"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-08-01 02:00:34 +00:00
parent 3663985a28
commit ad7a8043ce
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
15 changed files with 307 additions and 51 deletions

View File

@ -1,17 +1,66 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-10962",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2020-10962",
"STATE": "PUBLIC"
}, },
"description": { "affects": {
"description_data": [ "vendor": {
"vendor_data": [
{ {
"lang": "eng", "product": {
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PowerShell App Deployment Toolkit (aka PSAppDeployToolkit) through 3.8.0, an incorrect access control vulnerability in the default configuration may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/PSAppDeployToolkit/PSAppDeployToolkit/releases",
"refsource": "MISC",
"name": "https://github.com/PSAppDeployToolkit/PSAppDeployToolkit/releases"
},
{
"refsource": "MISC",
"name": "https://discourse.psappdeploytoolkit.com/t/psappdeploytoolkit-3-8-2/2555",
"url": "https://discourse.psappdeploytoolkit.com/t/psappdeploytoolkit-3-8-2/2555"
} }
] ]
} }

View File

@ -34,7 +34,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A remote command execution (RCE) vulnerability in the web interface component of Furukawa 423-41W/AC before v1.1.4 and LD421-21W before v1.3.3 allows unauthenticated attackers to send arbitrary commands to the device via unspecified vectors." "value": "A remote command execution (RCE) vulnerability in the web interface component of Furukawa Electric LatAM 423-41W/AC before v1.1.4 and LD421-21W before v1.3.3 allows unauthenticated attackers to send arbitrary commands to the device via unspecified vectors."
} }
] ]
}, },

View File

@ -61,6 +61,11 @@
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/467", "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/467",
"refsource": "MISC", "refsource": "MISC",
"name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/467" "name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/467"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
} }
] ]
} }

View File

@ -61,6 +61,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230706-0009/", "name": "https://security.netapp.com/advisory/ntap-20230706-0009/",
"url": "https://security.netapp.com/advisory/ntap-20230706-0009/" "url": "https://security.netapp.com/advisory/ntap-20230706-0009/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
} }
] ]
} }

View File

@ -61,6 +61,11 @@
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/473", "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/473",
"refsource": "MISC", "refsource": "MISC",
"name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/473" "name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/473"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
} }
] ]
} }

View File

@ -194,6 +194,11 @@
"url": "https://security.netapp.com/advisory/ntap-20230731-0004/", "url": "https://security.netapp.com/advisory/ntap-20230731-0004/",
"refsource": "MISC", "refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230731-0004/" "name": "https://security.netapp.com/advisory/ntap-20230731-0004/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
} }
] ]
}, },

View File

@ -56,6 +56,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://github.com/zmanda/amanda/releases/tag/tag-community-3.5.4", "name": "https://github.com/zmanda/amanda/releases/tag/tag-community-3.5.4",
"url": "https://github.com/zmanda/amanda/releases/tag/tag-community-3.5.4" "url": "https://github.com/zmanda/amanda/releases/tag/tag-community-3.5.4"
},
{
"refsource": "MISC",
"name": "https://github.com/zmanda/amanda/security/advisories/GHSA-crrw-v393-h5q3",
"url": "https://github.com/zmanda/amanda/security/advisories/GHSA-crrw-v393-h5q3"
} }
] ]
} }

View File

@ -1,17 +1,66 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2023-34960",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2023-34960",
"STATE": "PUBLIC"
}, },
"description": { "affects": {
"description_data": [ "vendor": {
"vendor_data": [
{ {
"lang": "eng", "product": {
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://chamilo.com",
"refsource": "MISC",
"name": "http://chamilo.com"
},
{
"refsource": "MISC",
"name": "https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-112-2023-04-20-Critical-impact-High-risk-Remote-Code-Execution",
"url": "https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-112-2023-04-20-Critical-impact-High-risk-Remote-Code-Execution"
} }
] ]
} }

