mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2023-05-09T04:00:24.012212+00:00
This commit is contained in:
parent
44dcb55424
commit
06f0c4623d
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-26298",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2021-01-11T19:15:13.133",
|
||||
"lastModified": "2022-10-07T00:22:56.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-09T03:15:09.043",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -169,6 +169,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNO4ZZUPGAEUXKQL4G2HRIH7CUZKPCT6/",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://rubygems.org/gems/redcarpet",
|
||||
"source": "security-advisories@github.com",
|
||||
|
28
CVE-2021/CVE-2021-312xx/CVE-2021-31239.json
Normal file
28
CVE-2021/CVE-2021-312xx/CVE-2021-31239.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2021-31239",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-09T02:15:08.907",
|
||||
"lastModified": "2023-05-09T02:15:08.907",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue found in SQLite SQLite3 v.3.35.4 that allows a remote attacker to cause a denial of service via the appendvfs.c function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Tsiming/Vulnerabilities/blob/main/SQLite/CVE-2021-31239",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sqlite.org/cves.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sqlite.org/forum/forumpost/d9fce1a89b",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2021/CVE-2021-442xx/CVE-2021-44283.json
Normal file
32
CVE-2021/CVE-2021-442xx/CVE-2021-44283.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2021-44283",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-09T03:15:09.197",
|
||||
"lastModified": "2023-05-09T03:15:09.197",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow in the component /Enclave.cpp of Electronics and Telecommunications Research Institute ShieldStore commit 58d455617f99705f0ffd8a27616abdf77bdc1bdc allows attackers to cause an information leak via a crafted structure from an untrusted operating system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://electronics.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://shieldstore.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cocoppang/ShieldStore/blob/master/Enclave/Enclave.cpp",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cocoppang/ShieldStore/issues/19",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-386xx/CVE-2022-38685.json
Normal file
20
CVE-2022/CVE-2022-386xx/CVE-2022-38685.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-38685",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:08.973",
|
||||
"lastModified": "2023-05-09T02:15:08.973",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In bluetooth service, there is a possible missing permission check. This could lead to local denial of service in bluetooth service with no additional execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-390xx/CVE-2022-39089.json
Normal file
20
CVE-2022/CVE-2022-390xx/CVE-2022-39089.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-39089",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.023",
|
||||
"lastModified": "2023-05-09T02:15:09.023",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In mlog service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-444xx/CVE-2022-44419.json
Normal file
20
CVE-2022/CVE-2022-444xx/CVE-2022-44419.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-44419",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.073",
|
||||
"lastModified": "2023-05-09T02:15:09.073",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In modem, there is a possible missing verification of NAS Security Mode Command Replay Attacks in LTE. This could local denial of service with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-444xx/CVE-2022-44420.json
Normal file
20
CVE-2022/CVE-2022-444xx/CVE-2022-44420.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-44420",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.133",
|
||||
"lastModified": "2023-05-09T02:15:09.133",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In modem, there is a possible missing verification of HashMME value in Security Mode Command. This could local denial of service with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-444xx/CVE-2022-44433.json
Normal file
20
CVE-2022/CVE-2022-444xx/CVE-2022-44433.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-44433",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.190",
|
||||
"lastModified": "2023-05-09T02:15:09.190",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In phoneEx service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2022/CVE-2022-45xx/CVE-2022-4537.json
Normal file
63
CVE-2022/CVE-2022-45xx/CVE-2022-4537.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2022-4537",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-05-09T03:15:09.267",
|
||||
"lastModified": "2023-05-09T03:15:09.267",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Hide My WP Ghost \u2013 Security Plugin plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 5.0.18. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address from logging in."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-348"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/hide-my-wp/tags/5.0.18/models/Brute.php#L131",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/hide-my-wp/trunk/models/Brute.php#L132",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4cf89f94-587a-4fed-a6e4-3876b7dbc9ba?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-473xx/CVE-2022-47334.json
Normal file
20
CVE-2022/CVE-2022-473xx/CVE-2022-47334.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47334",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.240",
|
||||
"lastModified": "2023-05-09T02:15:09.240",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In phasecheck server, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-473xx/CVE-2022-47340.json
Normal file
20
CVE-2022/CVE-2022-473xx/CVE-2022-47340.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47340",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.290",
|
||||
"lastModified": "2023-05-09T02:15:09.290",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In h265 codec firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47469.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47469.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47469",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.333",
|
