"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-12-18 09:00:32 +00:00
parent 0254773861
commit 9763cf6d67
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
12 changed files with 691 additions and 9 deletions

View File

@ -56,6 +56,11 @@
"name": "https://bugs.debian.org/885704",
"refsource": "MISC",
"url": "https://bugs.debian.org/885704"
},
{
"refsource": "GENTOO",
"name": "GLSA-202312-01",
"url": "https://security.gentoo.org/glsa/202312-01"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "https://lists.debian.org/debian-lts/2018/02/msg00054.html",
"refsource": "MISC",
"url": "https://lists.debian.org/debian-lts/2018/02/msg00054.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202312-01",
"url": "https://security.gentoo.org/glsa/202312-01"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://github.com/DanBloomberg/leptonica/commit/c1079bb8e77cdd426759e466729917ca37a3ed9f",
"refsource": "MISC",
"url": "https://github.com/DanBloomberg/leptonica/commit/c1079bb8e77cdd426759e466729917ca37a3ed9f"
},
{
"refsource": "GENTOO",
"name": "GLSA-202312-01",
"url": "https://security.gentoo.org/glsa/202312-01"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://github.com/DanBloomberg/leptonica/issues/303#issuecomment-366472212",
"refsource": "MISC",
"url": "https://github.com/DanBloomberg/leptonica/issues/303#issuecomment-366472212"
},
{
"refsource": "GENTOO",
"name": "GLSA-202312-01",
"url": "https://security.gentoo.org/glsa/202312-01"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://lists.debian.org/debian-lts/2018/02/msg00054.html",
"refsource": "MISC",
"url": "https://lists.debian.org/debian-lts/2018/02/msg00054.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202312-01",
"url": "https://security.gentoo.org/glsa/202312-01"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://lists.debian.org/debian-lts/2018/02/msg00086.html",
"refsource": "MISC",
"url": "https://lists.debian.org/debian-lts/2018/02/msg00086.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202312-01",
"url": "https://security.gentoo.org/glsa/202312-01"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221208 [SECURITY] [DLA 3233-1] leptonlib security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00018.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202312-01",
"url": "https://security.gentoo.org/glsa/202312-01"
}
]
}

View File

@ -1,18 +1,71 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-41314",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@apache.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The api /api/snapshot and /api/get_log_file would allow unauthenticated access.\nIt could allow a\u00a0DoS attack or get arbitrary files from FE node.\nPlease\u00a0upgrade to 2.0.3 to fix these issues."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-863 Incorrect Authorization",
"cweId": "CWE-863"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apache Software Foundation",
"product": {
"product_data": [
{
"product_name": "Apache Doris",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "1.2.0",
"version_value": "2.0.3"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://lists.apache.org/thread/tgvpvz3yw7zgodl1sb3sv3jbbz8t5zb4",
"refsource": "MISC",
"name": "https://lists.apache.org/thread/tgvpvz3yw7zgodl1sb3sv3jbbz8t5zb4"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
}
}

View File

@ -173,7 +173,7 @@
"work_around": [
{
"lang": "en",
"value": "This flaw can be mitigated by preventing the affected `vmwgfx` kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278."
"value": "This flaw can be mitigated by turning off 3D acceleration in VMware (if possible) or preventing the affected `vmwgfx` kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278."
}
],
"credits": [

View File

@ -1,17 +1,104 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6483",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vdisclose@cert-in.org.in",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The vulnerability exists in ADiTaaS (Allied Digital Integrated Tool-as-a-Service) version 5.1 due to an improper authentication vulnerability in the ADiTaaS backend API. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable platform.\n\nSuccessful exploitation of this vulnerability could allow the attacker to gain full access to the customers\u2019 data and completely compromise the targeted platform.\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-287 Improper Authentication",
"cweId": "CWE-287"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "ADiTaaS",
"product": {
"product_data": [
{
"product_name": "Allied Digital Integrated Tool-as-a-Service",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "0",
"version_value": "5.1 "
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0365",
"refsource": "MISC",
"name": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0365"
}
]
},
"source": {
"discovery": "UNKNOWN"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Upgrade to ADiTaaS version 5.1.1 or later."
}
],
"value": "Upgrade to ADiTaaS version 5.1.1 or later."
}
],
"credits": [
{
"lang": "en",
"value": "This vulnerability is reported by Eaton Zveare. "
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
]
}