View File

@ -11,11 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Microsoft is investigating reports of a series of remote code execution vulnerabilities impacting Windows and Office products. Microsoft is aware of targeted attacks that attempt to exploit these vulnerabilities by using specially-crafted Microsoft Office documents.\n\nAn attacker could create a specially crafted Microsoft Office document that enables them to perform remote code execution in the context of the victim. However, an attacker would have to convince the victim to open the malicious file.\n\nUpon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This might include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.\n\nPlease see the Microsoft Threat Intelligence Blog https://aka.ms/Storm-0978 \u00a0Entry for important information about steps you can take to protect your system from this vulnerability.\n\nThis CVE will be updated with new information and links to security updates when they become available.\n\n" "value": "Microsoft is investigating reports of a series of remote code execution vulnerabilities impacting Windows and Office products. Microsoft is aware of targeted attacks that attempt to exploit these vulnerabilities by using specially-crafted Microsoft Office documents.\n\nAn attacker could create a specially crafted Microsoft Office document that enables them to perform remote code execution in the context of the victim. However, an attacker would have to convince the victim to open the malicious file.\n\nUpon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This might include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.\n\nPlease see the Microsoft Threat Intelligence Blog Entry https://aka.ms/Storm-0978 for important information about steps you can take to protect your system from this vulnerability.\n\nThis CVE will be updated with new information and links to security updates when they become available. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this CVE. See Microsoft Technical Security Notifications https://www.microsoft.com/en-us/msrc/technical-security-notifications .\n\n"
},
{
"lang": "eng",
"value": "CVE-2023-36884\n\n"
} }
] ]
}, },
@ -274,8 +270,9 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "=", "version_affected": "<",
"version_value": "N/A" "version_name": "19.0.0",
"version_value": "https://aka.ms/OfficeSecurityReleases"
} }
] ]
} }
@ -285,41 +282,33 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "=", "version_affected": "<",
"version_value": "N/A" "version_name": "16.0.1",
"version_value": "https://aka.ms/OfficeSecurityReleases"
} }
] ]
} }
}, },
{ {
"product_name": "Microsoft Word 2016", "product_name": "Microsoft Office 2016",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "=", "version_affected": "<",
"version_value": "N/A" "version_name": "16.0.0",
"version_value": "16.0.5408.1001"
} }
] ]
} }
}, },
{ {
"product_name": "Microsoft Word 2013 Service Pack 1", "product_name": "Microsoft Office 2013 Service Pack 1",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "=", "version_affected": "<",
"version_value": "N/A" "version_name": "15.0.0",
} "version_value": "15.0.5579.1001"
]
}
},
{
"product_name": "Microsoft Word 2013 Service Pack 1 ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "N/A"
} }
] ]
} }

View File

@ -1,17 +1,66 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2023-36983",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2023-36983",
"STATE": "PUBLIC"
}, },
"description": { "affects": {
"description_data": [ "vendor": {
"vendor_data": [
{ {
"lang": "eng", "product": {
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "LavaLite CMS v 9.0.0 is vulnerable to Sensitive Data Exposure."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/LavaLite/cms",
"refsource": "MISC",
"name": "https://github.com/LavaLite/cms"
},
{
"refsource": "MISC",
"name": "https://github.com/M19O/Security-Advisories/tree/main/CVE-2023-36983",
"url": "https://github.com/M19O/Security-Advisories/tree/main/CVE-2023-36983"
} }
] ]
} }

View File

@ -1,17 +1,66 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2023-36984",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2023-36984",
"STATE": "PUBLIC"
}, },
"description": { "affects": {
"description_data": [ "vendor": {
"vendor_data": [
{ {
"lang": "eng", "product": {
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "LavaLite CMS v 9.0.0 is vulnerable to Sensitive Data Exposure."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/LavaLite/cms",
"refsource": "MISC",
"name": "https://github.com/LavaLite/cms"
},
{
"refsource": "MISC",
"name": "https://github.com/M19O/Security-Advisories/tree/main/CVE-2023-36984",
"url": "https://github.com/M19O/Security-Advisories/tree/main/CVE-2023-36984"
} }
] ]
} }

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-39415",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-39416",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -69,6 +69,11 @@
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/468", "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/468",
"refsource": "MISC", "refsource": "MISC",
"name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/468" "name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/468"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
} }
] ]
}, },

View File

@ -174,6 +174,11 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215865",
"refsource": "MISC", "refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2215865" "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2215865"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
} }
] ]
}, },