Auto-Update: 2023-05-09T04:00:24.012212+00:00

This commit is contained in:
René Helmke 2023-05-09 06:00:27 +02:00
parent 44dcb55424
commit 06f0c4623d
91 changed files with 2562 additions and 60 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-26298",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-01-11T19:15:13.133",
"lastModified": "2022-10-07T00:22:56.560",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-09T03:15:09.043",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -169,6 +169,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNO4ZZUPGAEUXKQL4G2HRIH7CUZKPCT6/",
"source": "security-advisories@github.com"
},
{
"url": "https://rubygems.org/gems/redcarpet",
"source": "security-advisories@github.com",

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2021-31239",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-09T02:15:08.907",
"lastModified": "2023-05-09T02:15:08.907",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue found in SQLite SQLite3 v.3.35.4 that allows a remote attacker to cause a denial of service via the appendvfs.c function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Tsiming/Vulnerabilities/blob/main/SQLite/CVE-2021-31239",
"source": "cve@mitre.org"
},
{
"url": "https://www.sqlite.org/cves.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.sqlite.org/forum/forumpost/d9fce1a89b",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2021-44283",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-09T03:15:09.197",
"lastModified": "2023-05-09T03:15:09.197",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow in the component /Enclave.cpp of Electronics and Telecommunications Research Institute ShieldStore commit 58d455617f99705f0ffd8a27616abdf77bdc1bdc allows attackers to cause an information leak via a crafted structure from an untrusted operating system."
}
],
"metrics": {},
"references": [
{
"url": "http://electronics.com",
"source": "cve@mitre.org"
},
{
"url": "http://shieldstore.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/cocoppang/ShieldStore/blob/master/Enclave/Enclave.cpp",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/cocoppang/ShieldStore/issues/19",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-38685",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:08.973",
"lastModified": "2023-05-09T02:15:08.973",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In bluetooth service, there is a possible missing permission check. This could lead to local denial of service in bluetooth service with no additional execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-39089",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.023",
"lastModified": "2023-05-09T02:15:09.023",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In mlog service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-44419",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.073",
"lastModified": "2023-05-09T02:15:09.073",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In modem, there is a possible missing verification of NAS Security Mode Command Replay Attacks in LTE. This could local denial of service with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-44420",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.133",
"lastModified": "2023-05-09T02:15:09.133",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In modem, there is a possible missing verification of HashMME value in Security Mode Command. This could local denial of service with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-44433",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.190",
"lastModified": "2023-05-09T02:15:09.190",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In phoneEx service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2022-4537",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-05-09T03:15:09.267",
"lastModified": "2023-05-09T03:15:09.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Hide My WP Ghost \u2013 Security Plugin plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 5.0.18. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address from logging in."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-348"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/hide-my-wp/tags/5.0.18/models/Brute.php#L131",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/hide-my-wp/trunk/models/Brute.php#L132",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4cf89f94-587a-4fed-a6e4-3876b7dbc9ba?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47334",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.240",
"lastModified": "2023-05-09T02:15:09.240",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In phasecheck server, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47340",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.290",
"lastModified": "2023-05-09T02:15:09.290",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In h265 codec firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47469",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.333",
"lastModified": "2023-05-09T02:15:09.333",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In ext4fsfilter driver, there is a possible out of bounds read due to a missing bounds check. This could local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47470",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.383",
"lastModified": "2023-05-09T02:15:09.383",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In ext4fsfilter driver, there is a possible out of bounds read due to a missing bounds check. This could local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47485",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.430",
"lastModified": "2023-05-09T02:15:09.430",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In modem control device, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47486",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.480",
"lastModified": "2023-05-09T02:15:09.480",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In ext4fsfilter driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47487",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.527",
"lastModified": "2023-05-09T02:15:09.527",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In thermal service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service local denial of service with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47488",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.567",
"lastModified": "2023-05-09T02:15:09.567",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In spipe drive, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47489",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.613",
"lastModified": "2023-05-09T02:15:09.613",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47490",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.660",
"lastModified": "2023-05-09T02:15:09.660",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In soter service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47491",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.707",
"lastModified": "2023-05-09T02:15:09.707",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47492",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.753",
"lastModified": "2023-05-09T02:15:09.753",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In soter service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47493",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.797",
"lastModified": "2023-05-09T02:15:09.797",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In soter service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47494",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.843",
"lastModified": "2023-05-09T02:15:09.843",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47495",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.890",
"lastModified": "2023-05-09T02:15:09.890",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47496",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.943",
"lastModified": "2023-05-09T02:15:09.943",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47497",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:09.987",
"lastModified": "2023-05-09T02:15:09.987",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47498",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.033",
"lastModified": "2023-05-09T02:15:10.033",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47499",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.083",
"lastModified": "2023-05-09T02:15:10.083",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48231",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.133",
"lastModified": "2023-05-09T02:15:10.133",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In soter service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48232",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.187",
"lastModified": "2023-05-09T02:15:10.187",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In FM service , there is a possible missing params check. This could lead to local denial of service in FM service ."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48233",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.233",
"lastModified": "2023-05-09T02:15:10.233",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In FM service , there is a possible missing params check. This could lead to local denial of service in FM service ."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48234",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.277",
"lastModified": "2023-05-09T02:15:10.277",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In FM service , there is a possible missing params check. This could lead to local denial of service in FM service ."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48235",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.317",
