diff --git a/2023/1xxx/CVE-2023-1626.json b/2023/1xxx/CVE-2023-1626.json index 03f085fe658..2f494f2e35c 100644 --- a/2023/1xxx/CVE-2023-1626.json +++ b/2023/1xxx/CVE-2023-1626.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-1626", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Jianming Antivirus 16.2.2022.418. It has been declared as critical. This vulnerability affects unknown code in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224008." + }, + { + "lang": "deu", + "value": "In Jianming Antivirus 16.2.2022.418 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Dabei geht es um eine nicht genauer bekannte Funktion in der Bibliothek kvcore.sys der Komponente IoControlCode Handler. Durch Manipulation mit unbekannten Daten kann eine memory corruption-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119 Memory Corruption", + "cweId": "CWE-119" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jianming", + "product": { + "product_data": [ + { + "product_name": "Antivirus", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "16.2.2022.418" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.224008", + "refsource": "MISC", + "name": "https://vuldb.com/?id.224008" + }, + { + "url": "https://vuldb.com/?ctiid.224008", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.224008" + }, + { + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned31", + "refsource": "MISC", + "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned31" + }, + { + "url": "https://drive.google.com/file/d/1soMFXUAYkCttFDA_icry6q-irb2jdAxw/view", + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1soMFXUAYkCttFDA_icry6q-irb2jdAxw/view" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.3, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.3, + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4.3, + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/1xxx/CVE-2023-1627.json b/2023/1xxx/CVE-2023-1627.json index 32cced6d0e8..04832871bb0 100644 --- a/2023/1xxx/CVE-2023-1627.json +++ b/2023/1xxx/CVE-2023-1627.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-1627", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Jianming Antivirus 16.2.2022.418. It has been rated as problematic. This issue affects some unknown processing in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier VDB-224009 was assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in Jianming Antivirus 16.2.2022.418 ausgemacht. Sie wurde als problematisch eingestuft. Hierbei geht es um eine nicht exakt ausgemachte Funktion in der Bibliothek kvcore.sys der Komponente IoControlCode Handler. Mittels dem Manipulieren mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-404 Denial of Service", + "cweId": "CWE-404" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jianming", + "product": { + "product_data": [ + { + "product_name": "Antivirus", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "16.2.2022.418" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.224009", + "refsource": "MISC", + "name": "https://vuldb.com/?id.224009" + }, + { + "url": "https://vuldb.com/?ctiid.224009", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.224009" + }, + { + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned29", + "refsource": "MISC", + "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned29" + }, + { + "url": "https://drive.google.com/file/d/1fQFw8ayQUFzJM2_4V-ld8CN8gvisVoiu/view", + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1fQFw8ayQUFzJM2_4V-ld8CN8gvisVoiu/view" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.5, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.5, + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4.6, + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/1xxx/CVE-2023-1628.json b/2023/1xxx/CVE-2023-1628.json index 7e834eca1b6..61829cd09c2 100644 --- a/2023/1xxx/CVE-2023-1628.json +++ b/2023/1xxx/CVE-2023-1628.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-1628", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as problematic has been found in Jianming Antivirus 16.2.2022.418. Affected is an unknown function in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. VDB-224010 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Es wurde eine problematische Schwachstelle in Jianming Antivirus 16.2.2022.418 entdeckt. Es betrifft eine unbekannte Funktion in der Bibliothek kvcore.sys der Komponente IoControlCode Handler. Mittels Manipulieren mit unbekannten Daten kann eine null pointer dereference-Schwachstelle ausgenutzt werden. Der Angriff hat dabei lokal zu erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476 NULL Pointer Dereference", + "cweId": "CWE-476" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jianming", + "product": { + "product_data": [ + { + "product_name": "Antivirus", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "16.2.2022.418" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.224010", + "refsource": "MISC", + "name": "https://vuldb.com/?id.224010" + }, + { + "url": "https://vuldb.com/?ctiid.224010", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.224010" + }, + { + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned30", + "refsource": "MISC", + "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned30" + }, + { + "url": "https://drive.google.com/file/d/1Div9mElTdsluLrU2etziLYqmXcqQFj1j/view", + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1Div9mElTdsluLrU2etziLYqmXcqQFj1j/view" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.5, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.5, + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4.6, + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/1xxx/CVE-2023-1630.json b/2023/1xxx/CVE-2023-1630.json index 04f4818d0a8..489ee3fb517 100644 --- a/2023/1xxx/CVE-2023-1630.json +++ b/2023/1xxx/CVE-2023-1630.json @@ -1,17 +1,110 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-1630", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as problematic, has been found in Jianming Antivirus 16.2.2022.418. Affected by this issue is some unknown functionality in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224012." + }, + { + "lang": "deu", + "value": "Eine problematische Schwachstelle wurde in Jianming Antivirus 16.2.2022.418 entdeckt. Dies betrifft einen unbekannten Teil in der Bibliothek kvcore.sys der Komponente IoControlCode Handler. Durch Manipulieren mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-404 Denial of Service", + "cweId": "CWE-404" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jianming", + "product": { + "product_data": [ + { + "product_name": "Antivirus", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "16.2.2022.418" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned29", + "refsource": "MISC", + "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned29" + }, + { + "url": "https://drive.google.com/file/d/1fQFw8ayQUFzJM2_4V-ld8CN8gvisVoiu/view", + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1fQFw8ayQUFzJM2_4V-ld8CN8gvisVoiu/view" + }, + { + "url": "https://vuldb.com/?id.224012", + "refsource": "MISC", + "name": "https://vuldb.com/?id.224012" + }, + { + "url": "https://vuldb.com/?ctiid.224012", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.224012" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Zeze7w (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.5, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.5, + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4.6, + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/1xxx/CVE-2023-1631.json b/2023/1xxx/CVE-2023-1631.json index 20bc2f0a6e0..2c98a0ef7cb 100644 --- a/2023/1xxx/CVE-2023-1631.json +++ b/2023/1xxx/CVE-2023-1631.json @@ -1,17 +1,110 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-1631", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as problematic, was found in Jianming Antivirus 16.2.2022.418. This affects an unknown part in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-224013 was assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Es wurde eine problematische Schwachstelle in Jianming Antivirus 16.2.2022.418 gefunden. Dabei betrifft es einen unbekannter Codeteil in der Bibliothek kvcore.sys der Komponente IoControlCode Handler. Durch das Beeinflussen mit unbekannten Daten kann eine null pointer dereference-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476 NULL Pointer Dereference", + "cweId": "CWE-476" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jianming", + "product": { + "product_data": [ + { + "product_name": "Antivirus", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "16.2.2022.418" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned30", + "refsource": "MISC", + "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned30" + }, + { + "url": "https://drive.google.com/file/d/1Div9mElTdsluLrU2etziLYqmXcqQFj1j/view", + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1Div9mElTdsluLrU2etziLYqmXcqQFj1j/view" + }, + { + "url": "https://vuldb.com/?id.224013", + "refsource": "MISC", + "name": "https://vuldb.com/?id.224013" + }, + { + "url": "https://vuldb.com/?ctiid.224013", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.224013" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Zeze7w (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.5, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.5, + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4.6, + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "baseSeverity": "MEDIUM" } ] }