"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-09-08 17:00:35 +00:00
parent f55ad4719f
commit aebcf2f038
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
26 changed files with 590 additions and 32 deletions

View File

@ -56,6 +56,11 @@
"url": "https://github.com/erinxocon/requests-xml/issues/7",
"refsource": "MISC",
"name": "https://github.com/erinxocon/requests-xml/issues/7"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230908-0003/",
"url": "https://security.netapp.com/advisory/ntap-20230908-0003/"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime (APR) version 1.7.0."
"value": "Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer.\nThis issue affects Apache Portable Runtime (APR) version 1.7.0."
}
]
},
@ -40,8 +40,8 @@
"version": {
"version_data": [
{
"version_value": "1.7.0",
"version_affected": "="
"version_affected": "=",
"version_value": "1.7.0"
}
]
}
@ -58,6 +58,11 @@
"url": "https://lists.apache.org/thread/fw9p6sdncwsjkstwc066vz57xqzfksq9",
"refsource": "MISC",
"name": "https://lists.apache.org/thread/fw9p6sdncwsjkstwc066vz57xqzfksq9"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0008/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0008/"
}
]
},

View File

@ -71,6 +71,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20230130 [SECURITY] [DLA 3299-1] node-qs security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00039.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230908-0005/",
"url": "https://security.netapp.com/advisory/ntap-20230908-0005/"
}
]
}

View File

@ -73,6 +73,11 @@
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb",
"refsource": "MISC",
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0006/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0006/"
}
]
},

View File

@ -57,6 +57,11 @@
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22407",
"refsource": "MISC",
"name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22407"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0007/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0007/"
}
]
},

View File

@ -58,6 +58,11 @@
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22407",
"refsource": "MISC",
"name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22407"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0007/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0007/"
}
]
},

View File

@ -58,6 +58,11 @@
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22379",
"refsource": "MISC",
"name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22379"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0007/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0007/"
}
]
},

View File

@ -58,6 +58,11 @@
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22380",
"refsource": "MISC",
"name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22380"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0007/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0007/"
}
]
},

View File

@ -58,6 +58,11 @@
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22408",
"refsource": "MISC",
"name": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22408"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0007/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0007/"
}
]
},

View File

@ -58,6 +58,11 @@
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22381",
"refsource": "MISC",
"name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22381"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0007/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0007/"
}
]
},

View File

@ -58,6 +58,11 @@
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22384",
"refsource": "MISC",
"name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22384"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0007/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0007/"
}
]
},

View File

@ -58,6 +58,11 @@
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22385",
"refsource": "MISC",
"name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22385"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0007/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0007/"
}
]
},

View File

@ -67,6 +67,11 @@
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22388",
"refsource": "MISC",
"name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22388"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0007/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0007/"
}
]
},

View File

@ -58,6 +58,11 @@
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22389",
"refsource": "MISC",
"name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22389"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0007/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0007/"
}
]
},

View File

@ -58,6 +58,11 @@
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22390",
"refsource": "MISC",
"name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22390"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0007/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0007/"
}
]
},

View File

@ -71,6 +71,11 @@
"refsource": "CONFIRM",
"name": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd",
"url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230908-0004/",
"url": "https://security.netapp.com/advisory/ntap-20230908-0004/"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-38573",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -1,18 +1,90 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-39318",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@golang.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The html/template package does not properly handle HTML-like \"\" comment tokens, nor hashbang \"#!\" comment tokens, in <script> contexts. This may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack."
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Go standard library",
"product": {
"product_data": [
{
"product_name": "html/template",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.20.8"
},
{
"version_affected": "<",
"version_name": "1.21.0-0",
"version_value": "1.21.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://go.dev/issue/62196",
"refsource": "MISC",
"name": "https://go.dev/issue/62196"
},
{
"url": "https://go.dev/cl/526156",
"refsource": "MISC",
"name": "https://go.dev/cl/526156"
},
{
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"refsource": "MISC",
"name": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2041",
"refsource": "MISC",
"name": "https://pkg.go.dev/vuln/GO-2023-2041"
}
]
},
"credits": [
{
"lang": "en",
"value": "Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.)"
}
]
}