"lastModified": "2023-05-09T02:15:10.317",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In MP3 encoder, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48236",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.360",
"lastModified": "2023-05-09T02:15:10.360",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In MP3 encoder, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48237",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.403",
"lastModified": "2023-05-09T02:15:10.403",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In Image filter, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48238",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.447",
"lastModified": "2023-05-09T02:15:10.447",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In Image filter, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48239",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.490",
"lastModified": "2023-05-09T02:15:10.490",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In camera driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48240",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.540",
"lastModified": "2023-05-09T02:15:10.540",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In camera driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48241",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.587",
"lastModified": "2023-05-09T02:15:10.587",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In telephony service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48242",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.633",
"lastModified": "2023-05-09T02:15:10.633",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48243",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.677",
"lastModified": "2023-05-09T02:15:10.677",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48244",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.727",
"lastModified": "2023-05-09T02:15:10.727",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48245",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.770",
"lastModified": "2023-05-09T02:15:10.770",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48246",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.817",
"lastModified": "2023-05-09T02:15:10.817",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48247",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.867",
"lastModified": "2023-05-09T02:15:10.867",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48248",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.910",
"lastModified": "2023-05-09T02:15:10.910",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48249",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.957",
"lastModified": "2023-05-09T02:15:10.957",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48250",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:10.997",
"lastModified": "2023-05-09T02:15:10.997",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48368",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.037",
"lastModified": "2023-05-09T02:15:11.037",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48369",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.083",
"lastModified": "2023-05-09T02:15:11.083",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48370",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.120",
"lastModified": "2023-05-09T02:15:11.120",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In dialer service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48371",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.163",
"lastModified": "2023-05-09T02:15:11.163",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In dialer service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48372",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.210",
"lastModified": "2023-05-09T02:15:11.210",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In bootcp service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48373",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.253",
"lastModified": "2023-05-09T02:15:11.253",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tee service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48374",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.297",
"lastModified": "2023-05-09T02:15:11.297",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tee service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48375",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.347",
"lastModified": "2023-05-09T02:15:11.347",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In contacts service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48376",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.397",
"lastModified": "2023-05-09T02:15:11.397",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In dialer service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48377",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.457",
"lastModified": "2023-05-09T02:15:11.457",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In dialer service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48378",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.500",
"lastModified": "2023-05-09T02:15:11.500",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In engineermode service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48379",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.547",
"lastModified": "2023-05-09T02:15:11.547",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In dialer service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48380",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.593",
"lastModified": "2023-05-09T02:15:11.593",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In modem control device, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48381",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.637",
"lastModified": "2023-05-09T02:15:11.637",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In modem control device, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48382",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.690",
"lastModified": "2023-05-09T02:15:11.690",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In log service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48383",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.737",
"lastModified": "2023-05-09T02:15:11.737",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": ".In srtd service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48384",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.787",
"lastModified": "2023-05-09T02:15:11.787",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In srtd service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48385",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.833",
"lastModified": "2023-05-09T02:15:11.833",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In cp_dump driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48386",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.877",
"lastModified": "2023-05-09T02:15:11.877",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "the apipe driver, there is a possible use after free due to a logic error. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48387",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.920",
"lastModified": "2023-05-09T02:15:11.920",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "the apipe driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48388",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:11.960",
"lastModified": "2023-05-09T02:15:11.960",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In powerEx service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48389",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-05-09T02:15:12.003",
"lastModified": "2023-05-09T02:15:12.003",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In modem control device, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
"source": "security@unisoc.com"
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-26813",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-28T20:15:13.970",
"lastModified": "2023-04-28T22:22:40.580",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-09T02:25:14.460",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in com.xnx3.wangmarket.plugin.dataDictionary.controller.DataDictionaryPluginController.java in wangmarket CMS 4.10 allows remote attackers to run arbitrary SQL commands via the TableName parameter to /plugin/dataDictionary/tableView.do."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wang.market:wangmarket_cms:4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3178DD35-93D4-4404-87A6-370C78E97DE8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/xnx3/wangmarket/issues/7",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28762",
"sourceIdentifier": "cna@sap.com",
"published": "2023-05-09T01:15:08.777",
"lastModified": "2023-05-09T01:15:08.777",
"lastModified": "2023-05-09T02:15:12.050",
"vulnStatus": "Received",
"descriptions": [
{
@ -48,7 +48,7 @@
],
"references": [
{
"url": "https://i7p.wdf.sap.corp/sap/support/notes/3307833",
"url": "https://launchpad.support.sap.com/#/notes/3307833",
"source": "cna@sap.com"
},
{

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-29092",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-09T02:15:12.127",
"lastModified": "2023-05-09T02:15:12.127",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Exynos Mobile Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, and Exynos 1080. Binding of a wrong resource can occur due to improper handling of parameters while binding a network interface."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.5,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-30237",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-09T03:15:09.343",
"lastModified": "2023-05-09T03:15:09.343",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CyberGhostVPN Windows Client before v8.3.10.10015 was discovered to contain a DLL injection vulnerability via the component Dashboard.exe."
