"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-03-14 17:00:36 +00:00
parent 3ad5aec19e
commit df4be4681f
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
28 changed files with 614 additions and 78 deletions

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-1402",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -57,11 +57,21 @@
"version_name": "12.0.0",
"version_value": "12.0.6444.4"
},
{
"version_affected": "<",
"version_name": "11.0.0",
"version_value": "11.0.7512.11"
},
{
"version_affected": "<",
"version_name": "14.0.0",
"version_value": "14.0.2047.8"
},
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.6814.4"
},
{
"version_affected": "<",
"version_name": "16.0.0",

View File

@ -39,57 +39,25 @@
"product": {
"product_data": [
{
"product_name": "Microsoft SQL Server",
"product_name": "SQL Server Integration Services for Visual Studio 2019",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "12.0.0",
"version_value": "12.0.6174.8"
},
{
"version_affected": "<",
"version_name": "15.0.0",
"version_value": "15.0.2101.7"
},
{
"version_affected": "<",
"version_name": "13.0.0",
"version_value": "13.0.7024.30"
},
{
"version_affected": "<",
"version_name": "16.0.0",
"version_value": "16.0.1050.5"
},
{
"version_affected": "<",
"version_name": "14.0.0",
"version_value": "14.0.2047.8"
"version_value": "16.0.5035.3"
}
]
}
},
{
"product_name": "Microsoft SQL Server 2017",
"product_name": "SQL Server Integration Services for Visual Studio 2022",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "14.0.0",
"version_value": "14.0.3460.9"
}
]
}
},
{
"product_name": "Microsoft SQL Server 2019",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "15.0.0",
"version_value": "15.0.4280.7"
"version_name": "16.0.0",
"version_value": "16.0.5035.3"
}
]
}

View File

@ -45,7 +45,7 @@
{
"version_affected": "<",
"version_name": "9.1.0",
"version_value": "9.1.15.32"
"version_value": "9.1.16.20"
}
]
}
@ -57,7 +57,7 @@
{
"version_affected": "<",
"version_name": "9.0.0",
"version_value": "4.2.0.51"
"version_value": "9.0.45.11"
}
]
}

View File

@ -45,7 +45,7 @@
{
"version_affected": "<",
"version_name": "9.1.0",
"version_value": "9.1.15.32"
"version_value": "9.1.16.20"
}
]
}
@ -57,7 +57,7 @@
{
"version_affected": "<",
"version_name": "9.0.0",
"version_value": "4.2.0.51"
"version_value": "9.0.45.11"
}
]
}

View File

@ -45,7 +45,7 @@
{
"version_affected": "<",
"version_name": "9.1.0",
"version_value": "9.1.15.32"
"version_value": "9.1.16.20"
}
]
}
@ -57,7 +57,7 @@
{
"version_affected": "<",
"version_name": "9.0.0",
"version_value": "4.2.0.51"
"version_value": "9.0.45.11"
}
]
}

View File

@ -45,7 +45,7 @@
{
"version_affected": "<",
"version_name": "9.1.0",
"version_value": "9.1.15.32"
"version_value": "9.1.16.20"
}
]
}
@ -57,7 +57,7 @@
{
"version_affected": "<",
"version_name": "9.0.0",
"version_value": "4.2.0.51"
"version_value": "9.0.45.11"
}
]
}

View File

@ -11,11 +11,11 @@
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript Printer Driver Remote Code Execution Vulnerability"
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript Printer Driver Remote Code Execution Vulnerability"
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
}
]
},

View File

@ -11,11 +11,11 @@
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript Printer Driver Information Disclosure Vulnerability"
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript Printer Driver Information Disclosure Vulnerability"
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
}
]
},

View File

@ -42,6 +42,11 @@
"product_name": "Microsoft SQL Server",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "11.0.0",
"version_value": "11.0.7512.11"
},
{
"version_affected": "<",
"version_name": "14.0.0",

View File

@ -45,7 +45,7 @@
{
"version_affected": "<",
"version_name": "15.01.0",
"version_value": "15.01.2507.021"
"version_value": "15.01.2507.023"
}
]
}
@ -57,7 +57,7 @@
{
"version_affected": "<",
"version_name": "15.02.0",
"version_value": "15.02.1118.025"
"version_value": "15.02.1118.026"
}
]
}
@ -69,7 +69,7 @@
{
"version_affected": "<",
"version_name": "15.02.0",
"version_value": "15.02.0986.041"
"version_value": "15.02.0986.042"
}
]
}
@ -81,7 +81,7 @@
{
"version_affected": "<",
"version_name": "15.00.0",
"version_value": "15.00.1497.047"
"version_value": "15.00.1497.048"
}
]
}

