diff --git a/2015/6xxx/CVE-2015-6639.json b/2015/6xxx/CVE-2015-6639.json index 19f96251c1e..7d24a0ed576 100644 --- a/2015/6xxx/CVE-2015-6639.json +++ b/2015/6xxx/CVE-2015-6639.json @@ -66,6 +66,11 @@ "name": "http://source.android.com/security/bulletin/2016-01-01.html", "refsource": "CONFIRM", "url": "http://source.android.com/security/bulletin/2016-01-01.html" + }, + { + "refsource": "FULLDISC", + "name": "20230530 CVE-2022-48335 - Buffer Overflow in Widevine Trustlet (PRDiagVerifyProvisioning @ 0x5f90)", + "url": "http://seclists.org/fulldisclosure/2023/May/26" } ] } diff --git a/2015/6xxx/CVE-2015-6647.json b/2015/6xxx/CVE-2015-6647.json index a31a492aa9f..de41443974e 100644 --- a/2015/6xxx/CVE-2015-6647.json +++ b/2015/6xxx/CVE-2015-6647.json @@ -61,6 +61,11 @@ "name": "http://source.android.com/security/bulletin/2016-01-01.html", "refsource": "CONFIRM", "url": "http://source.android.com/security/bulletin/2016-01-01.html" + }, + { + "refsource": "FULLDISC", + "name": "20230530 CVE-2022-48335 - Buffer Overflow in Widevine Trustlet (PRDiagVerifyProvisioning @ 0x5f90)", + "url": "http://seclists.org/fulldisclosure/2023/May/26" } ] } diff --git a/2018/8xxx/CVE-2018-8661.json b/2018/8xxx/CVE-2018-8661.json index ad09e132d6e..e5c2d551cbb 100644 --- a/2018/8xxx/CVE-2018-8661.json +++ b/2018/8xxx/CVE-2018-8661.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-8661", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-8661", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none." } ] } diff --git a/2022/4xxx/CVE-2022-4947.json b/2022/4xxx/CVE-2022-4947.json new file mode 100644 index 00000000000..d197a2fadc4 --- /dev/null +++ b/2022/4xxx/CVE-2022-4947.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-4947", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2650.json b/2023/2xxx/CVE-2023-2650.json index 0fe8badcba1..4896063fb95 100644 --- a/2023/2xxx/CVE-2023-2650.json +++ b/2023/2xxx/CVE-2023-2650.json @@ -93,6 +93,11 @@ "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=853c5e56ee0b8650c73140816bb8b91d6163422c", "refsource": "MISC", "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=853c5e56ee0b8650c73140816bb8b91d6163422c" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/05/30/1", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2023/05/30/1" } ] }, diff --git a/2023/2xxx/CVE-2023-2968.json b/2023/2xxx/CVE-2023-2968.json index feec521b5b1..dd3b0510d8d 100644 --- a/2023/2xxx/CVE-2023-2968.json +++ b/2023/2xxx/CVE-2023-2968.json @@ -1,17 +1,83 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-2968", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@jfrog.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote attacker can trigger a denial of service in the socket.remoteAddress variable, by sending a crafted HTTP request. Usage of the undefined variable raises a TypeError exception.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-232", + "cweId": "CWE-232" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://research.jfrog.com/vulnerabilities/undefined-variable-usage-in-proxy-leads-to-remote-denial-of-service-xray-520917", + "refsource": "MISC", + "name": "https://research.jfrog.com/vulnerabilities/undefined-variable-usage-in-proxy-leads-to-remote-denial-of-service-xray-520917" + } + ] + }, + "source": { + "discovery": "EXTERNAL" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2023/2xxx/CVE-2023-2994.json b/2023/2xxx/CVE-2023-2994.json index 1a54133698f..14bb4dab63f 100644 --- a/2023/2xxx/CVE-2023-2994.json +++ b/2023/2xxx/CVE-2023-2994.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-2994", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This 2023 CVE was incorrectly assigned instead of a 2022 CVE." } ] } diff --git a/2023/2xxx/CVE-2023-2995.json b/2023/2xxx/CVE-2023-2995.json new file mode 100644 index 00000000000..0d5dc5891f8 --- /dev/null +++ b/2023/2xxx/CVE-2023-2995.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2995", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/32xxx/CVE-2023-32684.json b/2023/32xxx/CVE-2023-32684.json index cf8f31bdb54..15bcee16334 100644 --- a/2023/32xxx/CVE-2023-32684.json +++ b/2023/32xxx/CVE-2023-32684.