}
],
"metrics": {},
"references": [
{
"url": "http://cyberghostvpn.com",
"source": "cve@mitre.org"
},
{
"url": "https://cwe.mitre.org/data/definitions/77.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.pentestpartners.com/security-blog/bullied-by-bugcrowd-over-kape-cyberghost-disclosure/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30265",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-26T14:15:09.697",
"lastModified": "2023-05-04T20:15:10.427",
"lastModified": "2023-05-09T03:15:09.390",
"vulnStatus": "Modified",
"descriptions": [
{
@ -68,13 +68,6 @@
{
"url": "https://gist.github.com/HuBenLab/1d1bc201d5df41426d719e56d4421b30",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Path%20Traversal.md",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30269",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-26T14:15:09.813",
"lastModified": "2023-05-04T20:15:10.617",
"lastModified": "2023-05-09T03:15:09.733",
"vulnStatus": "Modified",
"descriptions": [
{
@ -68,13 +68,6 @@
{
"url": "https://gist.github.com/HuBenLab/f5eb8ebbba20c835a3170d392c9e46a4",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Improper%20Input%20Validation%201.md",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30441",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-04-29T15:15:18.953",
"lastModified": "2023-05-01T10:39:42.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-09T02:31:07.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,26 +76,88 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:java:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.7.0",
"versionEndExcluding": "8.0.7.15",
"matchCriteriaId": "4B6E494E-BA83-4743-B9DD-4DE1F3BC0637"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "8.5.0.0",
"versionEndExcluding": "8.5.5.23",
"matchCriteriaId": "E06F1A60-BE9C-4922-A4A6-E4E1EF57A06D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_application_server:-:*:*:*:liberty:*:*:*",
"matchCriteriaId": "7E0B3D5C-C912-4874-AD3D-62B6E6EBE742"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_application_server:9.0.0.0:*:*:*:-:*:*:*",
"matchCriteriaId": "E79B1229-6DC0-4461-B814-1F671AE0A090"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:z\\/transaction_processing_facility:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3BF7682-2984-4286-9C17-2B650A4275E7"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253188",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/6985011",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/6986617",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/6986637",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/6987167",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,23 +2,83 @@
"id": "CVE-2023-30454",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-28T19:15:16.993",
"lastModified": "2023-04-28T22:22:40.580",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-09T02:04:28.353",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ebankIT before 7. Document Object Model based XSS exists within the /Security/Transactions/Transactions.aspx endpoint. Users can supply their own JavaScript within the ctl100$ctl00MainContent$TransactionMainContent$accControl$hdnAccountsArray POST parameter that will be passed to an eval() function and executed upon pressing the continue button."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ebankit:ebankit:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0",
"matchCriteriaId": "69D21BC0-ED24-49AD-B393-013DC3B55313"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.ebankit.com/blog-press",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://packetstormsecurity.com/files/172063/ebankIT-6-Cross-Site-Scripting.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,23 +2,83 @@
