mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
0254773861
commit
9763cf6d67
@ -56,6 +56,11 @@
|
||||
"name": "https://bugs.debian.org/885704",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.debian.org/885704"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202312-01",
|
||||
"url": "https://security.gentoo.org/glsa/202312-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"name": "https://lists.debian.org/debian-lts/2018/02/msg00054.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://lists.debian.org/debian-lts/2018/02/msg00054.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202312-01",
|
||||
"url": "https://security.gentoo.org/glsa/202312-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://github.com/DanBloomberg/leptonica/commit/c1079bb8e77cdd426759e466729917ca37a3ed9f",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/DanBloomberg/leptonica/commit/c1079bb8e77cdd426759e466729917ca37a3ed9f"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202312-01",
|
||||
"url": "https://security.gentoo.org/glsa/202312-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"name": "https://github.com/DanBloomberg/leptonica/issues/303#issuecomment-366472212",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/DanBloomberg/leptonica/issues/303#issuecomment-366472212"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202312-01",
|
||||
"url": "https://security.gentoo.org/glsa/202312-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://lists.debian.org/debian-lts/2018/02/msg00054.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://lists.debian.org/debian-lts/2018/02/msg00054.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202312-01",
|
||||
"url": "https://security.gentoo.org/glsa/202312-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://lists.debian.org/debian-lts/2018/02/msg00086.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://lists.debian.org/debian-lts/2018/02/msg00086.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202312-01",
|
||||
"url": "https://security.gentoo.org/glsa/202312-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221208 [SECURITY] [DLA 3233-1] leptonlib security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00018.html"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202312-01",
|
||||
"url": "https://security.gentoo.org/glsa/202312-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,18 +1,71 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-41314",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "security@apache.org",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "The api /api/snapshot and /api/get_log_file would allow unauthenticated access.\nIt could allow a\u00a0DoS attack or get arbitrary files from FE node.\nPlease\u00a0upgrade to 2.0.3 to fix these issues."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-863 Incorrect Authorization",
|
||||
"cweId": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Apache Software Foundation",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Apache Doris",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_name": "1.2.0",
|
||||
"version_value": "2.0.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/tgvpvz3yw7zgodl1sb3sv3jbbz8t5zb4",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread/tgvpvz3yw7zgodl1sb3sv3jbbz8t5zb4"
|
||||
}
|
||||
]
|
||||
},
|
||||
"generator": {
|
||||
"engine": "Vulnogram 0.1.0-dev"
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
@ -173,7 +173,7 @@
|
||||
"work_around": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This flaw can be mitigated by preventing the affected `vmwgfx` kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278."
|
||||
"value": "This flaw can be mitigated by turning off 3D acceleration in VMware (if possible) or preventing the affected `vmwgfx` kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278."
|
||||
}
|
||||
],
|
||||
"credits": [
|
||||
|
@ -1,17 +1,104 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-6483",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "vdisclose@cert-in.org.in",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "The vulnerability exists in ADiTaaS (Allied Digital Integrated Tool-as-a-Service) version 5.1 due to an improper authentication vulnerability in the ADiTaaS backend API. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable platform.\n\nSuccessful exploitation of this vulnerability could allow the attacker to gain full access to the customers\u2019 data and completely compromise the targeted platform.\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-287 Improper Authentication",
|
||||
"cweId": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "ADiTaaS",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Allied Digital Integrated Tool-as-a-Service",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_name": "0",
|
||||
"version_value": "5.1 "
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0365",
|
||||
"refsource": "MISC",
|
||||
"name": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0365"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
},
|
||||
"solution": [
|
||||
{
|
||||
"lang": "en",
|
||||
"supportingMedia": [
|
||||
{
|
||||
"base64": false,
|
||||
"type": "text/html",
|
||||
"value": "Upgrade to ADiTaaS version 5.1.1 or later."
|
||||
}
|
||||
],
|
||||
"value": "Upgrade to ADiTaaS version 5.1.1 or later."