View File

@ -1,18 +1,90 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-39319",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@golang.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The html/template package does not apply the proper rules for handling occurrences of \"<script\", \"<!--\", and \"</script\" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack."
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Go standard library",
"product": {
"product_data": [
{
"product_name": "html/template",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.20.8"
},
{
"version_affected": "<",
"version_name": "1.21.0-0",
"version_value": "1.21.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://go.dev/issue/62197",
"refsource": "MISC",
"name": "https://go.dev/issue/62197"
},
{
"url": "https://go.dev/cl/526157",
"refsource": "MISC",
"name": "https://go.dev/cl/526157"
},
{
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"refsource": "MISC",
"name": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2043",
"refsource": "MISC",
"name": "https://pkg.go.dev/vuln/GO-2023-2043"
}
]
},
"credits": [
{
"lang": "en",
"value": "Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.)"
}
]
}

View File

@ -1,18 +1,85 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-39320",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@golang.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software."
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-94: Improper Control of Generation of Code ('Code Injection')"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Go toolchain",
"product": {
"product_data": [
{
"product_name": "cmd/go",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1.21.0-0",
"version_value": "1.21.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://go.dev/issue/62198",
"refsource": "MISC",
"name": "https://go.dev/issue/62198"
},
{
"url": "https://go.dev/cl/526158",
"refsource": "MISC",
"name": "https://go.dev/cl/526158"
},
{
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"refsource": "MISC",
"name": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2042",
"refsource": "MISC",
"name": "https://pkg.go.dev/vuln/GO-2023-2042"
}
]
},
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
]
}

View File

@ -1,18 +1,90 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-39321",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@golang.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Processing an incomplete post-handshake message for a QUIC connection can cause a panic."
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Go standard library",
"product": {
"product_data": [
{
"product_name": "crypto/tls",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.20.8"
},
{
"version_affected": "<",
"version_name": "1.21.0-0",
"version_value": "1.21.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://go.dev/issue/62266",
"refsource": "MISC",
"name": "https://go.dev/issue/62266"
},
{
"url": "https://go.dev/cl/523039",
"refsource": "MISC",
"name": "https://go.dev/cl/523039"
},
{
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"refsource": "MISC",
"name": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2044",
"refsource": "MISC",
"name": "https://pkg.go.dev/vuln/GO-2023-2044"
}
]
},
"credits": [
{
"lang": "en",
"value": "Marten Seemann"
}
]
}

View File

@ -1,18 +1,90 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-39322",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@golang.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size."
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Go standard library",
"product": {
"product_data": [
{
"product_name": "crypto/tls",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.20.8"
},
{
"version_affected": "<",
"version_name": "1.21.0-0",
"version_value": "1.21.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://go.dev/issue/62266",
"refsource": "MISC",
"name": "https://go.dev/issue/62266"
},
{
"url": "https://go.dev/cl/523039",
"refsource": "MISC",
"name": "https://go.dev/cl/523039"
},
{
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"refsource": "MISC",
"name": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2045",
"refsource": "MISC",
"name": "https://pkg.go.dev/vuln/GO-2023-2045"
}
]
},
"credits": [
{
"lang": "en",
"value": "Marten Seemann"
}
]
}

View File

@ -192,6 +192,11 @@
"url": "http://www.openwall.com/lists/oss-security/2023/08/25/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/08/25/4"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0001/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0001/"
}
]
},

View File

@ -69,6 +69,11 @@
"url": "https://www.debian.org/security/2023/dsa-5480",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5480"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0002/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230908-0002/"
}
]
},

View File

@ -1,17 +1,94 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-4843",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@pega.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Pega Platform versions 7.1 to 8.8.3 are affected by an HTML Injection issue with a name field utilized in Visual Business Director, however this field can only be modified by an authenticated administrative user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')",
"cweId": "CWE-74"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Pegasystems",
"product": {
"product_data": [
{
"product_name": "Pega Platform",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "7.1",
"version_value": "8.8.4"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://support.pega.com/support-doc/pega-security-advisory-%E2%80%93-d23-vulnerability-remediation-note?",
"refsource": "MISC",
"name": "https://support.pega.com/support-doc/pega-security-advisory-%E2%80%93-d23-vulnerability-remediation-note?"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "Iulian Florea"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-4853",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}