"id": "CVE-2023-30455",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-28T18:15:26.680",
"lastModified": "2023-04-28T18:25:52.200",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-09T02:16:18.417",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ebankIT before 7. A Denial-of-Service attack is possible through the GET parameter EStatementsIds located on the /Controls/Generic/EBMK/Handlers/EStatements/DownloadEStatement.ashx endpoint. The GET parameter accepts over 100 comma-separated e-statement IDs without throwing an error. When this many IDs are supplied, the server takes around 60 seconds to respond and successfully generate the expected ZIP archive (during this time period, no other pages load). A threat actor could issue a request to this endpoint with 100+ statement IDs every 30 seconds, potentially resulting in an overload of the server for all users."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ebankit:ebankit:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0",
"matchCriteriaId": "69D21BC0-ED24-49AD-B393-013DC3B55313"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.ebankit.com/blog-press",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://packetstormsecurity.com/files/172064/ebankIT-6-Denial-Of-Service.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-30740",
"sourceIdentifier": "cna@sap.com",
"published": "2023-05-09T02:15:12.190",
"lastModified": "2023-05-09T02:15:12.190",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SAP BusinessObjects Business Intelligence Platform - versions 420, 430, allows an authenticated attacker to access sensitive information which is otherwise restricted. On successful exploitation, there could be a high impact on confidentiality, limited impact on integrity and availability of the application.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://launchpad.support.sap.com/#/notes/3313484",
"source": "cna@sap.com"
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-30741",
"sourceIdentifier": "cna@sap.com",
"published": "2023-05-09T02:15:12.260",
"lastModified": "2023-05-09T02:15:12.260",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Due to insufficient input validation, SAP BusinessObjects Business Intelligence Platform - versions 420, 430, allows an unauthenticated attacker to redirect users to untrusted site using a malicious link. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://launchpad.support.sap.com/#/notes/3309935",
"source": "cna@sap.com"
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-30742",
"sourceIdentifier": "cna@sap.com",
"published": "2023-05-09T02:15:12.333",
"lastModified": "2023-05-09T02:15:12.333",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SAP CRM (WebClient UI) - versions S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, WEBCUIF 700, WEBCUIF 701, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in a stored Cross-Site Scripting (XSS) vulnerability.An attacker could store a malicious URL and lure the victim to click, causing the script supplied by the attacker to execute in the victim user's session. The information from the victim's session could then be modified or read by the attacker.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://launchpad.support.sap.com/#/notes/3315971",
"source": "cna@sap.com"
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-30743",
"sourceIdentifier": "cna@sap.com",
"published": "2023-05-09T02:15:12.397",
"lastModified": "2023-05-09T02:15:12.397",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Due to improper neutralization of input in SAPUI5 - versions SAP_UI 750, SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, UI_700 200, sap.m.FormattedText SAPUI5 control allows injection of untrusted CSS. This blocks user\u2019s interaction with the application. Further, in the absence of URL validation by the application, the vulnerability could lead to the attacker reading or modifying user\u2019s information through phishing attack.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://launchpad.support.sap.com/#/notes/3326210",
