"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-10-04 00:00:33 +00:00
parent 2b80d6ec16
commit dc19d7637b
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
11 changed files with 180 additions and 27 deletions

View File

@ -1,17 +1,93 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-22447",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "psirt@us.ibm.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "IBM Disconnected Log Collector 1.0 through 1.8.2 is vulnerable to potential security misconfigurations that could disclose unintended information. IBM X-Force ID: 224648."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"cweId": "CWE-200"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"product_name": "Disconnected Log Collector",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "1.0",
"version_value": "1.8.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://https://www.ibm.com/support/pages/node/7042313",
"refsource": "MISC",
"name": "https://https://www.ibm.com/support/pages/node/7042313"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/224648",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/224648"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
]
}

View File

@ -73,6 +73,11 @@
"refsource": "MLIST",
"name": "[oss-security] 20231003 Fwd: X.Org Security Advisory: Issues in libX11 prior to 1.8.7 & libXpm prior to 3.5.17",
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/1"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20231003 Re: Fwd: X.Org Security Advisory: Issues in libX11 prior to 1.8.7 & libXpm prior to 3.5.17",
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/10"
}
]
},

View File

@ -211,6 +211,31 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/14",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/10/03/14"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/9",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/10/03/9"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/15",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/10/03/15"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/12",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/10/03/12"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/13",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/10/03/13"
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "On versions beginning in 7.1.5 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client for Windows. User interaction and administrative privileges are required to exploit this vulnerability because the victim user needs to run the executable on the system and the attacker requires administrative privileges for modifying the files in the trusted search path. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
"value": "On versions beginning in 7.1.5 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client for Windows. User interaction and administrative privileges are required to exploit this vulnerability because the victim user needs to run the executable on the system and the attacker requires administrative privileges for modifying the files in the trusted search path. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n"
}
]
},
@ -40,12 +40,24 @@
"version": {
"version_data": [
{
"version_value": "7.1.5",
"version_affected": "="
},
{
"version_value": "7.2.4",
"version_affected": "!"
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "7.2.3.1",
"status": "affected",
"version": "7.1.5",
"versionType": "semver"
},
{
"lessThan": "*",
"status": "unaffected",
"version": "7.2.4",
"versionType": "semver"
}
],
"defaultStatus": "unknown"
}
}
]
}
@ -74,17 +86,17 @@
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]

View File

@ -204,6 +204,11 @@
"url": "https://security.netapp.com/advisory/ntap-20230915-0002/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20230915-0002/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00003.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00003.html"
}
]
},

View File

@ -78,14 +78,14 @@
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]

View File

@ -166,6 +166,16 @@
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/10/03/4"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/10/03/8"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/10/03/6"
}
]
},

View File

@ -161,6 +161,11 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237798",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2237798"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/10/03/8"
}
]
},

View File

@ -77,15 +77,15 @@
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
]

View File

@ -187,6 +187,16 @@
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/10/03/4"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/10/03/8"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/10/03/6"
}
]
},

View File

@ -275,6 +275,11 @@
"url": "http://www.openwall.com/lists/oss-security/2023/10/02/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/10/02/6"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/11",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/10/03/11"
}
]
}