|
||||
}
|
||||
],
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This vulnerability is reported by Eaton Zveare. "
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"attackComplexity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"version": "3.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
489
2023/6xxx/CVE-2023-6911.json
Normal file
489
2023/6xxx/CVE-2023-6911.json
Normal file
@ -0,0 +1,489 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-6911",
|
||||
"ASSIGNER": "security@wso2.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Multiple WSO2 products have been identified as vulnerable due to improper output encoding, a Stored Cross Site Scripting (XSS) attack can be carried out by an attacker injecting a malicious payload into the Registry feature of the Management Console.\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
|
||||
"cweId": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "WSO2",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "WSO2 API Manager",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "not down converted",
|
||||
"x_cve_json_5_version_data": {
|
||||
"versions": [
|
||||
{
|
||||
"lessThan": "2.2.0.0",
|
||||
"status": "unknown",
|
||||
"version": "0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "2.2.0.1",
|
||||
"status": "affected",
|
||||
"version": "2.2.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "2.5.0.1",
|
||||
"status": "affected",
|
||||
"version": "2.5.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "2.6.0.1",
|
||||
"status": "affected",
|
||||
"version": "2.6.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "3.0.0.1",
|
||||
"status": "affected",
|
||||
"version": "3.0.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "3.1.0.1",
|
||||
"status": "affected",
|
||||
"version": "3.1.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "3.2.0.1",
|
||||
"status": "affected",
|
||||
"version": "3.2.0.0",
|
||||
"versionType": "custom"
|
||||
}
|
||||
],
|
||||
"defaultStatus": "unaffected"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "WSO2 API Manager Analytics",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "not down converted",
|
||||
"x_cve_json_5_version_data": {
|
||||
"versions": [
|
||||
{
|
||||
"lessThan": "2.2.0.0",
|
||||
"status": "unknown",
|
||||
"version": "0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "2.2.0.1",
|
||||
"status": "affected",
|
||||
"version": "2.2.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "2.5.0.1",
|
||||
"status": "affected",
|
||||
"version": "2.5.0.0",
|
||||
"versionType": "custom"
|
||||
}
|
||||
],
|
||||
"defaultStatus": "unaffected"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "WSO2 API Microgateway",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "not down converted",
|
||||
"x_cve_json_5_version_data": {
|
||||
"versions": [
|
||||
{
|
||||
"lessThan": "2.2.0.0",
|
||||
"status": "unknown",
|
||||
"version": "0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "2.2.0.1",
|
||||
"status": "affected",
|
||||
"version": "2.2.0.0",
|
||||
"versionType": "custom"
|
||||
}
|
||||
],
|
||||
"defaultStatus": "unaffected"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "WSO2 Data Analytics Server",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "not down converted",
|
||||
"x_cve_json_5_version_data": {
|
||||
"versions": [
|
||||
{
|
||||
"lessThan": "3.2.0.0",
|
||||
"status": "unknown",
|
||||
"version": "0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "3.2.0.1",
|
||||
"status": "affected",
|
||||
"version": "3.2.0.0",
|
||||
"versionType": "custom"
|
||||
}
|
||||
],
|
||||
"defaultStatus": "unaffected"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "WSO2 Enterprise Integrator",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "not down converted",
|
||||
"x_cve_json_5_version_data": {
|
||||
"versions": [
|
||||
{
|
||||
"lessThan": "6.1.0.0",
|
||||
"status": "unknown",
|
||||
"version": "0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "6.1.0.9",
|
||||
"status": "affected",
|
||||
"version": "6.1.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "6.1.1.9",
|
||||
"status": "affected",
|
||||
"version": "6.1.1.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "6.2.0.7",
|
||||
"status": "affected",
|
||||
"version": "6.2.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "6.3.0.1",
|
||||
"status": "affected",
|
||||
"version": "6.3.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "6.4.0.1",
|
||||
"status": "affected",
|
||||
"version": "6.4.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "6.5.0.6",
|
||||
"status": "affected",
|
||||
"version": "6.5.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "6.6.0.11",
|
||||
"status": "affected",
|
||||
"version": "6.6.0.0",
|
||||
"versionType": "custom"
|
||||
}
|
||||
],
|
||||
