"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-02-06 07:00:35 +00:00
parent 1fabe1bd39
commit c3dab32f91
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
13 changed files with 284 additions and 22 deletions

View File

@ -39,9 +39,14 @@
"product_name": "BSAFE SSL-J",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "6.5"
},
{
"version_affected": "=",
"version_value": "All versions before 6.5, 7.0"
"version_value": "7.0"
}
]
}

View File

@ -1,17 +1,94 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-25543",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@dell.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "\nDell Power Manager, versions prior to 3.14, contain an Improper Authorization vulnerability in DPM service. A low privileged malicious user could potentially exploit this vulnerability in order to elevate privileges on the system. \n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-280: Improper Handling of Insufficient Permissions or Privileges",
"cweId": "CWE-280"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Dell",
"product": {
"product_data": [
{
"product_name": "Dell Power Manager (DPM)",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "3.14"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000209464/dsa-2023-075",
"refsource": "MISC",
"name": "https://www.dell.com/support/kbdoc/en-us/000209464/dsa-2023-075"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "Cedric Van Bockhaven"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,94 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28049",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@dell.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "\nDell Command | Monitor, versions prior to 10.9, contain an arbitrary folder deletion vulnerability. A locally authenticated malicious user may exploit this vulnerability in order to perform a privileged arbitrary file delete.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-267: Privilege Defined With Unsafe Actions",
"cweId": "CWE-267"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Dell",
"product": {
"product_data": [
{
"product_name": "Dell Command Monitor (DCM)",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "0",
"version_value": "10.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000211748/dsa-2023-125-dell-command-monitor-dcm",
"refsource": "MISC",
"name": "https://www.dell.com/support/kbdoc/en-us/000211748/dsa-2023-125-dell-command-monitor-dcm"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "ycdxsb"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "An issue discovered in Craft CMS version 4.6.1. allows remote attackers to cause a denial of service (DoS) via crafted string to Feed-Me Name and Feed-Me URL fields due to saving a feed using an Asset element type with no volume selected."
"value": "** DISPUTED ** An issue was discovered in the Feed Me plugin 4.6.1 for Craft CMS. It allows remote attackers to cause a denial of service (DoS) via crafted strings to Feed-Me Name and Feed-Me URL fields, due to saving a feed using an Asset element type with no volume selected. NOTE: this is not a report about code provided by the Craft CMS product; it is only a report about the Feed Me plugin. NOTE: a third-party report states that commit b5d6ede51848349bd91bc95fec288b6793f15e28 has \"nothing to do with security.\""
}
]
},
@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://www.linkedin.com/pulse/threat-briefing-craftcms-amrcybersecurity-emi0e/?trackingId=E75GttWvQp6gfvPiJDDUBA%3D%3D",
"url": "https://www.linkedin.com/pulse/threat-briefing-craftcms-amrcybersecurity-emi0e/?trackingId=E75GttWvQp6gfvPiJDDUBA%3D%3D"
},
{
"refsource": "MISC",
"name": "https://github.com/craftcms/feed-me/commit/b5d6ede51848349bd91bc95fec288b6793f15e28",
"url": "https://github.com/craftcms/feed-me/commit/b5d6ede51848349bd91bc95fec288b6793f15e28"
}
]
}

View File

@ -40,8 +40,9 @@
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Versions prior to 1.2.1"
"version_affected": "<",
"version_name": "0",
"version_value": "1.2.1"
}
]
}

View File

@ -55,9 +55,9 @@
"references": {
"reference_data": [
{
"url": "https://github.com/line/centraldogma/commit/8edcf913b88101aff70008156b0881850e005783",
"url": "https://github.com/line/centraldogma/security/advisories/GHSA-34q3-p352-c7q8",
"refsource": "MISC",
"name": "https://github.com/line/centraldogma/commit/8edcf913b88101aff70008156b0881850e005783"
"name": "https://github.com/line/centraldogma/security/advisories/GHSA-34q3-p352-c7q8"
}
]
},

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-1249",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -40,8 +40,9 @@
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Version 5.3.0.0.5.120"
"version_affected": "<",
"version_name": "0",
"version_value": "5.3.0.0.5.120"
}
]
}

View File

@ -40,8 +40,9 @@
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "iSM 5.3.0.0 and prior"
"version_affected": "<=",
"version_name": "0",
"version_value": " iSM 5.2.0.0"
}
]
}

View File

@ -39,9 +39,24 @@
"product_name": "PowerScale OneFS",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "8.2.0",
"version_value": "8.2.2"
},
{
"version_affected": "<=",
"version_name": "9.0.0.0",
"version_value": "9.4.0.0"
},
{
"version_affected": "<=",
"version_name": "9.5.0.0",
"version_value": "9.5.0.6"
},
{
"version_affected": "=",
"version_value": "Versions 8.2.x through 9.6.0.x"
"version_value": "9.6.1.0"
}
]
}

View File

@ -39,9 +39,29 @@
"product_name": "NetWorker Module for Databases and Applications - Oracle",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "19.9",
"version_value": "19.9.0.3"
},
{
"version_affected": "<=",
"version_name": "19.8",
"version_value": "19.8.0.4"
},
{
"version_affected": "<=",
"version_name": "19.7",
"version_value": "19.7.0.5"
},
{
"version_affected": "=",
"version_value": "Versions 19.9 through 19.9.0.3, Versions 19.8 through 19.8.0.4, Versions 19.7 through 19.7.0.5, Version 19.7.1, Versions prior to 19.7"
"version_value": "19.7.1"
},
{
"version_affected": "<",
"version_name": "0",
"version_value": "19.7"
}
]
}

View File

@ -41,7 +41,39 @@
"version_data": [
{
"version_affected": "=",
"version_value": "Version 19.2.0, 19.3.0, 19.4.0, 19.5.0, 19.5.1, 19.6.0, 19.6.1, 19.6.2, 19.6.3"
"version_value": "19.2.0"
},
{
"version_affected": "=",
"version_value": "19.3.0"
},
{
"version_affected": "=",
"version_value": "19.4.0"
},
{
"version_affected": "=",
"version_value": "19.5.0"
},
{
"version_affected": "=",
"version_value": "19.5.1"
},
{
"version_affected": "=",
"version_value": "19.6.0"
},
{
"version_affected": "=",
"version_value": "19.6.1"
},
{
"version_affected": "=",
"version_value": "19.6.2"
},
{
"version_affected": "=",
"version_value": "19.6.3"
}
]
}

View File

@ -39,9 +39,19 @@
"product_name": " PowerScale OneFS",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "9.0.0.0",
"version_value": "9.4.0.0"
},
{
"version_affected": "<=",
"version_name": "9.5.0.0",
"version_value": "9.5.0.6"
},
{
"version_affected": "=",
"version_value": "Versions 9.0.0.x through 9.6.0.x"
"version_value": "9.6.1.0"
}
]
}