From c6df0049f55552a3e210e8ef9a7a76aabfba19aa Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 19 Jul 2023 06:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/24xxx/CVE-2022-24834.json | 5 ++ 2023/0xxx/CVE-2023-0003.json | 83 ++++++++++++++++++++++------- 2023/30xxx/CVE-2023-30589.json | 5 ++ 2023/32xxx/CVE-2023-32635.json | 58 ++++++++++++++++++-- 2023/36xxx/CVE-2023-36824.json | 5 ++ 2023/38xxx/CVE-2023-38523.json | 18 +++++++ 2023/3xxx/CVE-2023-3760.json | 96 ++++++++++++++++++++++++++++++++-- 2023/3xxx/CVE-2023-3761.json | 96 ++++++++++++++++++++++++++++++++-- 8 files changed, 335 insertions(+), 31 deletions(-) create mode 100644 2023/38xxx/CVE-2023-38523.json diff --git a/2022/24xxx/CVE-2022-24834.json b/2022/24xxx/CVE-2022-24834.json index e51bf3dbd21..a4f38ef0be2 100644 --- a/2022/24xxx/CVE-2022-24834.json +++ b/2022/24xxx/CVE-2022-24834.json @@ -80,6 +80,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDNNH2ONMVNBQ6LUIAOAGDNFPKXNST5K/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDNNH2ONMVNBQ6LUIAOAGDNFPKXNST5K/" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIF5MAGYARYUMRFK7PQI7HYXMK2HZE5T/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIF5MAGYARYUMRFK7PQI7HYXMK2HZE5T/" } ] }, diff --git a/2023/0xxx/CVE-2023-0003.json b/2023/0xxx/CVE-2023-0003.json index f53a2fc1fa4..24b6b87b9e2 100644 --- a/2023/0xxx/CVE-2023-0003.json +++ b/2023/0xxx/CVE-2023-0003.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A file disclosure vulnerability in the Palo Alto Networks Cortex XSOAR server software enables an authenticated user with access to the web interface to read local files from the server." + "value": "A file disclosure vulnerability in the Palo Alto Networks Cortex XSOAR server software enables an authenticated user with access to the web interface to read local files from the server.\n" } ] }, @@ -40,24 +40,64 @@ "version": { "version_data": [ { - "version_value": "8.1 All", - "version_affected": "!" - }, - { - "version_value": "6.10.0.0", - "version_affected": "=" - }, - { - "version_value": "6.9", - "version_affected": "=" - }, - { - "version_value": "6.8", - "version_affected": "=" - }, - { - "version_value": "6.6", - "version_affected": "=" + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "unaffected", + "version": "8.1 All" + }, + { + "changes": [ + { + "at": "6.10.0.185964", + "status": "unaffected" + } + ], + "lessThan": "6.10.0.185964", + "status": "affected", + "version": "6.10.0.0", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "6.9.B185415", + "status": "unaffected" + } + ], + "lessThan": "6.9.B185415", + "status": "affected", + "version": "6.9", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "6.8.B185719", + "status": "unaffected" + } + ], + "lessThan": "6.8.B185719", + "status": "affected", + "version": "6.8", + "versionType": "custom" + }, + { + "changes": [ + { + "at": "6.6.B186115", + "status": "unaffected" + } + ], + "lessThan": "6.6.B186115", + "status": "affected", + "version": "6.6", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } } ] } @@ -74,6 +114,11 @@ "url": "https://security.paloaltonetworks.com/CVE-2023-0003", "refsource": "MISC", "name": "https://security.paloaltonetworks.com/CVE-2023-0003" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEEQIN5242K5NBE2CZ4DYTNA5B4YTYE5/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEEQIN5242K5NBE2CZ4DYTNA5B4YTYE5/" } ] }, diff --git a/2023/30xxx/CVE-2023-30589.json b/2023/30xxx/CVE-2023-30589.json index 1429b9e278c..e2ca5d5ff7b 100644 --- a/2023/30xxx/CVE-2023-30589.json +++ b/2023/30xxx/CVE-2023-30589.json @@ -68,6 +68,11 @@ "url": "https://hackerone.com/reports/2001873", "refsource": "MISC", "name": "https://hackerone.com/reports/2001873" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEEQIN5242K5NBE2CZ4DYTNA5B4YTYE5/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEEQIN5242K5NBE2CZ4DYTNA5B4YTYE5/" } ] } diff --git a/2023/32xxx/CVE-2023-32635.json b/2023/32xxx/CVE-2023-32635.json index 25a4cf954ca..8591b521128 100644 --- a/2023/32xxx/CVE-2023-32635.json +++ b/2023/32xxx/CVE-2023-32635.json @@ -1,17 +1,67 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-32635", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "XBRL data create application version 7.0 and earlier improperly restricts XML external entity references (XXE). By processing a specially crafted XBRL file, arbitrary files on the system may be read by an attacker." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "XML external entities (XXE)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Financial Services Agency", + "product": { + "product_data": [ + { + "product_name": "XBRL data create application", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "version 7.0 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://submit2.edinet-fsa.go.jp/", + "refsource": "MISC", + "name": "https://submit2.edinet-fsa.go.jp/" + }, + { + "url": "https://jvn.jp/en/jp/JVN44726469/", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN44726469/" } ] } diff --git a/2023/36xxx/CVE-2023-36824.json b/2023/36xxx/CVE-2023-36824.json index f1517329ace..d96446177b0 100644 --- a/2023/36xxx/CVE-2023-36824.json +++ b/2023/36xxx/CVE-2023-36824.json @@ -77,6 +77,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDNNH2ONMVNBQ6LUIAOAGDNFPKXNST5K/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDNNH2ONMVNBQ6LUIAOAGDNFPKXNST5K/" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIF5MAGYARYUMRFK7PQI7HYXMK2HZE5T/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIF5MAGYARYUMRFK7PQI7HYXMK2HZE5T/" } ] }, diff --git a/2023/38xxx/CVE-2023-38523.json b/2023/38xxx/CVE-2023-38523.json new file mode 100644 index 00000000000..b312b1c9454 --- /dev/null +++ b/2023/38xxx/CVE-2023-38523.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-38523", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3760.json b/2023/3xxx/CVE-2023-3760.json index 565abb811ef..66548569277 100644 --- a/2023/3xxx/CVE-2023-3760.json +++ b/2023/3xxx/CVE-2023-3760.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-3760", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been found in Intergard SGS 8.7.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Change Password Handler. The manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-234445 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "In Intergard SGS 8.7.0 wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Es geht um eine nicht n\u00e4her bekannte Funktion der Komponente Change Password Handler. Mit der Manipulation mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-404 Denial of Service", + "cweId": "CWE-404" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Intergard", + "product": { + "product_data": [ + { + "product_name": "SGS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "8.7.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.234445", + "refsource": "MISC", + "name": "https://vuldb.com/?id.234445" + }, + { + "url": "https://vuldb.com/?ctiid.234445", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.234445" + }, + { + "url": "https://youtu.be/CtOFB-L1rOg", + "refsource": "MISC", + "name": "https://youtu.be/CtOFB-L1rOg" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "hiagomoura (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 4.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 4.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/3xxx/CVE-2023-3761.json b/2023/3xxx/CVE-2023-3761.json index 267399376d3..13ef1f48e26 100644 --- a/2023/3xxx/CVE-2023-3761.json +++ b/2023/3xxx/CVE-2023-3761.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-3761", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Intergard SGS 8.7.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Password Change Handler. The manipulation leads to cleartext transmission of sensitive information. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. VDB-234446 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in Intergard SGS 8.7.0 gefunden. Sie wurde als problematisch eingestuft. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion der Komponente Password Change Handler. Durch die Manipulation mit unbekannten Daten kann eine cleartext transmission of sensitive information-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie ist schwierig ausnutzbar. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-319 Cleartext Transmission of Sensitive Information", + "cweId": "CWE-319" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Intergard", + "product": { + "product_data": [ + { + "product_name": "SGS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "8.7.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.234446", + "refsource": "MISC", + "name": "https://vuldb.com/?id.234446" + }, + { + "url": "https://vuldb.com/?ctiid.234446", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.234446" + }, + { + "url": "https://youtu.be/bMJwSCps0Lc", + "refsource": "MISC", + "name": "https://youtu.be/bMJwSCps0Lc" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "hiagomoura (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.7, + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.7, + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 2.6, + "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseSeverity": "LOW" } ] }