mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3ad5aec19e
commit
df4be4681f
18
2023/1xxx/CVE-2023-1402.json
Normal file
18
2023/1xxx/CVE-2023-1402.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-1402",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -57,11 +57,21 @@
|
||||
"version_name": "12.0.0",
|
||||
"version_value": "12.0.6444.4"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "11.0.0",
|
||||
"version_value": "11.0.7512.11"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "14.0.0",
|
||||
"version_value": "14.0.2047.8"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.6814.4"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "16.0.0",
|
||||
|
@ -39,57 +39,25 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Microsoft SQL Server",
|
||||
"product_name": "SQL Server Integration Services for Visual Studio 2019",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "12.0.0",
|
||||
"version_value": "12.0.6174.8"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "15.0.0",
|
||||
"version_value": "15.0.2101.7"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "13.0.0",
|
||||
"version_value": "13.0.7024.30"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "16.0.0",
|
||||
"version_value": "16.0.1050.5"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "14.0.0",
|
||||
"version_value": "14.0.2047.8"
|
||||
"version_value": "16.0.5035.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Microsoft SQL Server 2017",
|
||||
"product_name": "SQL Server Integration Services for Visual Studio 2022",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "14.0.0",
|
||||
"version_value": "14.0.3460.9"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Microsoft SQL Server 2019",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "15.0.0",
|
||||
"version_value": "15.0.4280.7"
|
||||
"version_name": "16.0.0",
|
||||
"version_value": "16.0.5035.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -45,7 +45,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "9.1.0",
|
||||
"version_value": "9.1.15.32"
|
||||
"version_value": "9.1.16.20"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -57,7 +57,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "9.0.0",
|
||||
"version_value": "4.2.0.51"
|
||||
"version_value": "9.0.45.11"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -45,7 +45,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "9.1.0",
|
||||
"version_value": "9.1.15.32"
|
||||
"version_value": "9.1.16.20"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -57,7 +57,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "9.0.0",
|
||||
"version_value": "4.2.0.51"
|
||||
"version_value": "9.0.45.11"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -45,7 +45,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "9.1.0",
|
||||
"version_value": "9.1.15.32"
|
||||
"version_value": "9.1.16.20"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -57,7 +57,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "9.0.0",
|
||||
"version_value": "4.2.0.51"
|
||||
"version_value": "9.0.45.11"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -45,7 +45,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "9.1.0",
|
||||
"version_value": "9.1.15.32"
|
||||
"version_value": "9.1.16.20"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -57,7 +57,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "9.0.0",
|
||||
"version_value": "4.2.0.51"
|
||||
"version_value": "9.0.45.11"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -11,11 +11,11 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript Printer Driver Remote Code Execution Vulnerability"
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript Printer Driver Remote Code Execution Vulnerability"
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -11,11 +11,11 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript Printer Driver Information Disclosure Vulnerability"
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript Printer Driver Information Disclosure Vulnerability"
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -42,6 +42,11 @@
|
||||
"product_name": "Microsoft SQL Server",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "11.0.0",
|
||||
"version_value": "11.0.7512.11"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "14.0.0",
|
||||
|
@ -45,7 +45,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "15.01.0",
|
||||
"version_value": "15.01.2507.021"
|
||||
"version_value": "15.01.2507.023"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -57,7 +57,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "15.02.0",
|
||||
"version_value": "15.02.1118.025"
|
||||
"version_value": "15.02.1118.026"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -69,7 +69,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "15.02.0",
|
||||
"version_value": "15.02.0986.041"
|
||||
"version_value": "15.02.0986.042"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -81,7 +81,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "15.00.0",
|
||||
"version_value": "15.00.1497.047"
|
||||
"version_value": "15.00.1497.048"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,250 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-21708",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Remote Code Execution"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Microsoft",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Windows 10 Version 1809",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.17763.4131"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Windows Server 2019",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.17763.4131"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Windows Server 2022",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.20348.1607"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Windows 10 Version 20H2",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.19042.2728"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Windows 11 version 21H2",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.22000.1696"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Windows 10 Version 21H2",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.19044.2728"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Windows 11 version 22H2",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.22000.1413"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Windows 10 Version 22H2",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.19045.2728"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Windows 10 Version 1507",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.10240.19805"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Windows 10 Version 1607",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.14393.5786"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Windows Server 2016",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.14393.5786"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Windows Server 2008",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "6.0.0",