"source": "cna@sap.com"
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-30744",
"sourceIdentifier": "cna@sap.com",
"published": "2023-05-09T02:15:12.460",
"lastModified": "2023-05-09T02:15:12.460",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In SAP AS NetWeaver JAVA - versions SERVERCORE 7.50, J2EE-FRMW 7.50, CORE-TOOLS 7.50, an unauthenticated attacker can attach to an open interface and make use of an open naming and directory API to instantiate an object which has methods which can be called without further authorization and authentication. \u00a0A subsequent call to one of these methods can read or change the state of existing services without any effect on availability.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
},
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://launchpad.support.sap.com/#/notes/3317453",
"source": "cna@sap.com"
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-31404",
"sourceIdentifier": "cna@sap.com",
"published": "2023-05-09T02:15:12.537",
"lastModified": "2023-05-09T02:15:12.537",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Under certain conditions,\u00a0SAP BusinessObjects Business Intelligence Platform (Central Management Service) - versions 420, 430, allows an attacker to access information which would otherwise be restricted. Some users with specific privileges could have access to credentials of other users. It could let them access data sources which would otherwise be restricted.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://launchpad.support.sap.com/#/notes/3038911",
"source": "cna@sap.com"
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-31406",
"sourceIdentifier": "cna@sap.com",
"published": "2023-05-09T02:15:12.603",
"lastModified": "2023-05-09T02:15:12.603",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Due to insufficient input validation, SAP BusinessObjects Business Intelligence Platform - versions 420, 430, allows an unauthenticated attacker to redirect users to untrusted site using a malicious link. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://launchpad.support.sap.com/#/notes/3319400",
"source": "cna@sap.com"
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-31407",
"sourceIdentifier": "cna@sap.com",
"published": "2023-05-09T02:15:12.667",
"lastModified": "2023-05-09T02:15:12.667",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SAP Business Planning and Consolidation - versions 740, 750, allows an authorized attacker to upload a malicious file, resulting in Cross-Site Scripting vulnerability. After successful exploitation, an attacker can cause limited impact on confidentiality and integrity of the application.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://launchpad.support.sap.com/#/notes/3312892",
"source": "cna@sap.com"
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-32111",
"sourceIdentifier": "cna@sap.com",
"published": "2023-05-09T02:15:12.733",
"lastModified": "2023-05-09T02:15:12.733",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In SAP PowerDesigner (Proxy) - version 16.7, an attacker can send a crafted request from a remote host to the proxy machine and crash the proxy server, due to faulty implementation of memory management causing a memory corruption. This leads to a high impact on availability of the application.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://launchpad.support.sap.com/#/notes/3300624",
"source": "cna@sap.com"
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-32112",
"sourceIdentifier": "cna@sap.com",
"published": "2023-05-09T02:15:12.800",
