diff --git a/2017/18xxx/CVE-2017-18196.json b/2017/18xxx/CVE-2017-18196.json index 72d7a5cd05a..c2aaa48791d 100644 --- a/2017/18xxx/CVE-2017-18196.json +++ b/2017/18xxx/CVE-2017-18196.json @@ -56,6 +56,11 @@ "name": "https://bugs.debian.org/885704", "refsource": "MISC", "url": "https://bugs.debian.org/885704" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202312-01", + "url": "https://security.gentoo.org/glsa/202312-01" } ] } diff --git a/2018/7xxx/CVE-2018-7186.json b/2018/7xxx/CVE-2018-7186.json index 3f797c5ac8f..b928f64911a 100644 --- a/2018/7xxx/CVE-2018-7186.json +++ b/2018/7xxx/CVE-2018-7186.json @@ -71,6 +71,11 @@ "name": "https://lists.debian.org/debian-lts/2018/02/msg00054.html", "refsource": "MISC", "url": "https://lists.debian.org/debian-lts/2018/02/msg00054.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202312-01", + "url": "https://security.gentoo.org/glsa/202312-01" } ] } diff --git a/2018/7xxx/CVE-2018-7247.json b/2018/7xxx/CVE-2018-7247.json index c140ca02978..3ea0bf017cf 100644 --- a/2018/7xxx/CVE-2018-7247.json +++ b/2018/7xxx/CVE-2018-7247.json @@ -56,6 +56,11 @@ "name": "https://github.com/DanBloomberg/leptonica/commit/c1079bb8e77cdd426759e466729917ca37a3ed9f", "refsource": "MISC", "url": "https://github.com/DanBloomberg/leptonica/commit/c1079bb8e77cdd426759e466729917ca37a3ed9f" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202312-01", + "url": "https://security.gentoo.org/glsa/202312-01" } ] } diff --git a/2018/7xxx/CVE-2018-7440.json b/2018/7xxx/CVE-2018-7440.json index dc119d566c4..bb06ac3074c 100644 --- a/2018/7xxx/CVE-2018-7440.json +++ b/2018/7xxx/CVE-2018-7440.json @@ -61,6 +61,11 @@ "name": "https://github.com/DanBloomberg/leptonica/issues/303#issuecomment-366472212", "refsource": "MISC", "url": "https://github.com/DanBloomberg/leptonica/issues/303#issuecomment-366472212" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202312-01", + "url": "https://security.gentoo.org/glsa/202312-01" } ] } diff --git a/2018/7xxx/CVE-2018-7441.json b/2018/7xxx/CVE-2018-7441.json index 3b394b9413e..5ab9738ebfd 100644 --- a/2018/7xxx/CVE-2018-7441.json +++ b/2018/7xxx/CVE-2018-7441.json @@ -56,6 +56,11 @@ "name": "https://lists.debian.org/debian-lts/2018/02/msg00054.html", "refsource": "MISC", "url": "https://lists.debian.org/debian-lts/2018/02/msg00054.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202312-01", + "url": "https://security.gentoo.org/glsa/202312-01" } ] } diff --git a/2018/7xxx/CVE-2018-7442.json b/2018/7xxx/CVE-2018-7442.json index 819d41dc673..b7dcff40466 100644 --- a/2018/7xxx/CVE-2018-7442.json +++ b/2018/7xxx/CVE-2018-7442.json @@ -56,6 +56,11 @@ "name": "https://lists.debian.org/debian-lts/2018/02/msg00086.html", "refsource": "MISC", "url": "https://lists.debian.org/debian-lts/2018/02/msg00086.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202312-01", + "url": "https://security.gentoo.org/glsa/202312-01" } ] } diff --git a/2022/38xxx/CVE-2022-38266.json b/2022/38xxx/CVE-2022-38266.json index 480b9b6aabc..c237628a1a4 100644 --- a/2022/38xxx/CVE-2022-38266.json +++ b/2022/38xxx/CVE-2022-38266.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221208 [SECURITY] [DLA 3233-1] leptonlib security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00018.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202312-01", + "url": "https://security.gentoo.org/glsa/202312-01" } ] } diff --git a/2023/41xxx/CVE-2023-41314.json b/2023/41xxx/CVE-2023-41314.json index b3570ecb00c..13e6d727a45 100644 --- a/2023/41xxx/CVE-2023-41314.json +++ b/2023/41xxx/CVE-2023-41314.json @@ -1,18 +1,71 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-41314", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@apache.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The api /api/snapshot and /api/get_log_file would allow unauthenticated access.\nIt could allow a\u00a0DoS attack or get arbitrary files from FE node.\nPlease\u00a0upgrade to 2.0.3 to fix these issues." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863 Incorrect Authorization", + "cweId": "CWE-863" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apache Software Foundation", + "product": { + "product_data": [ + { + "product_name": "Apache Doris", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "1.2.0", + "version_value": "2.0.