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-32684", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Lima launches Linux virtual machines, typically on macOS, for running containerd. Prior to version 0.16.0, a virtual machine instance with a malicious disk image could read a single file on the host filesystem, even when no filesystem is mounted from the host. The official templates of Lima and the well-known third party products (Colima, Rancher Desktop, and Finch) are unlikely to be affected by this issue. To exploit this issue, the attacker has to embed the target file path (an absolute or a relative path from the instance directory) in a malicious disk image, as the qcow2 (or vmdk) backing file path string. As Lima refuses to run as the root, it is practically impossible for the attacker to read the entire host disk via `/dev/rdiskN`. Also, practically, the attacker cannot read at least the first 512 bytes (MBR) of the target file. The issue has been patched in Lima in version 0.16.0 by prohibiting using a backing file path in the VM base image." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-552: Files or Directories Accessible to External Parties", + "cweId": "CWE-552" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "lima-vm", + "product": { + "product_data": [ + { + "product_name": "lima", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 0.16.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/lima-vm/lima/security/advisories/GHSA-f7qw-jj9c-rpq9", + "refsource": "MISC", + "name": "https://github.com/lima-vm/lima/security/advisories/GHSA-f7qw-jj9c-rpq9" + }, + { + "url": "https://github.com/lima-vm/lima/commit/01dbd4d9cabe692afa4517be3995771f0ebb38a5", + "refsource": "MISC", + "name": "https://github.com/lima-vm/lima/commit/01dbd4d9cabe692afa4517be3995771f0ebb38a5" + }, + { + "url": "https://github.com/lima-vm/lima/releases/tag/v0.16.0", + "refsource": "MISC", + "name": "https://github.com/lima-vm/lima/releases/tag/v0.16.0" + } + ] + }, + "source": { + "advisory": "GHSA-f7qw-jj9c-rpq9", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2023/32xxx/CVE-2023-32689.json b/2023/32xxx/CVE-2023-32689.json index 4e0d1868849..ae4f0072c5b 100644 --- a/2023/32xxx/CVE-2023-32689.json +++ b/2023/32xxx/CVE-2023-32689.json @@ -1,17 +1,99 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-32689", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Versions prior to 5.4.4 and 6.1.1 are vulnerable to a phishing attack vulnerability that involves a user uploading malicious files. A malicious user could upload an HTML file to Parse Server via its public API. That HTML file would then be accessible at the internet domain at which Parse Server is hosted. The URL of the the uploaded HTML could be shared for phishing attacks. The HTML page may seem legitimate because it is served under the internet domain where Parse Server is hosted, which may be the same as a company's official website domain.\n\nAn additional security issue arises when the Parse JavaScript SDK is used. The SDK stores sessions in the internet browser's local storage, which usually restricts data access depending on the internet domain. A malicious HTML file could contain a script that retrieves the user's session token from local storage and then share it with the attacker.\n\nThe fix included in versions 5.4.4 and 6.1.1 adds a new Parse Server option `fileUpload.fileExtensions` to restrict file upload on Parse Server by file extension. It is recommended to restrict file upload for HTML file extensions, which this fix disables by default. If an app requires upload of files with HTML file extensions, the option can be set to `['.*']` or another custom value to override the default." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-434: Unrestricted Upload of File with Dangerous Type", + "cweId": "CWE-434" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "parse-community", + "product": { + "product_data": [ + { + "product_name": "parse-server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 5.4.4" + }, + { + "version_affected": "=", + "version_value": ">= 6.0.0, < 6.1.