||||
"lastModified": "2023-05-09T02:15:09.333",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ext4fsfilter driver, there is a possible out of bounds read due to a missing bounds check. This could local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47470.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47470.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47470",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.383",
|
||||
"lastModified": "2023-05-09T02:15:09.383",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ext4fsfilter driver, there is a possible out of bounds read due to a missing bounds check. This could local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47485.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47485.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47485",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.430",
|
||||
"lastModified": "2023-05-09T02:15:09.430",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In modem control device, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47486.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47486.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47486",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.480",
|
||||
"lastModified": "2023-05-09T02:15:09.480",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ext4fsfilter driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47487.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47487.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47487",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.527",
|
||||
"lastModified": "2023-05-09T02:15:09.527",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In thermal service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service local denial of service with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47488.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47488.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47488",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.567",
|
||||
"lastModified": "2023-05-09T02:15:09.567",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In spipe drive, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47489.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47489.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47489",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.613",
|
||||
"lastModified": "2023-05-09T02:15:09.613",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47490.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47490.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47490",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.660",
|
||||
"lastModified": "2023-05-09T02:15:09.660",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In soter service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47491.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47491.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47491",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.707",
|
||||
"lastModified": "2023-05-09T02:15:09.707",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47492.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47492.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47492",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.753",
|
||||
"lastModified": "2023-05-09T02:15:09.753",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In soter service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47493.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47493.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47493",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.797",
|
||||
"lastModified": "2023-05-09T02:15:09.797",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In soter service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47494.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47494.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47494",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.843",
|
||||
"lastModified": "2023-05-09T02:15:09.843",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47495.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47495.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47495",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.890",
|
||||
"lastModified": "2023-05-09T02:15:09.890",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47496.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47496.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47496",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.943",
|
||||
"lastModified": "2023-05-09T02:15:09.943",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47497.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47497.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47497",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:09.987",
|
||||
"lastModified": "2023-05-09T02:15:09.987",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47498.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47498.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47498",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.033",
|
||||
"lastModified": "2023-05-09T02:15:10.033",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-474xx/CVE-2022-47499.json
Normal file
20
CVE-2022/CVE-2022-474xx/CVE-2022-47499.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-47499",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.083",
|
||||
"lastModified": "2023-05-09T02:15:10.083",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48231.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48231.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48231",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.133",
|
||||
"lastModified": "2023-05-09T02:15:10.133",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In soter service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48232.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48232.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48232",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.187",
|
||||
"lastModified": "2023-05-09T02:15:10.187",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In FM service , there is a possible missing params check. This could lead to local denial of service in FM service ."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48233.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48233.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48233",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.233",