View File

@ -0,0 +1,489 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-6911",
"ASSIGNER": "security@wso2.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple WSO2 products have been identified as vulnerable due to improper output encoding, a Stored Cross Site Scripting (XSS) attack can be carried out by an attacker injecting a malicious payload into the Registry feature of the Management Console.\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WSO2",
"product": {
"product_data": [
{
"product_name": "WSO2 API Manager",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "2.2.0.0",
"status": "unknown",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "2.2.0.1",
"status": "affected",
"version": "2.2.0.0",
"versionType": "custom"
},
{
"lessThan": "2.5.0.1",
"status": "affected",
"version": "2.5.0.0",
"versionType": "custom"
},
{
"lessThan": "2.6.0.1",
"status": "affected",
"version": "2.6.0.0",
"versionType": "custom"
},
{
"lessThan": "3.0.0.1",
"status": "affected",
"version": "3.0.0.0",
"versionType": "custom"
},
{
"lessThan": "3.1.0.1",
"status": "affected",
"version": "3.1.0.0",
"versionType": "custom"
},
{
"lessThan": "3.2.0.1",
"status": "affected",
"version": "3.2.0.0",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "WSO2 API Manager Analytics",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "2.2.0.0",
"status": "unknown",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "2.2.0.1",
"status": "affected",
"version": "2.2.0.0",
"versionType": "custom"
},
{
"lessThan": "2.5.0.1",
"status": "affected",
"version": "2.5.0.0",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "WSO2 API Microgateway",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "2.2.0.0",
"status": "unknown",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "2.2.0.1",
"status": "affected",
"version": "2.2.0.0",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "WSO2 Data Analytics Server",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "3.2.0.0",
"status": "unknown",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "3.2.0.1",
"status": "affected",
"version": "3.2.0.0",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "WSO2 Enterprise Integrator",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "6.1.0.0",
"status": "unknown",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "6.1.0.9",
"status": "affected",
"version": "6.1.0.0",
"versionType": "custom"
},
{
"lessThan": "6.1.1.9",
"status": "affected",
"version": "6.1.1.0",
"versionType": "custom"
},
{
"lessThan": "6.2.0.7",
"status": "affected",
"version": "6.2.0.0",
"versionType": "custom"
},
{
"lessThan": "6.3.0.1",
"status": "affected",
"version": "6.3.0.0",
"versionType": "custom"
},
{
"lessThan": "6.4.0.1",
"status": "affected",
"version": "6.4.0.0",
"versionType": "custom"
},
{
"lessThan": "6.5.0.6",
"status": "affected",
"version": "6.5.0.0",
"versionType": "custom"
},
{
"lessThan": "6.6.0.11",
"status": "affected",
"version": "6.6.0.0",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "WSO2 IS as Key Manager",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "5.5.0.0",
"status": "unknown",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "5.5.0.1",
"status": "affected",
"version": "5.5.0.0",
"versionType": "custom"
},
{
"lessThan": "5.6.0.1",
"status": "affected",
"version": "5.6.0.0",
"versionType": "custom"
},
{
"lessThan": "5.7.0.1",
"status": "affected",
"version": "5.7.0.0",
"versionType": "custom"
},
{
"lessThan": "5.9.0.1",
"status": "affected",
"version": "5.9.0.0",
"versionType": "custom"
},
{
"lessThan": "5.10.0.1",
"status": "affected",
"version": "5.10.0.0",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "WSO2 Identity Server",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "5.4.0.0",
"status": "unknown",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "5.4.0.4",
"status": "affected",
"version": "5.4.0.0",
"versionType": "custom"
},
{
"lessThan": "5.4.1.3",
"status": "affected",
"version": "5.4.1.0",
"versionType": "custom"
},
{
"lessThan": "5.5.0.1",
"status": "affected",
"version": "5.5.0.0",
"versionType": "custom"
},
{
"lessThan": "5.6.0.1",
"status": "affected",
"version": "5.6.0.0",
"versionType": "custom"
},
{
"lessThan": "5.7.0.1",
"status": "affected",
"version": "5.7.0.0",
"versionType": "custom"
},
{
"lessThan": "5.8.0.5",
"status": "affected",
"version": "5.8.0.0",
"versionType": "custom"
},
{
"lessThan": "5.9.0.1",
"status": "affected",
"version": "5.9.0.0",
"versionType": "custom"
},
{
"lessThan": "5.10.0.1",
"status": "affected",
"version": "5.10.0.0",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "WSO2 Identity Server Analytics",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "5.4.0.0",
"status": "unknown",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "5.4.0.2",
"status": "affected",
"version": "5.4.0.0",
"versionType": "custom"
},
{
"lessThan": "5.4.1.2",
"status": "affected",
"version": "5.4.1.0",
"versionType": "custom"
},
{
"lessThan": "5.5.0.1",
"status": "affected",
"version": "5.5.0.0",
"versionType": "custom"
},
{
"lessThan": "5.6.0.1",
"status": "affected",
"version": "5.6.0.0",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "WSO2 Message Broker",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "3.2.0.0",
"status": "unknown",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "3.2.0.3",
"status": "affected",
"version": "3.2.0.0",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/",
"refsource": "MISC",
"name": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.<br><br>Community users may apply the relevant fixes to the product based on the public fix(s) advertised in&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/\">https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1...</a><br>"
}
],
"value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/ \n"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6912",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}