"-Synchronized-Data."

This commit is contained in:
CVE Team 2025-04-22 13:00:33 +00:00
parent 526544af15
commit e6d86b003b
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
5 changed files with 101 additions and 1264 deletions

View File

@ -1,17 +1,106 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-23175",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@cyber.gov.il",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Multiple XSS (CWE-79)"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Tecnick",
"product": {
"product_data": [
{
"product_name": "TCExam",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "16.3.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
"refsource": "MISC",
"name": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Upgrade to version 16.3.5 or later."
}
],
"value": "Upgrade to version 16.3.5 or later."
}
],
"credits": [
{
"lang": "en",
"value": "Guy Hayou"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
]
}

View File

@ -5,326 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2025-2721",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in GNOME libgsf up to 1.14.53. It has been classified as critical. This affects the function gsf_base64_encode_simple. The manipulation of the argument size_t leads to heap-based buffer overflow. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Es wurde eine Schwachstelle in GNOME libgsf bis 1.14.53 ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist die Funktion gsf_base64_encode_simple. Dank Manipulation des Arguments size_t mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Memory Corruption",
"cweId": "CWE-119"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GNOME",
"product": {
"product_data": [
{
"product_name": "libgsf",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.14.0"
},
{
"version_affected": "=",
"version_value": "1.14.1"
},
{
"version_affected": "=",
"version_value": "1.14.2"
},
{
"version_affected": "=",
"version_value": "1.14.3"
},
{
"version_affected": "=",
"version_value": "1.14.4"
},
{
"version_affected": "=",
"version_value": "1.14.5"
},
{
"version_affected": "=",
"version_value": "1.14.6"
},
{
"version_affected": "=",
"version_value": "1.14.7"
},
{
"version_affected": "=",
"version_value": "1.14.8"
},
{
"version_affected": "=",
"version_value": "1.14.9"
},
{
"version_affected": "=",
"version_value": "1.14.10"
},
{
"version_affected": "=",
"version_value": "1.14.11"
},
{
"version_affected": "=",
"version_value": "1.14.12"
},
{
"version_affected": "=",
"version_value": "1.14.13"
},
{
"version_affected": "=",
"version_value": "1.14.14"
},
{
"version_affected": "=",
"version_value": "1.14.15"
},
{
"version_affected": "=",
"version_value": "1.14.16"
},
{
"version_affected": "=",
"version_value": "1.14.17"
},
{
"version_affected": "=",
"version_value": "1.14.18"
},
{
"version_affected": "=",
"version_value": "1.14.19"