|
||||
"lastModified": "2023-05-09T02:15:10.233",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In FM service , there is a possible missing params check. This could lead to local denial of service in FM service ."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48234.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48234.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48234",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.277",
|
||||
"lastModified": "2023-05-09T02:15:10.277",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In FM service , there is a possible missing params check. This could lead to local denial of service in FM service ."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48235.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48235.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48235",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.317",
|
||||
"lastModified": "2023-05-09T02:15:10.317",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In MP3 encoder, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48236.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48236.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48236",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.360",
|
||||
"lastModified": "2023-05-09T02:15:10.360",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In MP3 encoder, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48237.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48237.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48237",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.403",
|
||||
"lastModified": "2023-05-09T02:15:10.403",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Image filter, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48238.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48238.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48238",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.447",
|
||||
"lastModified": "2023-05-09T02:15:10.447",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Image filter, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48239.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48239.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48239",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.490",
|
||||
"lastModified": "2023-05-09T02:15:10.490",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In camera driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48240.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48240.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48240",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.540",
|
||||
"lastModified": "2023-05-09T02:15:10.540",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In camera driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48241.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48241.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48241",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.587",
|
||||
"lastModified": "2023-05-09T02:15:10.587",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telephony service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48242.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48242.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48242",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.633",
|
||||
"lastModified": "2023-05-09T02:15:10.633",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48243.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48243.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48243",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.677",
|
||||
"lastModified": "2023-05-09T02:15:10.677",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48244.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48244.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48244",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.727",
|
||||
"lastModified": "2023-05-09T02:15:10.727",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48245.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48245.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48245",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.770",
|
||||
"lastModified": "2023-05-09T02:15:10.770",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48246.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48246.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48246",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.817",
|
||||
"lastModified": "2023-05-09T02:15:10.817",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48247.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48247.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48247",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.867",
|
||||
"lastModified": "2023-05-09T02:15:10.867",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48248.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48248.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48248",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.910",
|
||||
"lastModified": "2023-05-09T02:15:10.910",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48249.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48249.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48249",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.957",
|
||||
"lastModified": "2023-05-09T02:15:10.957",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-482xx/CVE-2022-48250.json
Normal file
20
CVE-2022/CVE-2022-482xx/CVE-2022-48250.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48250",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:10.997",
|
||||
"lastModified": "2023-05-09T02:15:10.997",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48368.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48368.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48368",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.037",
|
||||
"lastModified": "2023-05-09T02:15:11.037",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48369.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48369.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48369",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.083",
|
||||
"lastModified": "2023-05-09T02:15:11.083",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48370.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48370.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48370",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.120",