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-9prm-jqwx-45x9", + "refsource": "MISC", + "name": "https://github.com/parse-community/parse-server/security/advisories/GHSA-9prm-jqwx-45x9" + }, + { + "url": "https://github.com/parse-community/parse-server/pull/8537", + "refsource": "MISC", + "name": "https://github.com/parse-community/parse-server/pull/8537" + }, + { + "url": "https://github.com/parse-community/parse-server/pull/8538", + "refsource": "MISC", + "name": "https://github.com/parse-community/parse-server/pull/8538" + } + ] + }, + "source": { + "advisory": "GHSA-9prm-jqwx-45x9", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2023/33xxx/CVE-2023-33255.json b/2023/33xxx/CVE-2023-33255.json index 657b729885e..ed70523be65 100644 --- a/2023/33xxx/CVE-2023-33255.json +++ b/2023/33xxx/CVE-2023-33255.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.schutzwerk.com/advisories/SCHUTZWERK-SA-2022-001.txt", "url": "https://www.schutzwerk.com/advisories/SCHUTZWERK-SA-2022-001.txt" + }, + { + "refsource": "FULLDISC", + "name": "20230530 SCHUTZWERK-SA-2022-001: Cross-Site-Scripting in Papaya Medical Viewer", + "url": "http://seclists.org/fulldisclosure/2023/May/21" } ] } diff --git a/2023/33xxx/CVE-2023-33656.json b/2023/33xxx/CVE-2023-33656.json index 78074bffc9f..2604708e824 100644 --- a/2023/33xxx/CVE-2023-33656.json +++ b/2023/33xxx/CVE-2023-33656.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-33656", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-33656", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A memory leak vulnerability exists in NanoMQ 0.17.2. The vulnerability is located in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack by causing the program to consume all available memory resources." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/emqx/nanomq", + "refsource": "MISC", + "name": "https://github.com/emqx/nanomq" + }, + { + "url": "https://github.com/emqx/nanomq/issues/1164", + "refsource": "MISC", + "name": "https://github.com/emqx/nanomq/issues/1164" + }, + { + "url": "https://github.com/emqx/nanomq/issues/1165#issuecomment-1515667127", + "refsource": "MISC", + "name": "https://github.com/emqx/nanomq/issues/1165#issuecomment-1515667127" } ] } diff --git a/2023/33xxx/CVE-2023-33975.json b/2023/33xxx/CVE-2023-33975.json index 7e82723ad9e..af603845bb3 100644 --- a/2023/33xxx/CVE-2023-33975.json +++ b/2023/33xxx/CVE-2023-33975.json @@ -1,17 +1,129 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-33975", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. In version 2023.01 and prior, an attacker can send a crafted frame to the device resulting in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. This issue is fixed in pull request 19680. As a workaround, disable support for fragmented IP datagrams." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", + "cweId": "CWE-119" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-787: Out-of-bounds Write", + "cweId": "CWE-787" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "RIOT-OS", + "product": { + "product_data": [ + { + "product_name": "RIOT", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "<= 2023.01" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-f6ff-g7mh-58q4", + "refsource": "MISC", + "name": "https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-f6ff-g7mh-58q4" + }, + { + "url": "https://github.com/RIOT-OS/RIOT/pull/19680", + "refsource": "MISC", + "name": "https://github.com/RIOT-OS/RIOT/pull/19680" + }, + { + "url": "https://github.com/RIOT-OS/RIOT/commit/1aeb90ee5555ae78b567a6365ae4ab71bfd1404b", + "refsource": "MISC", + "name": "https://github.com/RIOT-OS/RIOT/commit/1aeb90ee5555ae78b567a6365ae4ab71bfd1404b" + }, + { + "url": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L320", + "refsource": "MISC", + "name": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L320" + }, + { + "url": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L388", + "refsource": "MISC", + "name": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L388" + }, + { + "url": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L463", + "refsource": "MISC", + "name": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L463" + }, + { + "url": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L467", + "refsource": "MISC", + "name": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L467" + }, + { + "url": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L480", + "refsource": "MISC", + "name": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L480" + } + ] + }, + "source": { + "advisory": "GHSA-f6ff-g7mh-58q4", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] }