"defaultStatus": "unaffected"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "WSO2 IS as Key Manager",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "not down converted",
|
||||
"x_cve_json_5_version_data": {
|
||||
"versions": [
|
||||
{
|
||||
"lessThan": "5.5.0.0",
|
||||
"status": "unknown",
|
||||
"version": "0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.5.0.1",
|
||||
"status": "affected",
|
||||
"version": "5.5.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.6.0.1",
|
||||
"status": "affected",
|
||||
"version": "5.6.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.7.0.1",
|
||||
"status": "affected",
|
||||
"version": "5.7.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.9.0.1",
|
||||
"status": "affected",
|
||||
"version": "5.9.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.10.0.1",
|
||||
"status": "affected",
|
||||
"version": "5.10.0.0",
|
||||
"versionType": "custom"
|
||||
}
|
||||
],
|
||||
"defaultStatus": "unaffected"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "WSO2 Identity Server",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "not down converted",
|
||||
"x_cve_json_5_version_data": {
|
||||
"versions": [
|
||||
{
|
||||
"lessThan": "5.4.0.0",
|
||||
"status": "unknown",
|
||||
"version": "0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.4.0.4",
|
||||
"status": "affected",
|
||||
"version": "5.4.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.4.1.3",
|
||||
"status": "affected",
|
||||
"version": "5.4.1.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.5.0.1",
|
||||
"status": "affected",
|
||||
"version": "5.5.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.6.0.1",
|
||||
"status": "affected",
|
||||
"version": "5.6.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.7.0.1",
|
||||
"status": "affected",
|
||||
"version": "5.7.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.8.0.5",
|
||||
"status": "affected",
|
||||
"version": "5.8.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.9.0.1",
|
||||
"status": "affected",
|
||||
"version": "5.9.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.10.0.1",
|
||||
"status": "affected",
|
||||
"version": "5.10.0.0",
|
||||
"versionType": "custom"
|
||||
}
|
||||
],
|
||||
"defaultStatus": "unaffected"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "WSO2 Identity Server Analytics",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "not down converted",
|
||||
"x_cve_json_5_version_data": {
|
||||
"versions": [
|
||||
{
|
||||
"lessThan": "5.4.0.0",
|
||||
"status": "unknown",
|
||||
"version": "0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.4.0.2",
|
||||
"status": "affected",
|
||||
"version": "5.4.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.4.1.2",
|
||||
"status": "affected",
|
||||
"version": "5.4.1.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.5.0.1",
|
||||
"status": "affected",
|
||||
"version": "5.5.0.0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "5.6.0.1",
|
||||
"status": "affected",
|
||||
"version": "5.6.0.0",
|
||||
"versionType": "custom"
|
||||
}
|
||||
],
|
||||
"defaultStatus": "unaffected"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "WSO2 Message Broker",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "not down converted",
|
||||
"x_cve_json_5_version_data": {
|
||||
"versions": [
|
||||
{
|
||||
"lessThan": "3.2.0.0",
|
||||
"status": "unknown",
|
||||
"version": "0",
|
||||
"versionType": "custom"
|
||||
},
|
||||
{
|
||||
"lessThan": "3.2.0.3",
|
||||
"status": "affected",
|
||||
"version": "3.2.0.0",
|
||||
"versionType": "custom"
|
||||
}
|
||||
],
|
||||
"defaultStatus": "unaffected"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"generator": {
|
||||
"engine": "Vulnogram 0.1.0-dev"
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
},
|
||||
"solution": [
|
||||
{
|
||||
"lang": "en",
|
||||
"supportingMedia": [
|
||||
{
|
||||
"base64": false,
|
||||
"type": "text/html",
|
||||
"value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.<br><br>Community users may apply the relevant fixes to the product based on the public fix(s) advertised in <a target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/\">https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1...</a><br>"
|
||||
}
|
||||
],
|
||||
"value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/ \n"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"attackComplexity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"scope": "CHANGED",
|
||||
"userInteraction": "REQUIRED",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"version": "3.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2023/6xxx/CVE-2023-6912.json
Normal file
18
2023/6xxx/CVE-2023-6912.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-6912",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user