|
||||
"lastModified": "2023-05-09T02:15:11.120",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In dialer service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48371.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48371.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48371",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.163",
|
||||
"lastModified": "2023-05-09T02:15:11.163",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In dialer service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48372.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48372.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48372",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.210",
|
||||
"lastModified": "2023-05-09T02:15:11.210",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In bootcp service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48373.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48373.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48373",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.253",
|
||||
"lastModified": "2023-05-09T02:15:11.253",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In tee service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48374.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48374.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48374",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.297",
|
||||
"lastModified": "2023-05-09T02:15:11.297",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In tee service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48375.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48375.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48375",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.347",
|
||||
"lastModified": "2023-05-09T02:15:11.347",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In contacts service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48376.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48376.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48376",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.397",
|
||||
"lastModified": "2023-05-09T02:15:11.397",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In dialer service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48377.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48377.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48377",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.457",
|
||||
"lastModified": "2023-05-09T02:15:11.457",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In dialer service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48378.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48378.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48378",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.500",
|
||||
"lastModified": "2023-05-09T02:15:11.500",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In engineermode service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48379.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48379.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48379",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.547",
|
||||
"lastModified": "2023-05-09T02:15:11.547",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In dialer service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48380.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48380.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48380",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.593",
|
||||
"lastModified": "2023-05-09T02:15:11.593",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In modem control device, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48381.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48381.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48381",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.637",
|
||||
"lastModified": "2023-05-09T02:15:11.637",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In modem control device, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48382.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48382.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48382",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.690",
|
||||
"lastModified": "2023-05-09T02:15:11.690",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In log service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48383.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48383.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48383",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.737",
|
||||
"lastModified": "2023-05-09T02:15:11.737",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": ".In srtd service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48384.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48384.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48384",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.787",
|
||||
"lastModified": "2023-05-09T02:15:11.787",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In srtd service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48385.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48385.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48385",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.833",
|
||||
"lastModified": "2023-05-09T02:15:11.833",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In cp_dump driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48386.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48386.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48386",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.877",
|
||||
"lastModified": "2023-05-09T02:15:11.877",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "the apipe driver, there is a possible use after free due to a logic error. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48387.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48387.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48387",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.920",
|
||||
"lastModified": "2023-05-09T02:15:11.920",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "the apipe driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48388.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48388.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48388",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.960",
|
||||