"lastModified": "2023-05-09T02:15:12.800",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vendor Master Hierarchy - versions SAP_APPL 500, SAP_APPL 600, SAP_APPL 602, SAP_APPL 603, SAP_APPL 604, SAP_APPL 605, SAP_APPL 606, SAP_APPL 616, SAP_APPL 617, SAP_APPL 618, S4CORE 100, does not perform necessary authorization checks for an authenticated user to\u00a0access some of its function. This could lead to modification of data impacting the integrity of the system.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.8,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://launchpad.support.sap.com/#/notes/2335198",
"source": "cna@sap.com"
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-32113",
"sourceIdentifier": "cna@sap.com",
"published": "2023-05-09T02:15:12.873",
"lastModified": "2023-05-09T02:15:12.873",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SAP GUI for Windows - version 7.70, 8.0, allows an unauthorized attacker to gain NTLM authentication information of a victim by tricking it into clicking a prepared shortcut file. Depending on the authorizations of the victim, the attacker can read and modify potentially sensitive information after successful exploitation.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://launchpad.support.sap.com/#/notes/3320467",
"source": "cna@sap.com"
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com"
}
]
}

113
README.md
View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-09T02:00:51.002610+00:00
2023-05-09T04:00:24.012212+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-09T01:54:45.817000+00:00
2023-05-09T03:15:09.733000+00:00
```
### Last Data Feed Release
@ -29,32 +29,109 @@ Download and Changelog: [Click](releases/latest)
### Total Number of included CVEs
```plain
214412
214494
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `82`
* [CVE-2023-28762](CVE-2023/CVE-2023-287xx/CVE-2023-28762.json) (`2023-05-09T01:15:08.777`)
* [CVE-2023-28764](CVE-2023/CVE-2023-287xx/CVE-2023-28764.json) (`2023-05-09T01:15:08.863`)
* [CVE-2023-29188](CVE-2023/CVE-2023-291xx/CVE-2023-29188.json) (`2023-05-09T01:15:08.943`)
* [CVE-2021-31239](CVE-2021/CVE-2021-312xx/CVE-2021-31239.json) (`2023-05-09T02:15:08.907`)
* [CVE-2021-44283](CVE-2021/CVE-2021-442xx/CVE-2021-44283.json) (`2023-05-09T03:15:09.197`)
* [CVE-2022-38685](CVE-2022/CVE-2022-386xx/CVE-2022-38685.json) (`2023-05-09T02:15:08.973`)
* [CVE-2022-39089](CVE-2022/CVE-2022-390xx/CVE-2022-39089.json) (`2023-05-09T02:15:09.023`)
* [CVE-2022-44419](CVE-2022/CVE-2022-444xx/CVE-2022-44419.json) (`2023-05-09T02:15:09.073`)
* [CVE-2022-44420](CVE-2022/CVE-2022-444xx/CVE-2022-44420.json) (`2023-05-09T02:15:09.133`)
* [CVE-2022-44433](CVE-2022/CVE-2022-444xx/CVE-2022-44433.json) (`2023-05-09T02:15:09.190`)
* [CVE-2022-4537](CVE-2022/CVE-2022-45xx/CVE-2022-4537.json) (`2023-05-09T03:15:09.267`)
* [CVE-2022-47334](CVE-2022/CVE-2022-473xx/CVE-2022-47334.json) (`2023-05-09T02:15:09.240`)
* [CVE-2022-47340](CVE-2022/CVE-2022-473xx/CVE-2022-47340.json) (`2023-05-09T02:15:09.290`)
* [CVE-2022-47469](CVE-2022/CVE-2022-474xx/CVE-2022-47469.json) (`2023-05-09T02:15:09.333`)
* [CVE-2022-47470](CVE-2022/CVE-2022-474xx/CVE-2022-47470.json) (`2023-05-09T02:15:09.383`)
* [CVE-2022-47485](CVE-2022/CVE-2022-474xx/CVE-2022-47485.json) (`2023-05-09T02:15:09.430`)
* [CVE-2022-47486](CVE-2022/CVE-2022-474xx/CVE-2022-47486.json) (`2023-05-09T02:15:09.480`)
* [CVE-2022-47487](CVE-2022/CVE-2022-474xx/CVE-2022-47487.json) (`2023-05-09T02:15:09.527`)
* [CVE-2022-47488](CVE-2022/CVE-2022-474xx/CVE-2022-47488.json) (`2023-05-09T02:15:09.567`)
* [CVE-2022-47489](CVE-2022/CVE-2022-474xx/CVE-2022-47489.json) (`2023-05-09T02:15:09.613`)
* [CVE-2022-47490](CVE-2022/CVE-2022-474xx/CVE-2022-47490.json) (`2023-05-09T02:15:09.660`)