},
{
"version_affected": "=",
"version_value": "1.14.20"
},
{
"version_affected": "=",
"version_value": "1.14.21"
},
{
"version_affected": "=",
"version_value": "1.14.22"
},
{
"version_affected": "=",
"version_value": "1.14.23"
},
{
"version_affected": "=",
"version_value": "1.14.24"
},
{
"version_affected": "=",
"version_value": "1.14.25"
},
{
"version_affected": "=",
"version_value": "1.14.26"
},
{
"version_affected": "=",
"version_value": "1.14.27"
},
{
"version_affected": "=",
"version_value": "1.14.28"
},
{
"version_affected": "=",
"version_value": "1.14.29"
},
{
"version_affected": "=",
"version_value": "1.14.30"
},
{
"version_affected": "=",
"version_value": "1.14.31"
},
{
"version_affected": "=",
"version_value": "1.14.32"
},
{
"version_affected": "=",
"version_value": "1.14.33"
},
{
"version_affected": "=",
"version_value": "1.14.34"
},
{
"version_affected": "=",
"version_value": "1.14.35"
},
{
"version_affected": "=",
"version_value": "1.14.36"
},
{
"version_affected": "=",
"version_value": "1.14.37"
},
{
"version_affected": "=",
"version_value": "1.14.38"
},
{
"version_affected": "=",
"version_value": "1.14.39"
},
{
"version_affected": "=",
"version_value": "1.14.40"
},
{
"version_affected": "=",
"version_value": "1.14.41"
},
{
"version_affected": "=",
"version_value": "1.14.42"
},
{
"version_affected": "=",
"version_value": "1.14.43"
},
{
"version_affected": "=",
"version_value": "1.14.44"
},
{
"version_affected": "=",
"version_value": "1.14.45"
},
{
"version_affected": "=",
"version_value": "1.14.46"
},
{
"version_affected": "=",
"version_value": "1.14.47"
},
{
"version_affected": "=",
"version_value": "1.14.48"
},
{
"version_affected": "=",
"version_value": "1.14.49"
},
{
"version_affected": "=",
"version_value": "1.14.50"
},
{
"version_affected": "=",
"version_value": "1.14.51"
},
{
"version_affected": "=",
"version_value": "1.14.52"
},
{
"version_affected": "=",
"version_value": "1.14.53"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.300741",
"refsource": "MISC",
"name": "https://vuldb.com/?id.300741"
},
{
"url": "https://vuldb.com/?ctiid.300741",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.300741"
},
{
"url": "https://vuldb.com/?submit.520181",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.520181"
},
{
"url": "https://www.gnome.org/",
"refsource": "MISC",
"name": "https://www.gnome.org/"
}
]
},
"credits": [
{
"lang": "en",
"value": "ninpwn (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5.3,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 5.3,
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 4.3,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P"
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The code maintainer explains that \"[the] call is invalid [as] the buffer pointed to by \"data\" must have \"len\" valid bytes.\" The documentation was fixed to make that clear."
}
]
}