"lastModified": "2023-05-09T02:15:11.960",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In powerEx service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-483xx/CVE-2022-48389.json
Normal file
20
CVE-2022/CVE-2022-483xx/CVE-2022-48389.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48389",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:12.003",
|
||||
"lastModified": "2023-05-09T02:15:12.003",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In modem control device, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,75 @@
|
||||
"id": "CVE-2023-26813",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T20:15:13.970",
|
||||
"lastModified": "2023-04-28T22:22:40.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T02:25:14.460",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in com.xnx3.wangmarket.plugin.dataDictionary.controller.DataDictionaryPluginController.java in wangmarket CMS 4.10 allows remote attackers to run arbitrary SQL commands via the TableName parameter to /plugin/dataDictionary/tableView.do."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wang.market:wangmarket_cms:4.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3178DD35-93D4-4404-87A6-370C78E97DE8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xnx3/wangmarket/issues/7",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28762",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-05-09T01:15:08.777",
|
||||
"lastModified": "2023-05-09T01:15:08.777",
|
||||
"lastModified": "2023-05-09T02:15:12.050",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -48,7 +48,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://i7p.wdf.sap.corp/sap/support/notes/3307833",
|
||||
"url": "https://launchpad.support.sap.com/#/notes/3307833",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
|
43
CVE-2023/CVE-2023-290xx/CVE-2023-29092.json
Normal file
43
CVE-2023/CVE-2023-290xx/CVE-2023-29092.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-29092",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-09T02:15:12.127",
|
||||
"lastModified": "2023-05-09T02:15:12.127",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Exynos Mobile Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, and Exynos 1080. Binding of a wrong resource can occur due to improper handling of parameters while binding a network interface."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-302xx/CVE-2023-30237.json
Normal file
28
CVE-2023/CVE-2023-302xx/CVE-2023-30237.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-30237",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-09T03:15:09.343",
|
||||
"lastModified": "2023-05-09T03:15:09.343",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CyberGhostVPN Windows Client before v8.3.10.10015 was discovered to contain a DLL injection vulnerability via the component Dashboard.exe."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://cyberghostvpn.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/77.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.pentestpartners.com/security-blog/bullied-by-bugcrowd-over-kape-cyberghost-disclosure/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-30265",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-26T14:15:09.697",
|
||||
"lastModified": "2023-05-04T20:15:10.427",
|
||||
"lastModified": "2023-05-09T03:15:09.390",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -68,13 +68,6 @@
|
||||
{
|
||||
"url": "https://gist.github.com/HuBenLab/1d1bc201d5df41426d719e56d4421b30",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Path%20Traversal.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-30269",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-26T14:15:09.813",
|
||||
"lastModified": "2023-05-04T20:15:10.617",
|
||||
"lastModified": "2023-05-09T03:15:09.733",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -68,13 +68,6 @@
|
||||
{
|
||||
"url": "https://gist.github.com/HuBenLab/f5eb8ebbba20c835a3170d392c9e46a4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Improper%20Input%20Validation%201.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30441",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-04-29T15:15:18.953",
|
||||
"lastModified": "2023-05-01T10:39:42.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T02:31:07.290",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -36,8 +56,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -46,26 +76,88 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:java:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.7.0",
|
||||
"versionEndExcluding": "8.0.7.15",
|
||||
"matchCriteriaId": "4B6E494E-BA83-4743-B9DD-4DE1F3BC0637"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "8.5.0.0",
|
||||
"versionEndExcluding": "8.5.5.23",
|
||||
"matchCriteriaId": "E06F1A60-BE9C-4922-A4A6-E4E1EF57A06D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:websphere_application_server:-:*:*:*:liberty:*:*:*",
|
||||
"matchCriteriaId": "7E0B3D5C-C912-4874-AD3D-62B6E6EBE742"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:websphere_application_server:9.0.0.0:*:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "E79B1229-6DC0-4461-B814-1F671AE0A090"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:z\\/transaction_processing_facility:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3BF7682-2984-4286-9C17-2B650A4275E7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253188",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/6985011",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/6986617",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/6986637",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/6987167",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,83 @@
|
||||
"id": "CVE-2023-30454",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T19:15:16.993",
|
||||
"lastModified": "2023-04-28T22:22:40.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T02:04:28.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ebankIT before 7. Document Object Model based XSS exists within the /Security/Transactions/Transactions.aspx endpoint. Users can supply their own JavaScript within the ctl100$ctl00MainContent$TransactionMainContent$accControl$hdnAccountsArray POST parameter that will be passed to an eval() function and executed upon pressing the continue button."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ebankit:ebankit:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.0",
|
||||
