url": "https://www.debian.org/security/2023/dsa-5492" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230929-0006/", + "url": "https://security.netapp.com/advisory/ntap-20230929-0006/" } ] }, diff --git a/2023/2xxx/CVE-2023-2269.json b/2023/2xxx/CVE-2023-2269.json index 498bb4807e3..3e3e3800e03 100644 --- a/2023/2xxx/CVE-2023-2269.json +++ b/2023/2xxx/CVE-2023-2269.json @@ -78,6 +78,11 @@ "refsource": "DEBIAN", "name": "DSA-5480", "url": "https://www.debian.org/security/2023/dsa-5480" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230929-0004/", + "url": "https://security.netapp.com/advisory/ntap-20230929-0004/" } ] }, diff --git a/2023/2xxx/CVE-2023-2898.json b/2023/2xxx/CVE-2023-2898.json index d1c99462287..6edc3b44ffc 100644 --- a/2023/2xxx/CVE-2023-2898.json +++ b/2023/2xxx/CVE-2023-2898.json @@ -58,6 +58,11 @@ "refsource": "DEBIAN", "name": "DSA-5492", "url": "https://www.debian.org/security/2023/dsa-5492" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230929-0002/", + "url": "https://security.netapp.com/advisory/ntap-20230929-0002/" } ] }, diff --git a/2023/31xxx/CVE-2023-31081.json b/2023/31xxx/CVE-2023-31081.json index 5c8b11a1761..c0347b7e814 100644 --- a/2023/31xxx/CVE-2023-31081.json +++ b/2023/31xxx/CVE-2023-31081.json @@ -56,6 +56,11 @@ "url": "https://lore.kernel.org/all/CA+UBctDXyiosaiR7YNKCs8k0aWu4gU+YutRcnC+TDJkXpHjQag@mail.gmail.com/", "refsource": "MISC", "name": "https://lore.kernel.org/all/CA+UBctDXyiosaiR7YNKCs8k0aWu4gU+YutRcnC+TDJkXpHjQag@mail.gmail.com/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230929-0003/", + "url": "https://security.netapp.com/advisory/ntap-20230929-0003/" } ] } diff --git a/2023/31xxx/CVE-2023-31082.json b/2023/31xxx/CVE-2023-31082.json index 038326ffaa0..48e5519de41 100644 --- a/2023/31xxx/CVE-2023-31082.json +++ b/2023/31xxx/CVE-2023-31082.json @@ -56,6 +56,11 @@ "url": "https://lore.kernel.org/all/CA+UBctCZok5FSQ=LPRA+A-jocW=L8FuMVZ_7MNqhh483P5yN8A@mail.gmail.com/", "refsource": "MISC", "name": "https://lore.kernel.org/all/CA+UBctCZok5FSQ=LPRA+A-jocW=L8FuMVZ_7MNqhh483P5yN8A@mail.gmail.com/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230929-0003/", + "url": "https://security.netapp.com/advisory/ntap-20230929-0003/" } ] } diff --git a/2023/31xxx/CVE-2023-31083.json b/2023/31xxx/CVE-2023-31083.json index 1f6e2a788eb..bb8a0b7e656 100644 --- a/2023/31xxx/CVE-2023-31083.json +++ b/2023/31xxx/CVE-2023-31083.json @@ -56,6 +56,11 @@ "url": "https://lore.kernel.org/all/CA+UBctC3p49aTgzbVgkSZ2+TQcqq4fPDO7yZitFT5uBPDeCO2g@mail.gmail.com/", "refsource": "MISC", "name": "https://lore.kernel.org/all/CA+UBctC3p49aTgzbVgkSZ2+TQcqq4fPDO7yZitFT5uBPDeCO2g@mail.gmail.com/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230929-0003/", + "url": "https://security.netapp.com/advisory/ntap-20230929-0003/" } ] } diff --git a/2023/31xxx/CVE-2023-31084.json b/2023/31xxx/CVE-2023-31084.json index 47ba046e6b5..0ada4614036 100644 --- a/2023/31xxx/CVE-2023-31084.json +++ b/2023/31xxx/CVE-2023-31084.json @@ -81,6 +81,11 @@ "refsource": "DEBIAN", "name": "DSA-5480", "url": "https://www.debian.org/security/2023/dsa-5480" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230929-0003/", + "url": "https://security.netapp.com/advisory/ntap-20230929-0003/" } ] } diff --git a/2023/31xxx/CVE-2023-31085.json b/2023/31xxx/CVE-2023-31085.json index fd8ffff2db9..1ab2fc3d035 100644 --- a/2023/31xxx/CVE-2023-31085.json +++ b/2023/31xxx/CVE-2023-31085.json @@ -56,6 +56,11 @@ "url": "https://lore.kernel.org/all/687864524.118195.1681799447034.JavaMail.zimbra@nod.at/", "refsource": "MISC", "name": "https://lore.kernel.org/all/687864524.118195.1681799447034.JavaMail.zimbra@nod.at/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230929-0003/", + "url": "https://security.netapp.com/advisory/ntap-20230929-0003/" } ] } diff --git a/2023/3xxx/CVE-2023-3212.json b/2023/3xxx/CVE-2023-3212.json index 064c345e19c..25c4d84696f 100644 --- a/2023/3xxx/CVE-2023-3212.json +++ b/2023/3xxx/CVE-2023-3212.json @@ -63,6 +63,11 @@ "refsource": "DEBIAN", "name": "DSA-5480", "url": "https://www.debian.org/security/2023/dsa-5480" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230929-0005/", + "url": "https://security.netapp.com/advisory/ntap-20230929-0005/" } ] }, diff --git a/2023/44xxx/CVE-2023-44270.json b/2023/44xxx/CVE-2023-44270.json index fb500020fdf..4430f55f309 100644 --- a/2023/44xxx/CVE-2023-44270.json +++ b/2023/44xxx/CVE-2023-44270.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-44270", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-44270", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in PostCSS before 8.4.31. It affects linters using PostCSS to parse external Cascading Style Sheets (CSS). There may be \\r discrepancies, as demonstrated by @font-face{ font:(\\r/*);} in a rule." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/postcss/postcss/blob/main/lib/tokenize.js#L25", + "refsource": "MISC", + "name": "https://github.com/postcss/postcss/blob/main/lib/tokenize.js#L25" + }, + { + "refsource": "MISC", + "name": "https://github.com/postcss/postcss/releases/tag/8.4.31", + "url": "https://github.com/postcss/postcss/releases/tag/8.4.31" + }, + { + "refsource": "MISC", + "name": "https://github.com/postcss/postcss/commit/58cc860b4c1707510c9cd1bc1fa30b423a9ad6c5", + "url": "https://github.com/postcss/postcss/commit/58cc860b4c1707510c9cd1bc1fa30b423a9ad6c5" } ] } diff --git a/2023/4xxx/CVE-2023-4863.json b/2023/4xxx/CVE-2023-4863.json index 38b33ec917d..06ce34348bc 100644 --- a/2023/4xxx/CVE-2023-4863.json +++ b/2023/4xxx/CVE-2023-4863.json @@ -265,6 +265,11 @@ "url": "http://www.openwall.com/lists/oss-security/2023/09/28/4", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2023/09/28/4" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230929-0011/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230929-0011/" } ] } diff --git a/2023/5xxx/CVE-2023-5294.json b/2023/5xxx/CVE-2023-5294.json index 3513680f8b0..3e85e28e4e0 100644 --- a/2023/5xxx/CVE-2023-5294.json +++ b/2023/5xxx/CVE-2023-5294.