View File

@ -5,326 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2025-2722",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in GNOME libgsf up to 1.14.53. It has been declared as critical. This vulnerability affects the function gsf_prop_settings_collect_va. The manipulation of the argument n_alloced_params leads to heap-based buffer overflow. Local access is required to approach this attack. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "In GNOME libgsf bis 1.14.53 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Betroffen ist die Funktion gsf_prop_settings_collect_va. Mit der Manipulation des Arguments n_alloced_params mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Memory Corruption",
"cweId": "CWE-119"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GNOME",
"product": {
"product_data": [
{
"product_name": "libgsf",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.14.0"
},
{
"version_affected": "=",
"version_value": "1.14.1"
},
{
"version_affected": "=",
"version_value": "1.14.2"
},
{
"version_affected": "=",
"version_value": "1.14.3"
},
{
"version_affected": "=",
"version_value": "1.14.4"
},
{
"version_affected": "=",
"version_value": "1.14.5"
},
{
"version_affected": "=",
"version_value": "1.14.6"
},
{
"version_affected": "=",
"version_value": "1.14.7"
},
{
"version_affected": "=",
"version_value": "1.14.8"
},
{
"version_affected": "=",
"version_value": "1.14.9"
},
{
"version_affected": "=",
"version_value": "1.14.10"
},
{
"version_affected": "=",
"version_value": "1.14.11"
},
{
"version_affected": "=",
"version_value": "1.14.12"
},
{
"version_affected": "=",
"version_value": "1.14.13"
},
{
"version_affected": "=",
"version_value": "1.14.14"
},
{
"version_affected": "=",
"version_value": "1.14.15"
},
{
"version_affected": "=",
"version_value": "1.14.16"
},
{
"version_affected": "=",
"version_value": "1.14.17"
},
{
"version_affected": "=",
"version_value": "1.14.18"
},
{
"version_affected": "=",
"version_value": "1.14.19"
},
{
"version_affected": "=",
"version_value": "1.14.20"
},
{
"version_affected": "=",
"version_value": "1.14.21"
},
{
"version_affected": "=",
"version_value": "1.14.22"
},
{
"version_affected": "=",
"version_value": "1.14.23"
},
{
"version_affected": "=",
"version_value": "1.14.24"
},
{
"version_affected": "=",
"version_value": "1.14.25"
},
{
"version_affected": "=",
"version_value": "1.14.26"
},
{
"version_affected": "=",
"version_value": "1.14.27"
},
{
"version_affected": "=",
"version_value": "1.14.28"
},
{
"version_affected": "=",
"version_value": "1.14.29"
},
{
"version_affected": "=",
"version_value": "1.14.30"
},
{
"version_affected": "=",
"version_value": "1.14.31"
},
{
"version_affected": "=",
"version_value": "1.14.32"
},
{
"version_affected": "=",
"version_value": "1.14.33"
},
{
"version_affected": "=",
"version_value": "1.14.34"
},
{
"version_affected": "=",
"version_value": "1.14.35"
},
{
"version_affected": "=",
"version_value": "1.14.36"
},
{
"version_affected": "=",
"version_value": "1.14.37"
},
{
"version_affected": "=",
"version_value": "1.14.38"
},
{
"version_affected": "=",
"version_value": "1.14.39"
},
{
"version_affected": "=",
"version_value": "1.14.40"
},
{
"version_affected": "=",
"version_value": "1.14.41"
},
{
"version_affected": "=",
"version_value": "1.14.42"
},
{
"version_affected": "=",
"version_value": "1.14.43"
},
{
"version_affected": "=",
"version_value": "1.14.44"
},
{
"version_affected": "=",
"version_value": "1.14.45"
},
{
"version_affected": "=",
"version_value": "1.14.46"
},
{
"version_affected": "=",
"version_value": "1.14.47"
},
{
"version_affected": "=",
"version_value": "1.14.48"
},
{
"version_affected": "=",
"version_value": "1.14.49"
},
{
"version_affected": "=",
"version_value": "1.14.50"
},
{
"version_affected": "=",
"version_value": "1.14.51"
},
{
"version_affected": "=",
"version_value": "1.14.52"
},
{
"version_affected": "=",
"version_value": "1.14.53"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.300742",
"refsource": "MISC",
"name": "https://vuldb.com/?id.300742"
},
{
"url": "https://vuldb.com/?ctiid.300742",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.300742"
},
{
"url": "https://vuldb.com/?submit.520182",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.520182"
},
{
"url": "https://www.gnome.org/",
"refsource": "MISC",
"name": "https://www.gnome.org/"
}
]
},
"credits": [
{
"lang": "en",
"value": "ninpwn (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5.3,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 5.3,
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 4.3,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P"
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The code maintainer explains that \"[the] call is invalid [because] p_n_param is an input-output parameter indicating how big an array has already been allocated."
}
]
}