"matchCriteriaId": "69D21BC0-ED24-49AD-B393-013DC3B55313"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.ebankit.com/blog-press",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/172063/ebankIT-6-Cross-Site-Scripting.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,83 @@
|
||||
"id": "CVE-2023-30455",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T18:15:26.680",
|
||||
"lastModified": "2023-04-28T18:25:52.200",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T02:16:18.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ebankIT before 7. A Denial-of-Service attack is possible through the GET parameter EStatementsIds located on the /Controls/Generic/EBMK/Handlers/EStatements/DownloadEStatement.ashx endpoint. The GET parameter accepts over 100 comma-separated e-statement IDs without throwing an error. When this many IDs are supplied, the server takes around 60 seconds to respond and successfully generate the expected ZIP archive (during this time period, no other pages load). A threat actor could issue a request to this endpoint with 100+ statement IDs every 30 seconds, potentially resulting in an overload of the server for all users."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ebankit:ebankit:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.0",
|
||||
"matchCriteriaId": "69D21BC0-ED24-49AD-B393-013DC3B55313"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.ebankit.com/blog-press",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/172064/ebankIT-6-Denial-Of-Service.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-307xx/CVE-2023-30740.json
Normal file
59
CVE-2023/CVE-2023-307xx/CVE-2023-30740.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-30740",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-05-09T02:15:12.190",
|
||||
"lastModified": "2023-05-09T02:15:12.190",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP BusinessObjects Business Intelligence Platform - versions 420, 430, allows an authenticated attacker to access sensitive information which is otherwise restricted. On successful exploitation, there could be a high impact on confidentiality, limited impact on integrity and availability of the application.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/3313484",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-307xx/CVE-2023-30741.json
Normal file
59
CVE-2023/CVE-2023-307xx/CVE-2023-30741.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-30741",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-05-09T02:15:12.260",
|
||||
"lastModified": "2023-05-09T02:15:12.260",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Due to insufficient input validation, SAP BusinessObjects Business Intelligence Platform - versions 420, 430, allows an unauthenticated attacker to redirect users to untrusted site using a malicious link. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/3309935",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-307xx/CVE-2023-30742.json
Normal file
59
CVE-2023/CVE-2023-307xx/CVE-2023-30742.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-30742",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-05-09T02:15:12.333",
|
||||
"lastModified": "2023-05-09T02:15:12.333",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP CRM (WebClient UI) - versions S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, WEBCUIF 700, WEBCUIF 701, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in a stored Cross-Site Scripting (XSS) vulnerability.An attacker could store a malicious URL and lure the victim to click, causing the script supplied by the attacker to execute in the victim user's session. The information from the victim's session could then be modified or read by the attacker.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/3315971",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-307xx/CVE-2023-30743.json
Normal file
59
CVE-2023/CVE-2023-307xx/CVE-2023-30743.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-30743",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-05-09T02:15:12.397",
|
||||
"lastModified": "2023-05-09T02:15:12.397",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Due to improper neutralization of input in SAPUI5 - versions SAP_UI 750, SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, UI_700 200, sap.m.FormattedText SAPUI5 control allows injection of untrusted CSS. This blocks user\u2019s interaction with the application. Further, in the absence of URL validation by the application, the vulnerability could lead to the attacker reading or modifying user\u2019s information through phishing attack.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/3326210",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2023/CVE-2023-307xx/CVE-2023-30744.json
Normal file
63
CVE-2023/CVE-2023-307xx/CVE-2023-30744.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-30744",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-05-09T02:15:12.460",
|
||||
"lastModified": "2023-05-09T02:15:12.460",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In SAP AS NetWeaver JAVA - versions SERVERCORE 7.50, J2EE-FRMW 7.50, CORE-TOOLS 7.50, an unauthenticated attacker can attach to an open interface and make use of an open naming and directory API to instantiate an object which has methods which can be called without further authorization and authentication. \u00a0A subsequent call to one of these methods can read or change the state of existing services without any effect on availability.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/3317453",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-314xx/CVE-2023-31404.json
Normal file
59
CVE-2023/CVE-2023-314xx/CVE-2023-31404.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-31404",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-05-09T02:15:12.537",
|
||||
"lastModified": "2023-05-09T02:15:12.537",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Under certain conditions,\u00a0SAP BusinessObjects Business Intelligence Platform (Central Management Service) - versions 420, 430, allows an attacker to access information which would otherwise be restricted. Some users with specific privileges could have access to credentials of other users. It could let them access data sources which would otherwise be restricted.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/3038911",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-314xx/CVE-2023-31406.json
Normal file
59
CVE-2023/CVE-2023-314xx/CVE-2023-31406.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-31406",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-05-09T02:15:12.603",