* [CVE-2022-47491](CVE-2022/CVE-2022-474xx/CVE-2022-47491.json) (`2023-05-09T02:15:09.707`)
* [CVE-2022-47492](CVE-2022/CVE-2022-474xx/CVE-2022-47492.json) (`2023-05-09T02:15:09.753`)
* [CVE-2022-47493](CVE-2022/CVE-2022-474xx/CVE-2022-47493.json) (`2023-05-09T02:15:09.797`)
* [CVE-2022-47494](CVE-2022/CVE-2022-474xx/CVE-2022-47494.json) (`2023-05-09T02:15:09.843`)
* [CVE-2022-47495](CVE-2022/CVE-2022-474xx/CVE-2022-47495.json) (`2023-05-09T02:15:09.890`)
* [CVE-2022-47496](CVE-2022/CVE-2022-474xx/CVE-2022-47496.json) (`2023-05-09T02:15:09.943`)
* [CVE-2022-47497](CVE-2022/CVE-2022-474xx/CVE-2022-47497.json) (`2023-05-09T02:15:09.987`)
* [CVE-2022-47498](CVE-2022/CVE-2022-474xx/CVE-2022-47498.json) (`2023-05-09T02:15:10.033`)
* [CVE-2022-47499](CVE-2022/CVE-2022-474xx/CVE-2022-47499.json) (`2023-05-09T02:15:10.083`)
* [CVE-2022-48231](CVE-2022/CVE-2022-482xx/CVE-2022-48231.json) (`2023-05-09T02:15:10.133`)
* [CVE-2022-48232](CVE-2022/CVE-2022-482xx/CVE-2022-48232.json) (`2023-05-09T02:15:10.187`)
* [CVE-2022-48233](CVE-2022/CVE-2022-482xx/CVE-2022-48233.json) (`2023-05-09T02:15:10.233`)
* [CVE-2022-48234](CVE-2022/CVE-2022-482xx/CVE-2022-48234.json) (`2023-05-09T02:15:10.277`)
* [CVE-2022-48235](CVE-2022/CVE-2022-482xx/CVE-2022-48235.json) (`2023-05-09T02:15:10.317`)
* [CVE-2022-48236](CVE-2022/CVE-2022-482xx/CVE-2022-48236.json) (`2023-05-09T02:15:10.360`)
* [CVE-2022-48237](CVE-2022/CVE-2022-482xx/CVE-2022-48237.json) (`2023-05-09T02:15:10.403`)
* [CVE-2022-48238](CVE-2022/CVE-2022-482xx/CVE-2022-48238.json) (`2023-05-09T02:15:10.447`)
* [CVE-2022-48239](CVE-2022/CVE-2022-482xx/CVE-2022-48239.json) (`2023-05-09T02:15:10.490`)
* [CVE-2022-48240](CVE-2022/CVE-2022-482xx/CVE-2022-48240.json) (`2023-05-09T02:15:10.540`)
* [CVE-2022-48241](CVE-2022/CVE-2022-482xx/CVE-2022-48241.json) (`2023-05-09T02:15:10.587`)
* [CVE-2022-48242](CVE-2022/CVE-2022-482xx/CVE-2022-48242.json) (`2023-05-09T02:15:10.633`)
* [CVE-2022-48243](CVE-2022/CVE-2022-482xx/CVE-2022-48243.json) (`2023-05-09T02:15:10.677`)
* [CVE-2022-48244](CVE-2022/CVE-2022-482xx/CVE-2022-48244.json) (`2023-05-09T02:15:10.727`)
* [CVE-2022-48245](CVE-2022/CVE-2022-482xx/CVE-2022-48245.json) (`2023-05-09T02:15:10.770`)
* [CVE-2022-48246](CVE-2022/CVE-2022-482xx/CVE-2022-48246.json) (`2023-05-09T02:15:10.817`)
* [CVE-2022-48247](CVE-2022/CVE-2022-482xx/CVE-2022-48247.json) (`2023-05-09T02:15:10.867`)
* [CVE-2022-48248](CVE-2022/CVE-2022-482xx/CVE-2022-48248.json) (`2023-05-09T02:15:10.910`)
* [CVE-2022-48249](CVE-2022/CVE-2022-482xx/CVE-2022-48249.json) (`2023-05-09T02:15:10.957`)
* [CVE-2022-48250](CVE-2022/CVE-2022-482xx/CVE-2022-48250.json) (`2023-05-09T02:15:10.997`)
* [CVE-2022-48368](CVE-2022/CVE-2022-483xx/CVE-2022-48368.json) (`2023-05-09T02:15:11.037`)
* [CVE-2022-48369](CVE-2022/CVE-2022-483xx/CVE-2022-48369.json) (`2023-05-09T02:15:11.083`)
* [CVE-2022-48370](CVE-2022/CVE-2022-483xx/CVE-2022-48370.json) (`2023-05-09T02:15:11.120`)
* [CVE-2022-48371](CVE-2022/CVE-2022-483xx/CVE-2022-48371.json) (`2023-05-09T02:15:11.163`)
* [CVE-2022-48372](CVE-2022/CVE-2022-483xx/CVE-2022-48372.json) (`2023-05-09T02:15:11.210`)
* [CVE-2022-48373](CVE-2022/CVE-2022-483xx/CVE-2022-48373.json) (`2023-05-09T02:15:11.253`)
* [CVE-2022-48374](CVE-2022/CVE-2022-483xx/CVE-2022-48374.json) (`2023-05-09T02:15:11.297`)
* [CVE-2022-48375](CVE-2022/CVE-2022-483xx/CVE-2022-48375.json) (`2023-05-09T02:15:11.347`)
* [CVE-2022-48376](CVE-2022/CVE-2022-483xx/CVE-2022-48376.json) (`2023-05-09T02:15:11.397`)
* [CVE-2022-48377](CVE-2022/CVE-2022-483xx/CVE-2022-48377.json) (`2023-05-09T02:15:11.457`)
* [CVE-2022-48378](CVE-2022/CVE-2022-483xx/CVE-2022-48378.json) (`2023-05-09T02:15:11.500`)
* [CVE-2022-48379](CVE-2022/CVE-2022-483xx/CVE-2022-48379.json) (`2023-05-09T02:15:11.547`)
* [CVE-2022-48380](CVE-2022/CVE-2022-483xx/CVE-2022-48380.json) (`2023-05-09T02:15:11.593`)