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://lists.apache.org/thread/tgvpvz3yw7zgodl1sb3sv3jbbz8t5zb4", + "refsource": "MISC", + "name": "https://lists.apache.org/thread/tgvpvz3yw7zgodl1sb3sv3jbbz8t5zb4" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2023/5xxx/CVE-2023-5633.json b/2023/5xxx/CVE-2023-5633.json index e722eb67b9f..8bb4076f753 100644 --- a/2023/5xxx/CVE-2023-5633.json +++ b/2023/5xxx/CVE-2023-5633.json @@ -173,7 +173,7 @@ "work_around": [ { "lang": "en", - "value": "This flaw can be mitigated by preventing the affected `vmwgfx` kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278." + "value": "This flaw can be mitigated by turning off 3D acceleration in VMware (if possible) or preventing the affected `vmwgfx` kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278." } ], "credits": [ diff --git a/2023/6xxx/CVE-2023-6483.json b/2023/6xxx/CVE-2023-6483.json index 0f780bf937c..0ecf809a93a 100644 --- a/2023/6xxx/CVE-2023-6483.json +++ b/2023/6xxx/CVE-2023-6483.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-6483", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vdisclose@cert-in.org.in", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The vulnerability exists in ADiTaaS (Allied Digital Integrated Tool-as-a-Service) version 5.1 due to an improper authentication vulnerability in the ADiTaaS backend API. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable platform.\n\nSuccessful exploitation of this vulnerability could allow the attacker to gain full access to the customers\u2019 data and completely compromise the targeted platform.\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287 Improper Authentication", + "cweId": "CWE-287" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "ADiTaaS", + "product": { + "product_data": [ + { + "product_name": "Allied Digital Integrated Tool-as-a-Service", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "5.1 " + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0365", + "refsource": "MISC", + "name": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0365" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Upgrade to ADiTaaS version 5.1.1 or later." + } + ], + "value": "Upgrade to ADiTaaS version 5.1.1 or later." + } + ], + "credits": [ + { + "lang": "en", + "value": "This vulnerability is reported by Eaton Zveare. " + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "version": "3.1" } ] } diff --git a/2023/6xxx/CVE-2023-6911.json b/2023/6xxx/CVE-2023-6911.json new file mode 100644 index 00000000000..26602d17ce1 --- /dev/null +++ b/2023/6xxx/CVE-2023-6911.json @@ -0,0 +1,489 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2023-6911", + "ASSIGNER": "security@wso2.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Multiple WSO2 products have been identified as vulnerable due to improper output encoding, a Stored Cross Site Scripting (XSS) attack can be carried out by an attacker injecting a malicious payload into the Registry feature of the Management Console.\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WSO2", + "product": { + "product_data": [ + { + "product_name": "WSO2 API Manager", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "2.2.0.0", + "status": "unknown", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.2.0.1", + "status": "affected", + "version": "2.2.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.5.0.1", + "status": "affected", + "version": "2.5.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.6.0.1", + "status": "affected", + "version": "2.6.0.0", + "versionType": "custom" + }, + { + "lessThan": "3.0.0.1", + "status": "affected", + "version": "3.0.0.0", + "versionType": "custom" + }, + { + "lessThan": "3.1.0.1", + "status": "affected", + "version": "3.1.0.0", + "versionType": "custom" + }, + { + "lessThan": "3.2.0.1", + "status": "affected", + "version": "3.2.0.0", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "WSO2 API Manager Analytics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "2.2.0.0", + "status": "unknown", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.2.0.1", + "status": "affected", + "version": "2.2.