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5294", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been found in ECshop 4.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/order.php. The manipulation of the argument goods_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240925 was assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "In ECshop 4.1.1 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei /admin/order.php. Durch die Manipulation des Arguments goods_id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ECshop", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.1.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.240925", + "refsource": "MISC", + "name": "https://vuldb.com/?id.240925" + }, + { + "url": "https://vuldb.com/?ctiid.240925", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.240925" + }, + { + "url": "https://github.com/xhcccan/code/issues/2", + "refsource": "MISC", + "name": "https://github.com/xhcccan/code/issues/2" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "xhccan (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 4.7, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 4.7, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 5.8, + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/5xxx/CVE-2023-5296.json b/2023/5xxx/CVE-2023-5296.json index b68aa758488..ecb2c433415 100644 --- a/2023/5xxx/CVE-2023-5296.json +++ b/2023/5xxx/CVE-2023-5296.json @@ -1,17 +1,113 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5296", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Xinhu RockOA 1.1/2.3.2/15.X3amdi and classified as problematic. Affected by this issue is some unknown functionality of the file api.php?m=reimplat&a=index of the component Password Handler. The manipulation leads to weak password recovery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240926 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in Xinhu RockOA 1.1/2.3.2/15.X3amdi gefunden. Sie wurde als problematisch eingestuft. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion der Datei api.php?m=reimplat&a=index der Komponente Password Handler. Durch Manipulation mit unbekannten Daten kann eine weak password recovery-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-640 Weak Password Recovery", + "cweId": "CWE-640" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Xinhu", + "product": { + "product_data": [ + { + "product_name": "RockOA", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.1" + }, + { + "version_affected": "=", + "version_value": "2.3.2" + }, + { + "version_affected": "=", + "version_value": "15.X3amdi" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.240926", + "refsource": "MISC", + "name": "https://vuldb.com/?id.240926" + }, + { + "url": "https://vuldb.com/?ctiid.240926", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.240926" + }, + { + "url": "https://github.com/magicwave18/vuldb/issues/1", + "refsource": "MISC", + "name": "https://github.com/magicwave18/vuldb/issues/1" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "magicwave18 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 4.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 4.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/5xxx/CVE-2023-5297.json b/2023/5xxx/CVE-2023-5297.json index a5aa3bb9945..023052fce33 100644 --- a/2023/5xxx/CVE-2023-5297.json +++ b/2023/5xxx/CVE-2023-5297.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-5297", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|runt&a=beifen. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240927." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in Xinhu RockOA 2.3.2 ausgemacht. Sie wurde als problematisch eingestuft. Es geht dabei um die Funktion start der Datei task.php?m=sys|runt&a=beifen. Mittels dem Manipulieren mit unbekannten Daten kann eine exposure of backup file to an unauthorized control sphere-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie ist schwierig auszunutzen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-530 Exposure of Backup File to an Unauthorized Control Sphere", + "cweId": "CWE-530" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Xinhu", + "product": { + "product_data": [ + { + "product_name": "RockOA", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.3.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.240927", + "refsource": "MISC", + "name": "https://vuldb.com/?id.240927" + }, + { + "url": "https://vuldb.com/?ctiid.240927", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.240927" + }, + { + "url": "https://github.com/magicwave18/vuldb/issues/2", + "refsource": "MISC", + "name": "https://github.com/magicwave18/vuldb/issues/2" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "magicwave18 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.7, + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.7, + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 2.6, + "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseSeverity": "LOW" } ] }