|
||||
"version_value": "6.0.6003.21966"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Windows Server 2008 R2",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "6.1.0",
|
||||
"version_value": "6.1.7601.26415"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "6.0.0",
|
||||
"version_value": "6.1.7601.26415"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Windows Server 2012",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "6.2.0",
|
||||
"version_value": "6.2.9200.24168"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Windows Server 2012 R2",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "6.3.0",
|
||||
"version_value": "6.3.9600.20865"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21708",
|
||||
"refsource": "MISC",
|
||||
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21708"
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseSeverity": "CRITICAL",
|
||||
"baseScore": 9.8,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"version_name": "15.0.0",
|
||||
"version_value": "15.0.2101.7"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "11.0.0",
|
||||
"version_value": "11.0.7512.11"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "14.0.0",
|
||||
|
@ -11,11 +11,11 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft OneNote Spoofing Vulnerability"
|
||||
"value": "Microsoft OneNote Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft OneNote Spoofing Vulnerability"
|
||||
"value": "Microsoft OneNote Elevation of Privilege Vulnerability"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -25,7 +25,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Spoofing"
|
||||
"value": "Elevation of Privilege"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -11,11 +11,11 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript Printer Driver Remote Code Execution Vulnerability"
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript Printer Driver Remote Code Execution Vulnerability"
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -189,12 +189,12 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "6.1.0",
|
||||
"version_value": "1.1.0.0"
|
||||
"version_value": "6.1.7601.26366"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "6.0.0",
|
||||
"version_value": "1.1.0.0"
|
||||
"version_value": "6.1.7601.26366"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -206,7 +206,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "6.2.0",
|
||||
"version_value": "1.1.0.0"
|
||||
"version_value": "6.2.9200.24116"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -218,7 +218,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "6.3.0",
|
||||
"version_value": "6.3.9600.20818"
|
||||
"version_value": "6.3.9600.20821"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -45,7 +45,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "9.1.0",
|
||||
"version_value": "9.1.15.32"
|
||||
"version_value": "9.1.16.20"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -57,7 +57,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "9.0.0",
|
||||
"version_value": "4.2.0.51"
|
||||
"version_value": "9.0.45.11"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -94,6 +94,18 @@
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "PowerShell",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "7.2.0",
|
||||
"version_value": "7.2.10"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Microsoft .NET Framework 3.5 AND 4.8",
|
||||
"version": {
|
||||
|
@ -1,17 +1,66 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-25206",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2023-25206",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "PrestaShop ws_productreviews < 3.6.2 is vulnerable to SQL Injection."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://addons.prestashop.com/en/customer-reviews/22373-advanced-reviews-photos-reminder-google-snippets.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://addons.prestashop.com/en/customer-reviews/22373-advanced-reviews-photos-reminder-google-snippets.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://friends-of-presta.github.io/security-advisories/modules/2023/03/14/ws_productreviews.html",
|
||||
"url": "https://friends-of-presta.github.io/security-advisories/modules/2023/03/14/ws_productreviews.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,109 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-27585",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "security-advisories@github.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-122: Heap-based Buffer Overflow",
|
||||
"cweId": "CWE-122"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
|
||||
"cweId": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "pjsip",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "pjproject",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "<= 2.13"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5"
|
||||
},
|
||||
{
|
||||
"url": "https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"advisory": "GHSA-q9cp-8wcq-7pfr",
|
||||
"discovery": "UNKNOWN"
|
||||
},
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"attackComplexity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
18
2023/28xxx/CVE-2023-28329.json
Normal file
18
2023/28xxx/CVE-2023-28329.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-28329",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2023/28xxx/CVE-2023-28330.json
Normal file
18
2023/28xxx/CVE-2023-28330.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-28330",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2023/28xxx/CVE-2023-28331.json
Normal file
18
2023/28xxx/CVE-2023-28331.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-28331",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2023/28xxx/CVE-2023-28332.json
Normal file
18
2023/28xxx/CVE-2023-28332.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-28332",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2023/28xxx/CVE-2023-28333.json
Normal file
18
2023/28xxx/CVE-2023-28333.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-28333",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2023/28xxx/CVE-2023-28334.json
Normal file
18
2023/28xxx/CVE-2023-28334.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-28334",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2023/28xxx/CVE-2023-28335.json
Normal file
18
2023/28xxx/CVE-2023-28335.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-28335",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2023/28xxx/CVE-2023-28336.json
Normal file
18
2023/28xxx/CVE-2023-28336.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-28336",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user