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.5.0.1", + "status": "affected", + "version": "2.5.0.0", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "WSO2 API Microgateway", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "2.2.0.0", + "status": "unknown", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.2.0.1", + "status": "affected", + "version": "2.2.0.0", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "WSO2 Data Analytics Server", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "3.2.0.0", + "status": "unknown", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "3.2.0.1", + "status": "affected", + "version": "3.2.0.0", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "WSO2 Enterprise Integrator", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "6.1.0.0", + "status": "unknown", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "6.1.0.9", + "status": "affected", + "version": "6.1.0.0", + "versionType": "custom" + }, + { + "lessThan": "6.1.1.9", + "status": "affected", + "version": "6.1.1.0", + "versionType": "custom" + }, + { + "lessThan": "6.2.0.7", + "status": "affected", + "version": "6.2.0.0", + "versionType": "custom" + }, + { + "lessThan": "6.3.0.1", + "status": "affected", + "version": "6.3.0.0", + "versionType": "custom" + }, + { + "lessThan": "6.4.0.1", + "status": "affected", + "version": "6.4.0.0", + "versionType": "custom" + }, + { + "lessThan": "6.5.0.6", + "status": "affected", + "version": "6.5.0.0", + "versionType": "custom" + }, + { + "lessThan": "6.6.0.11", + "status": "affected", + "version": "6.6.0.0", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "WSO2 IS as Key Manager", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "5.5.0.0", + "status": "unknown", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "5.5.0.1", + "status": "affected", + "version": "5.5.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.6.0.1", + "status": "affected", + "version": "5.6.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.7.0.1", + "status": "affected", + "version": "5.7.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.9.0.1", + "status": "affected", + "version": "5.9.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.10.0.1", + "status": "affected", + "version": "5.10.0.0", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "WSO2 Identity Server", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "5.4.0.0", + "status": "unknown", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "5.4.0.4", + "status": "affected", + "version": "5.4.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.4.1.3", + "status": "affected", + "version": "5.4.1.0", + "versionType": "custom" + }, + { + "lessThan": "5.5.0.1", + "status": "affected", + "version": "5.5.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.6.0.1", + "status": "affected", + "version": "5.6.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.7.0.1", + "status": "affected", + "version": "5.7.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.8.0.5", + "status": "affected", + "version": "5.8.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.9.0.1", + "status": "affected", + "version": "5.9.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.10.0.1", + "status": "affected", + "version": "5.10.0.0", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "WSO2 Identity Server Analytics", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "5.4.0.0", + "status": "unknown", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "5.4.0.2", + "status": "affected", + "version": "5.4.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.4.1.2", + "status": "affected", + "version": "5.4.1.0", + "versionType": "custom" + }, + { + "lessThan": "5.5.0.1", + "status": "affected", + "version": "5.5.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.6.0.1", + "status": "affected", + "version": "5.6.0.0", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + }, + { + "product_name": "WSO2 Message Broker", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "3.2.0.0", + "status": "unknown", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "3.2.0.3", + "status": "affected", + "version": "3.2.0.0", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/", + "refsource": "MISC", + "name": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.

Community users may apply the relevant fixes to the product based on the public fix(s) advertised in https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1...
" + } + ], + "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/ \n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" + } + ] + } +} \ No newline at end of file diff --git a/2023/6xxx/CVE-2023-6912.json b/2023/6xxx/CVE-2023-6912.json new file mode 100644 index 00000000000..3bebd074088 --- /dev/null +++ b/2023/6xxx/CVE-2023-6912.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-6912", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file