* [CVE-2022-48381](CVE-2022/CVE-2022-483xx/CVE-2022-48381.json) (`2023-05-09T02:15:11.637`)
* [CVE-2022-48382](CVE-2022/CVE-2022-483xx/CVE-2022-48382.json) (`2023-05-09T02:15:11.690`)
* [CVE-2022-48383](CVE-2022/CVE-2022-483xx/CVE-2022-48383.json) (`2023-05-09T02:15:11.737`)
* [CVE-2022-48384](CVE-2022/CVE-2022-483xx/CVE-2022-48384.json) (`2023-05-09T02:15:11.787`)
* [CVE-2022-48385](CVE-2022/CVE-2022-483xx/CVE-2022-48385.json) (`2023-05-09T02:15:11.833`)
* [CVE-2022-48386](CVE-2022/CVE-2022-483xx/CVE-2022-48386.json) (`2023-05-09T02:15:11.877`)
* [CVE-2022-48387](CVE-2022/CVE-2022-483xx/CVE-2022-48387.json) (`2023-05-09T02:15:11.920`)
* [CVE-2022-48388](CVE-2022/CVE-2022-483xx/CVE-2022-48388.json) (`2023-05-09T02:15:11.960`)
* [CVE-2022-48389](CVE-2022/CVE-2022-483xx/CVE-2022-48389.json) (`2023-05-09T02:15:12.003`)
* [CVE-2023-29092](CVE-2023/CVE-2023-290xx/CVE-2023-29092.json) (`2023-05-09T02:15:12.127`)
* [CVE-2023-30237](CVE-2023/CVE-2023-302xx/CVE-2023-30237.json) (`2023-05-09T03:15:09.343`)
* [CVE-2023-30740](CVE-2023/CVE-2023-307xx/CVE-2023-30740.json) (`2023-05-09T02:15:12.190`)
* [CVE-2023-30741](CVE-2023/CVE-2023-307xx/CVE-2023-30741.json) (`2023-05-09T02:15:12.260`)
* [CVE-2023-30742](CVE-2023/CVE-2023-307xx/CVE-2023-30742.json) (`2023-05-09T02:15:12.333`)
* [CVE-2023-30743](CVE-2023/CVE-2023-307xx/CVE-2023-30743.json) (`2023-05-09T02:15:12.397`)
* [CVE-2023-30744](CVE-2023/CVE-2023-307xx/CVE-2023-30744.json) (`2023-05-09T02:15:12.460`)
* [CVE-2023-31404](CVE-2023/CVE-2023-314xx/CVE-2023-31404.json) (`2023-05-09T02:15:12.537`)
* [CVE-2023-31406](CVE-2023/CVE-2023-314xx/CVE-2023-31406.json) (`2023-05-09T02:15:12.603`)
* [CVE-2023-31407](CVE-2023/CVE-2023-314xx/CVE-2023-31407.json) (`2023-05-09T02:15:12.667`)
* [CVE-2023-32111](CVE-2023/CVE-2023-321xx/CVE-2023-32111.json) (`2023-05-09T02:15:12.733`)
* [CVE-2023-32112](CVE-2023/CVE-2023-321xx/CVE-2023-32112.json) (`2023-05-09T02:15:12.800`)
* [CVE-2023-32113](CVE-2023/CVE-2023-321xx/CVE-2023-32113.json) (`2023-05-09T02:15:12.873`)
### CVEs modified in the last Commit
Recently modified CVEs: `10`
Recently modified CVEs: `8`
* [CVE-2022-25278](CVE-2022/CVE-2022-252xx/CVE-2022-25278.json) (`2023-05-09T01:38:43.977`)
* [CVE-2022-44232](CVE-2022/CVE-2022-442xx/CVE-2022-44232.json) (`2023-05-09T01:26:15.347`)
* [CVE-2023-0834](CVE-2023/CVE-2023-08xx/CVE-2023-0834.json) (`2023-05-09T01:20:26.127`)
* [CVE-2023-2140](CVE-2023/CVE-2023-21xx/CVE-2023-2140.json) (`2023-05-09T00:56:42.793`)
* [CVE-2023-2141](CVE-2023/CVE-2023-21xx/CVE-2023-2141.json) (`2023-05-09T01:01:22.827`)
* [CVE-2023-2373](CVE-2023/CVE-2023-23xx/CVE-2023-2373.json) (`2023-05-09T01:47:02.103`)
* [CVE-2023-26782](CVE-2023/CVE-2023-267xx/CVE-2023-26782.json) (`2023-05-09T01:54:45.817`)
* [CVE-2023-29268](CVE-2023/CVE-2023-292xx/CVE-2023-29268.json) (`2023-05-09T01:31:28.760`)
* [CVE-2023-30125](CVE-2023/CVE-2023-301xx/CVE-2023-30125.json) (`2023-05-09T01:07:27.727`)
* [CVE-2023-30854](CVE-2023/CVE-2023-308xx/CVE-2023-30854.json) (`2023-05-09T01:14:01.287`)
* [CVE-2020-26298](CVE-2020/CVE-2020-262xx/CVE-2020-26298.json) (`2023-05-09T03:15:09.043`)
* [CVE-2023-26813](CVE-2023/CVE-2023-268xx/CVE-2023-26813.json) (`2023-05-09T02:25:14.460`)
* [CVE-2023-28762](CVE-2023/CVE-2023-287xx/CVE-2023-28762.json) (`2023-05-09T02:15:12.050`)
* [CVE-2023-30265](CVE-2023/CVE-2023-302xx/CVE-2023-30265.json) (`2023-05-09T03:15:09.390`)
* [CVE-2023-30269](CVE-2023/CVE-2023-302xx/CVE-2023-30269.json) (`2023-05-09T03:15:09.733`)
* [CVE-2023-30441](CVE-2023/CVE-2023-304xx/CVE-2023-30441.json) (`2023-05-09T02:31:07.290`)
* [CVE-2023-30454](CVE-2023/CVE-2023-304xx/CVE-2023-30454.json) (`2023-05-09T02:04:28.353`)
* [CVE-2023-30455](CVE-2023/CVE-2023-304xx/CVE-2023-30455.json) (`2023-05-09T02:16:18.417`)
## Download and Usage