|
||||
"lastModified": "2023-05-09T02:15:12.603",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Due to insufficient input validation, SAP BusinessObjects Business Intelligence Platform - versions 420, 430, allows an unauthenticated attacker to redirect users to untrusted site using a malicious link. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/3319400",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-314xx/CVE-2023-31407.json
Normal file
59
CVE-2023/CVE-2023-314xx/CVE-2023-31407.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-31407",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-05-09T02:15:12.667",
|
||||
"lastModified": "2023-05-09T02:15:12.667",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP Business Planning and Consolidation - versions 740, 750, allows an authorized attacker to upload a malicious file, resulting in Cross-Site Scripting vulnerability. After successful exploitation, an attacker can cause limited impact on confidentiality and integrity of the application.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/3312892",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-321xx/CVE-2023-32111.json
Normal file
59
CVE-2023/CVE-2023-321xx/CVE-2023-32111.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-32111",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-05-09T02:15:12.733",
|
||||
"lastModified": "2023-05-09T02:15:12.733",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In SAP PowerDesigner (Proxy) - version 16.7, an attacker can send a crafted request from a remote host to the proxy machine and crash the proxy server, due to faulty implementation of memory management causing a memory corruption. This leads to a high impact on availability of the application.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/3300624",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-321xx/CVE-2023-32112.json
Normal file
59
CVE-2023/CVE-2023-321xx/CVE-2023-32112.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-32112",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-05-09T02:15:12.800",
|
||||
"lastModified": "2023-05-09T02:15:12.800",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vendor Master Hierarchy - versions SAP_APPL 500, SAP_APPL 600, SAP_APPL 602, SAP_APPL 603, SAP_APPL 604, SAP_APPL 605, SAP_APPL 606, SAP_APPL 616, SAP_APPL 617, SAP_APPL 618, S4CORE 100, does not perform necessary authorization checks for an authenticated user to\u00a0access some of its function. This could lead to modification of data impacting the integrity of the system.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.8,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2335198",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-321xx/CVE-2023-32113.json
Normal file
59
CVE-2023/CVE-2023-321xx/CVE-2023-32113.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-32113",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-05-09T02:15:12.873",
|
||||
"lastModified": "2023-05-09T02:15:12.873",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP GUI for Windows - version 7.70, 8.0, allows an unauthorized attacker to gain NTLM authentication information of a victim by tricking it into clicking a prepared shortcut file. Depending on the authorizations of the victim, the attacker can read and modify potentially sensitive information after successful exploitation.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://launchpad.support.sap.com/#/notes/3320467",
|
||||
"source": "cna@sap.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
||||
"source": "cna@sap.com"
|
||||
}
|
||||
]
|
||||
}
|
113
README.md
113
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-05-09T02:00:51.002610+00:00
|
||||
2023-05-09T04:00:24.012212+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-05-09T01:54:45.817000+00:00
|
||||
2023-05-09T03:15:09.733000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,32 +29,109 @@ Download and Changelog: [Click](releases/latest)
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
214412
|
||||
214494
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `82`
|
||||
|
||||
* [CVE-2023-28762](CVE-2023/CVE-2023-287xx/CVE-2023-28762.json) (`2023-05-09T01:15:08.777`)
|
||||
* [CVE-2023-28764](CVE-2023/CVE-2023-287xx/CVE-2023-28764.json) (`2023-05-09T01:15:08.863`)
|
||||
* [CVE-2023-29188](CVE-2023/CVE-2023-291xx/CVE-2023-29188.json) (`2023-05-09T01:15:08.943`)
|
||||
* [CVE-2021-31239](CVE-2021/CVE-2021-312xx/CVE-2021-31239.json) (`2023-05-09T02:15:08.907`)
|
||||
* [CVE-2021-44283](CVE-2021/CVE-2021-442xx/CVE-2021-44283.json) (`2023-05-09T03:15:09.197`)
|
||||
* [CVE-2022-38685](CVE-2022/CVE-2022-386xx/CVE-2022-38685.json) (`2023-05-09T02:15:08.973`)
|
||||
* [CVE-2022-39089](CVE-2022/CVE-2022-390xx/CVE-2022-39089.json) (`2023-05-09T02:15:09.023`)
|
||||
* [CVE-2022-44419](CVE-2022/CVE-2022-444xx/CVE-2022-44419.json) (`2023-05-09T02:15:09.073`)
|
||||
* [CVE-2022-44420](CVE-2022/CVE-2022-444xx/CVE-2022-44420.json) (`2023-05-09T02:15:09.133`)
|
||||
* [CVE-2022-44433](CVE-2022/CVE-2022-444xx/CVE-2022-44433.json) (`2023-05-09T02:15:09.190`)
|
||||
* [CVE-2022-4537](CVE-2022/CVE-2022-45xx/CVE-2022-4537.json) (`2023-05-09T03:15:09.267`)
|
||||
* [CVE-2022-47334](CVE-2022/CVE-2022-473xx/CVE-2022-47334.json) (`2023-05-09T02:15:09.240`)
|
||||
* [CVE-2022-47340](CVE-2022/CVE-2022-473xx/CVE-2022-47340.json) (`2023-05-09T02:15:09.290`)
|
||||
* [CVE-2022-47469](CVE-2022/CVE-2022-474xx/CVE-2022-47469.json) (`2023-05-09T02:15:09.333`)
|
||||
* [CVE-2022-47470](CVE-2022/CVE-2022-474xx/CVE-2022-47470.json) (`2023-05-09T02:15:09.383`)
|
||||
* [CVE-2022-47485](CVE-2022/CVE-2022-474xx/CVE-2022-47485.json) (`2023-05-09T02:15:09.430`)
|
||||
* [CVE-2022-47486](CVE-2022/CVE-2022-474xx/CVE-2022-47486.json) (`2023-05-09T02:15:09.480`)
|
||||
* [CVE-2022-47487](CVE-2022/CVE-2022-474xx/CVE-2022-47487.json) (`2023-05-09T02:15:09.527`)
|
||||
* [CVE-2022-47488](CVE-2022/CVE-2022-474xx/CVE-2022-47488.json) (`2023-05-09T02:15:09.567`)
|
||||
* [CVE-2022-47489](CVE-2022/CVE-2022-474xx/CVE-2022-47489.json) (`2023-05-09T02:15:09.613`)
|
||||
* [CVE-2022-47490](CVE-2022/CVE-2022-474xx/CVE-2022-47490.json) (`2023-05-09T02:15:09.660`)
|
||||
* [CVE-2022-47491](CVE-2022/CVE-2022-474xx/CVE-2022-47491.json) (`2023-05-09T02:15:09.707`)
|
||||
* [CVE-2022-47492](CVE-2022/CVE-2022-474xx/CVE-2022-47492.json) (`2023-05-09T02:15:09.753`)
|
||||
* [CVE-2022-47493](CVE-2022/CVE-2022-474xx/CVE-2022-47493.json) (`2023-05-09T02:15:09.797`)
|
||||