View File

@ -5,326 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2025-2723",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in GNOME libgsf up to 1.14.53. It has been rated as critical. This issue affects the function gsf_property_settings_collec. The manipulation of the argument n_alloced_params leads to heap-based buffer overflow. Attacking locally is a requirement. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Eine Schwachstelle wurde in GNOME libgsf bis 1.14.53 ausgemacht. Sie wurde als kritisch eingestuft. Betroffen davon ist die Funktion gsf_property_settings_collec. Durch die Manipulation des Arguments n_alloced_params mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Memory Corruption",
"cweId": "CWE-119"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GNOME",
"product": {
"product_data": [
{
"product_name": "libgsf",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.14.0"
},
{
"version_affected": "=",
"version_value": "1.14.1"
},
{
"version_affected": "=",
"version_value": "1.14.2"
},
{
"version_affected": "=",
"version_value": "1.14.3"
},
{
"version_affected": "=",
"version_value": "1.14.4"
},
{
"version_affected": "=",
"version_value": "1.14.5"
},
{
"version_affected": "=",
"version_value": "1.14.6"
},
{
"version_affected": "=",
"version_value": "1.14.7"
},
{
"version_affected": "=",
"version_value": "1.14.8"
},
{
"version_affected": "=",
"version_value": "1.14.9"
},
{
"version_affected": "=",
"version_value": "1.14.10"
},
{
"version_affected": "=",
"version_value": "1.14.11"
},
{
"version_affected": "=",
"version_value": "1.14.12"
},
{
"version_affected": "=",
"version_value": "1.14.13"
},
{
"version_affected": "=",
"version_value": "1.14.14"
},
{
"version_affected": "=",
"version_value": "1.14.15"
},
{
"version_affected": "=",
"version_value": "1.14.16"
},
{
"version_affected": "=",
"version_value": "1.14.17"
},
{
"version_affected": "=",
"version_value": "1.14.18"
},
{
"version_affected": "=",
"version_value": "1.14.19"
},
{
"version_affected": "=",
"version_value": "1.14.20"
},
{
"version_affected": "=",
"version_value": "1.14.21"
},
{
"version_affected": "=",
"version_value": "1.14.22"
},
{
"version_affected": "=",
"version_value": "1.14.23"
},
{
"version_affected": "=",
"version_value": "1.14.24"
},
{
"version_affected": "=",
"version_value": "1.14.25"
},
{
"version_affected": "=",
"version_value": "1.14.26"
},
{
"version_affected": "=",
"version_value": "1.14.27"
},
{
"version_affected": "=",
"version_value": "1.14.28"
},
{
"version_affected": "=",
"version_value": "1.14.29"
},
{
"version_affected": "=",
"version_value": "1.14.30"
},
{
"version_affected": "=",
"version_value": "1.14.31"
},
{
"version_affected": "=",
"version_value": "1.14.32"
},
{
"version_affected": "=",
"version_value": "1.14.33"
},
{
"version_affected": "=",
"version_value": "1.14.34"
},
{
"version_affected": "=",
"version_value": "1.14.35"
},
{
"version_affected": "=",
"version_value": "1.14.36"
},
{
"version_affected": "=",
"version_value": "1.14.37"
},
{
"version_affected": "=",
"version_value": "1.14.38"
},
{
"version_affected": "=",
"version_value": "1.14.39"
},
{
"version_affected": "=",
"version_value": "1.14.40"
},
{
"version_affected": "=",
"version_value": "1.14.41"
},
{
"version_affected": "=",
"version_value": "1.14.42"
},
{
"version_affected": "=",
"version_value": "1.14.43"
},
{
"version_affected": "=",
"version_value": "1.14.44"
},
{
"version_affected": "=",
"version_value": "1.14.45"
},
{
"version_affected": "=",
"version_value": "1.14.46"
},
{
"version_affected": "=",
"version_value": "1.14.47"
},
{
"version_affected": "=",
"version_value": "1.14.48"
},
{
"version_affected": "=",
"version_value": "1.14.49"
},
{
"version_affected": "=",
"version_value": "1.14.50"
},
{
"version_affected": "=",
"version_value": "1.14.51"
},
{
"version_affected": "=",
"version_value": "1.14.52"
},
{
"version_affected": "=",
"version_value": "1.14.53"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.300743",
"refsource": "MISC",
"name": "https://vuldb.com/?id.300743"
},
{
"url": "https://vuldb.com/?ctiid.300743",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.300743"
},
{
"url": "https://vuldb.com/?submit.520183",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.520183"
},
{
"url": "https://www.gnome.org/",
"refsource": "MISC",
"name": "https://www.gnome.org/"
}
]
},
"credits": [
{
"lang": "en",
"value": "ninpwn (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5.3,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 5.3,
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 4.3,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P"
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The code maintainer explains that \"[the] call is invalid [as] the buffer pointed to by \"data\" must have \"len\" valid bytes.\" The documentation was fixed to make that clear."
}
]
}

