"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-11-07 10:00:38 +00:00
parent 88faf20df3
commit 73f60e6266
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
2 changed files with 29 additions and 22 deletions

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull."
"value": "The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull.\n"
}
]
},
@ -40,8 +40,9 @@
"version": {
"version_data": [
{
"version_value": "FW16",
"version_affected": "="
"version_affected": "<=",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
@ -51,8 +52,9 @@
"version": {
"version_data": [
{
"version_value": "FW16",
"version_affected": "="
"version_affected": "<=",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
@ -62,8 +64,9 @@
"version": {
"version_data": [
{
"version_value": "FW16",
"version_affected": "="
"version_affected": "<=",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
@ -73,8 +76,9 @@
"version": {
"version_data": [
{
"version_value": "FW16",
"version_affected": "="
"version_affected": "<=",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
@ -84,8 +88,9 @@
"version": {
"version_data": [
{
"version_value": "FW16",
"version_affected": "="
"version_affected": "<=",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
@ -95,8 +100,9 @@
"version": {
"version_data": [
{
"version_value": "FW16",
"version_affected": "="
"version_affected": "<=",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
@ -106,8 +112,9 @@
"version": {
"version_data": [
{
"version_value": "FW16",
"version_affected": "="
"version_affected": "<=",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
@ -140,17 +147,17 @@
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
]

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "The validate JSON endpoint of the Secvisogram csaf-validator-service in versions < 0.1.0 processes tests with unexpected names. This insufficient input validation of requests by an unauthenticated remote user might lead to a DoS of the process answering the current request while having no effect on other requests."
"value": "The validate JSON endpoint of the Secvisogram csaf-validator-service in versions < 0.1.0 processes tests with unexpected names. This insufficient input validation of requests by an unauthenticated remote user might lead to a partial DoS of the service. Only the request of the attacker is affected by this vulnerability."
}
]
},