View File

@ -1,17 +1,250 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-21708",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Windows 10 Version 1809",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.17763.4131"
}
]
}
},
{
"product_name": "Windows Server 2019",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.17763.4131"
}
]
}
},
{
"product_name": "Windows Server 2022",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.20348.1607"
}
]
}
},
{
"product_name": "Windows 10 Version 20H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19042.2728"
}
]
}
},
{
"product_name": "Windows 11 version 21H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22000.1696"
}
]
}
},
{
"product_name": "Windows 10 Version 21H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19044.2728"
}
]
}
},
{
"product_name": "Windows 11 version 22H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22000.1413"
}
]
}
},
{
"product_name": "Windows 10 Version 22H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19045.2728"
}
]
}
},
{
"product_name": "Windows 10 Version 1507",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.10240.19805"
}
]
}
},
{
"product_name": "Windows 10 Version 1607",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.14393.5786"
}
]
}
},
{
"product_name": "Windows Server 2016",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.14393.5786"
}
]
}
},
{
"product_name": "Windows Server 2008",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.0.0",
"version_value": "6.0.6003.21966"
}
]
}
},
{
"product_name": "Windows Server 2008 R2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.1.0",
"version_value": "6.1.7601.26415"
},
{
"version_affected": "<",
"version_name": "6.0.0",
"version_value": "6.1.7601.26415"
}
]
}
},
{
"product_name": "Windows Server 2012",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.2.0",
"version_value": "6.2.9200.24168"
}
]
}
},
{
"product_name": "Windows Server 2012 R2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.3.0",
"version_value": "6.3.9600.20865"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21708",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21708"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "CRITICAL",
"baseScore": 9.8,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"
}
]
}

View File

@ -57,6 +57,11 @@
"version_name": "15.0.0",
"version_value": "15.0.2101.7"
},
{
"version_affected": "<",
"version_name": "11.0.0",
"version_value": "11.0.7512.11"
},
{
"version_affected": "<",
"version_name": "14.0.0",

View File

@ -11,11 +11,11 @@
"description_data": [
{
"lang": "eng",
"value": "Microsoft OneNote Spoofing Vulnerability"
"value": "Microsoft OneNote Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft OneNote Spoofing Vulnerability"
"value": "Microsoft OneNote Elevation of Privilege Vulnerability"
}
]
},
@ -25,7 +25,7 @@
"description": [
{
"lang": "eng",
"value": "Spoofing"
"value": "Elevation of Privilege"
}
]
}

View File

@ -11,11 +11,11 @@
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript Printer Driver Remote Code Execution Vulnerability"
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript Printer Driver Remote Code Execution Vulnerability"
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
}
]
},

View File

@ -189,12 +189,12 @@
{
"version_affected": "<",
"version_name": "6.1.0",
"version_value": "1.1.0.0"
"version_value": "6.1.7601.26366"
},
{
"version_affected": "<",
"version_name": "6.0.0",
"version_value": "1.1.0.0"
"version_value": "6.1.7601.26366"
}
]
}
@ -206,7 +206,7 @@
{
"version_affected": "<",
"version_name": "6.2.0",
"version_value": "1.1.0.0"
"version_value": "6.2.9200.24116"
}
]
}
@ -218,7 +218,7 @@
{
"version_affected": "<",
"version_name": "6.3.0",
"version_value": "6.3.9600.20818"
"version_value": "6.3.9600.20821"
}
]
}

View File

@ -45,7 +45,7 @@
{
"version_affected": "<",
"version_name": "9.1.0",
"version_value": "9.1.15.32"
"version_value": "9.1.16.20"
}
]
}
@ -57,7 +57,7 @@
{
"version_affected": "<",
"version_name": "9.0.0",
"version_value": "4.2.0.51"
"version_value": "9.0.45.11"
}
]
}

View File

@ -94,6 +94,18 @@
]
}
},
{
"product_name": "PowerShell",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "7.2.0",
"version_value": "7.2.10"
}
]
}
},
{
"product_name": "Microsoft .NET Framework 3.5 AND 4.8",
"version": {

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-25206",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-25206",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "PrestaShop ws_productreviews < 3.6.2 is vulnerable to SQL Injection."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://addons.prestashop.com/en/customer-reviews/22373-advanced-reviews-photos-reminder-google-snippets.html",
"refsource": "MISC",
"name": "https://addons.prestashop.com/en/customer-reviews/22373-advanced-reviews-photos-reminder-google-snippets.html"
},
{
"refsource": "MISC",
"name": "https://friends-of-presta.github.io/security-advisories/modules/2023/03/14/ws_productreviews.html",
"url": "https://friends-of-presta.github.io/security-advisories/modules/2023/03/14/ws_productreviews.html"
}
]
}

View File

@ -1,17 +1,109 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27585",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security-advisories@github.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122: Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
"cweId": "CWE-120"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "pjsip",
"product": {
"product_data": [
{
"product_name": "pjproject",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "<= 2.13"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr",
"refsource": "MISC",
"name": "https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr"
},
{
"url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4",
"refsource": "MISC",
"name": "https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4"
},
{
"url": "https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5",
"refsource": "MISC",
"name": "https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5"
},
{
"url": "https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm",
"refsource": "MISC",
"name": "https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm"
}
]
},
"source": {
"advisory": "GHSA-q9cp-8wcq-7pfr",
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28329",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28330",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28331",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28332",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28333",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28334",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28335",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28336",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}