View File

@ -5,326 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2025-2724",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as problematic has been found in GNOME libgsf up to 1.14.53. Affected is the function sorting_key_copy. The manipulation of the argument Name leads to out-of-bounds read. It is possible to launch the attack on the local host. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Es wurde eine problematische Schwachstelle in GNOME libgsf bis 1.14.53 entdeckt. Betroffen hiervon ist die Funktion sorting_key_copy. Durch Manipulation des Arguments Name mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff hat dabei lokal zu erfolgen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read",
"cweId": "CWE-125"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Memory Corruption",
"cweId": "CWE-119"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GNOME",
"product": {
"product_data": [
{
"product_name": "libgsf",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.14.0"
},
{
"version_affected": "=",
"version_value": "1.14.1"
},
{
"version_affected": "=",
"version_value": "1.14.2"
},
{
"version_affected": "=",
"version_value": "1.14.3"
},
{
"version_affected": "=",
"version_value": "1.14.4"
},
{
"version_affected": "=",
"version_value": "1.14.5"
},
{
"version_affected": "=",
"version_value": "1.14.6"
},
{
"version_affected": "=",
"version_value": "1.14.7"
},
{
"version_affected": "=",
"version_value": "1.14.8"
},
{
"version_affected": "=",
"version_value": "1.14.9"
},
{
"version_affected": "=",
"version_value": "1.14.10"
},
{
"version_affected": "=",
"version_value": "1.14.11"
},
{
"version_affected": "=",
"version_value": "1.14.12"
},
{
"version_affected": "=",
"version_value": "1.14.13"
},
{
"version_affected": "=",
"version_value": "1.14.14"
},
{
"version_affected": "=",
"version_value": "1.14.15"
},
{
"version_affected": "=",
"version_value": "1.14.16"
},
{
"version_affected": "=",
"version_value": "1.14.17"
},
{
"version_affected": "=",
"version_value": "1.14.18"
},
{
"version_affected": "=",
"version_value": "1.14.19"
},
{
"version_affected": "=",
"version_value": "1.14.20"
},
{
"version_affected": "=",
"version_value": "1.14.21"
},
{
"version_affected": "=",
"version_value": "1.14.22"
},
{
"version_affected": "=",
"version_value": "1.14.23"
},
{
"version_affected": "=",
"version_value": "1.14.24"
},
{
"version_affected": "=",
"version_value": "1.14.25"
},
{
"version_affected": "=",
"version_value": "1.14.26"
},
{
"version_affected": "=",
"version_value": "1.14.27"
},
{
"version_affected": "=",
"version_value": "1.14.28"
},
{
"version_affected": "=",
"version_value": "1.14.29"
},
{
"version_affected": "=",
"version_value": "1.14.30"
},
{
"version_affected": "=",
"version_value": "1.14.31"
},
{
"version_affected": "=",
"version_value": "1.14.32"
},
{
"version_affected": "=",
"version_value": "1.14.33"
},
{
"version_affected": "=",
"version_value": "1.14.34"
},
{
"version_affected": "=",
"version_value": "1.14.35"
},
{
"version_affected": "=",
"version_value": "1.14.36"
},
{
"version_affected": "=",
"version_value": "1.14.37"
},
{
"version_affected": "=",
"version_value": "1.14.38"
},
{
"version_affected": "=",
"version_value": "1.14.39"
},
{
"version_affected": "=",
"version_value": "1.14.40"
},
{
"version_affected": "=",
"version_value": "1.14.41"
},
{
"version_affected": "=",
"version_value": "1.14.42"
},
{
"version_affected": "=",
"version_value": "1.14.43"
},
{
"version_affected": "=",
"version_value": "1.14.44"
},
{
"version_affected": "=",
"version_value": "1.14.45"
},
{
"version_affected": "=",
"version_value": "1.14.46"
},
{
"version_affected": "=",
"version_value": "1.14.47"
},
{
"version_affected": "=",
"version_value": "1.14.48"
},
{
"version_affected": "=",
"version_value": "1.14.49"
},
{
"version_affected": "=",
"version_value": "1.14.50"
},
{
"version_affected": "=",
"version_value": "1.14.51"
},
{
"version_affected": "=",
"version_value": "1.14.52"
},
{
"version_affected": "=",
"version_value": "1.14.53"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.300744",
"refsource": "MISC",
"name": "https://vuldb.com/?id.300744"
},
{
"url": "https://vuldb.com/?ctiid.300744",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.300744"
},
{
"url": "https://vuldb.com/?submit.520184",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.520184"
},
{
"url": "https://www.gnome.org/",
"refsource": "MISC",
"name": "https://www.gnome.org/"
}
]
},
"credits": [
{
"lang": "en",
"value": "ninpwn (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.3,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.3,
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 1.7,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N"
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The code maintainer explains that \"the only way to get an object of type GsfMSOleSortingKey is via gsf_msole_sorting_key_new which adds that extra zero element\"."
}
]
}