* [CVE-2022-47494](CVE-2022/CVE-2022-474xx/CVE-2022-47494.json) (`2023-05-09T02:15:09.843`)
|
||||
* [CVE-2022-47495](CVE-2022/CVE-2022-474xx/CVE-2022-47495.json) (`2023-05-09T02:15:09.890`)
|
||||
* [CVE-2022-47496](CVE-2022/CVE-2022-474xx/CVE-2022-47496.json) (`2023-05-09T02:15:09.943`)
|
||||
* [CVE-2022-47497](CVE-2022/CVE-2022-474xx/CVE-2022-47497.json) (`2023-05-09T02:15:09.987`)
|
||||
* [CVE-2022-47498](CVE-2022/CVE-2022-474xx/CVE-2022-47498.json) (`2023-05-09T02:15:10.033`)
|
||||
* [CVE-2022-47499](CVE-2022/CVE-2022-474xx/CVE-2022-47499.json) (`2023-05-09T02:15:10.083`)
|
||||
* [CVE-2022-48231](CVE-2022/CVE-2022-482xx/CVE-2022-48231.json) (`2023-05-09T02:15:10.133`)
|
||||
* [CVE-2022-48232](CVE-2022/CVE-2022-482xx/CVE-2022-48232.json) (`2023-05-09T02:15:10.187`)
|
||||
* [CVE-2022-48233](CVE-2022/CVE-2022-482xx/CVE-2022-48233.json) (`2023-05-09T02:15:10.233`)
|
||||
* [CVE-2022-48234](CVE-2022/CVE-2022-482xx/CVE-2022-48234.json) (`2023-05-09T02:15:10.277`)
|
||||
* [CVE-2022-48235](CVE-2022/CVE-2022-482xx/CVE-2022-48235.json) (`2023-05-09T02:15:10.317`)
|
||||
* [CVE-2022-48236](CVE-2022/CVE-2022-482xx/CVE-2022-48236.json) (`2023-05-09T02:15:10.360`)
|
||||
* [CVE-2022-48237](CVE-2022/CVE-2022-482xx/CVE-2022-48237.json) (`2023-05-09T02:15:10.403`)
|
||||
* [CVE-2022-48238](CVE-2022/CVE-2022-482xx/CVE-2022-48238.json) (`2023-05-09T02:15:10.447`)
|
||||
* [CVE-2022-48239](CVE-2022/CVE-2022-482xx/CVE-2022-48239.json) (`2023-05-09T02:15:10.490`)
|
||||
* [CVE-2022-48240](CVE-2022/CVE-2022-482xx/CVE-2022-48240.json) (`2023-05-09T02:15:10.540`)
|
||||
* [CVE-2022-48241](CVE-2022/CVE-2022-482xx/CVE-2022-48241.json) (`2023-05-09T02:15:10.587`)
|
||||
* [CVE-2022-48242](CVE-2022/CVE-2022-482xx/CVE-2022-48242.json) (`2023-05-09T02:15:10.633`)
|
||||
* [CVE-2022-48243](CVE-2022/CVE-2022-482xx/CVE-2022-48243.json) (`2023-05-09T02:15:10.677`)
|
||||
* [CVE-2022-48244](CVE-2022/CVE-2022-482xx/CVE-2022-48244.json) (`2023-05-09T02:15:10.727`)
|
||||
* [CVE-2022-48245](CVE-2022/CVE-2022-482xx/CVE-2022-48245.json) (`2023-05-09T02:15:10.770`)
|
||||
* [CVE-2022-48246](CVE-2022/CVE-2022-482xx/CVE-2022-48246.json) (`2023-05-09T02:15:10.817`)
|
||||
* [CVE-2022-48247](CVE-2022/CVE-2022-482xx/CVE-2022-48247.json) (`2023-05-09T02:15:10.867`)
|
||||
* [CVE-2022-48248](CVE-2022/CVE-2022-482xx/CVE-2022-48248.json) (`2023-05-09T02:15:10.910`)
|
||||
* [CVE-2022-48249](CVE-2022/CVE-2022-482xx/CVE-2022-48249.json) (`2023-05-09T02:15:10.957`)
|
||||
* [CVE-2022-48250](CVE-2022/CVE-2022-482xx/CVE-2022-48250.json) (`2023-05-09T02:15:10.997`)
|
||||
* [CVE-2022-48368](CVE-2022/CVE-2022-483xx/CVE-2022-48368.json) (`2023-05-09T02:15:11.037`)
|
||||
* [CVE-2022-48369](CVE-2022/CVE-2022-483xx/CVE-2022-48369.json) (`2023-05-09T02:15:11.083`)
|
||||
* [CVE-2022-48370](CVE-2022/CVE-2022-483xx/CVE-2022-48370.json) (`2023-05-09T02:15:11.120`)
|
||||
* [CVE-2022-48371](CVE-2022/CVE-2022-483xx/CVE-2022-48371.json) (`2023-05-09T02:15:11.163`)
|
||||
* [CVE-2022-48372](CVE-2022/CVE-2022-483xx/CVE-2022-48372.json) (`2023-05-09T02:15:11.210`)
|
||||
* [CVE-2022-48373](CVE-2022/CVE-2022-483xx/CVE-2022-48373.json) (`2023-05-09T02:15:11.253`)
|
||||
* [CVE-2022-48374](CVE-2022/CVE-2022-483xx/CVE-2022-48374.json) (`2023-05-09T02:15:11.297`)
|
||||
* [CVE-2022-48375](CVE-2022/CVE-2022-483xx/CVE-2022-48375.json) (`2023-05-09T02:15:11.347`)
|
||||
* [CVE-2022-48376](CVE-2022/CVE-2022-483xx/CVE-2022-48376.json) (`2023-05-09T02:15:11.397`)
|
||||
* [CVE-2022-48377](CVE-2022/CVE-2022-483xx/CVE-2022-48377.json) (`2023-05-09T02:15:11.457`)
|
||||
* [CVE-2022-48378](CVE-2022/CVE-2022-483xx/CVE-2022-48378.json) (`2023-05-09T02:15:11.500`)
|
||||
* [CVE-2022-48379](CVE-2022/CVE-2022-483xx/CVE-2022-48379.json) (`2023-05-09T02:15:11.547`)
|
||||
* [CVE-2022-48380](CVE-2022/CVE-2022-483xx/CVE-2022-48380.json) (`2023-05-09T02:15:11.593`)
|
||||
* [CVE-2022-48381](CVE-2022/CVE-2022-483xx/CVE-2022-48381.json) (`2023-05-09T02:15:11.637`)
|
||||
* [CVE-2022-48382](CVE-2022/CVE-2022-483xx/CVE-2022-48382.json) (`2023-05-09T02:15:11.690`)
|
||||
* [CVE-2022-48383](CVE-2022/CVE-2022-483xx/CVE-2022-48383.json) (`2023-05-09T02:15:11.737`)
|
||||
* [CVE-2022-48384](CVE-2022/CVE-2022-483xx/CVE-2022-48384.json) (`2023-05-09T02:15:11.787`)
|
||||
* [CVE-2022-48385](CVE-2022/CVE-2022-483xx/CVE-2022-48385.json) (`2023-05-09T02:15:11.833`)
|
||||
* [CVE-2022-48386](CVE-2022/CVE-2022-483xx/CVE-2022-48386.json) (`2023-05-09T02:15:11.877`)
|
||||
* [CVE-2022-48387](CVE-2022/CVE-2022-483xx/CVE-2022-48387.json) (`2023-05-09T02:15:11.920`)
|
||||
* [CVE-2022-48388](CVE-2022/CVE-2022-483xx/CVE-2022-48388.json) (`2023-05-09T02:15:11.960`)
|
||||
* [CVE-2022-48389](CVE-2022/CVE-2022-483xx/CVE-2022-48389.json) (`2023-05-09T02:15:12.003`)
|
||||
* [CVE-2023-29092](CVE-2023/CVE-2023-290xx/CVE-2023-29092.json) (`2023-05-09T02:15:12.127`)
|
||||
* [CVE-2023-30237](CVE-2023/CVE-2023-302xx/CVE-2023-30237.json) (`2023-05-09T03:15:09.343`)
|
||||
* [CVE-2023-30740](CVE-2023/CVE-2023-307xx/CVE-2023-30740.json) (`2023-05-09T02:15:12.190`)
|
||||
* [CVE-2023-30741](CVE-2023/CVE-2023-307xx/CVE-2023-30741.json) (`2023-05-09T02:15:12.260`)
|
||||
* [CVE-2023-30742](CVE-2023/CVE-2023-307xx/CVE-2023-30742.json) (`2023-05-09T02:15:12.333`)
|
||||
* [CVE-2023-30743](CVE-2023/CVE-2023-307xx/CVE-2023-30743.json) (`2023-05-09T02:15:12.397`)
|
||||
* [CVE-2023-30744](CVE-2023/CVE-2023-307xx/CVE-2023-30744.json) (`2023-05-09T02:15:12.460`)
|
||||
* [CVE-2023-31404](CVE-2023/CVE-2023-314xx/CVE-2023-31404.json) (`2023-05-09T02:15:12.537`)
|
||||
* [CVE-2023-31406](CVE-2023/CVE-2023-314xx/CVE-2023-31406.json) (`2023-05-09T02:15:12.603`)
|
||||
* [CVE-2023-31407](CVE-2023/CVE-2023-314xx/CVE-2023-31407.json) (`2023-05-09T02:15:12.667`)
|
||||
* [CVE-2023-32111](CVE-2023/CVE-2023-321xx/CVE-2023-32111.json) (`2023-05-09T02:15:12.733`)
|
||||
* [CVE-2023-32112](CVE-2023/CVE-2023-321xx/CVE-2023-32112.json) (`2023-05-09T02:15:12.800`)
|
||||
* [CVE-2023-32113](CVE-2023/CVE-2023-321xx/CVE-2023-32113.json) (`2023-05-09T02:15:12.873`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `10`
|
||||
Recently modified CVEs: `8`
|
||||
|
||||
* [CVE-2022-25278](CVE-2022/CVE-2022-252xx/CVE-2022-25278.json) (`2023-05-09T01:38:43.977`)
|
||||
* [CVE-2022-44232](CVE-2022/CVE-2022-442xx/CVE-2022-44232.json) (`2023-05-09T01:26:15.347`)
|
||||
* [CVE-2023-0834](CVE-2023/CVE-2023-08xx/CVE-2023-0834.json) (`2023-05-09T01:20:26.127`)
|
||||
* [CVE-2023-2140](CVE-2023/CVE-2023-21xx/CVE-2023-2140.json) (`2023-05-09T00:56:42.793`)
|
||||
* [CVE-2023-2141](CVE-2023/CVE-2023-21xx/CVE-2023-2141.json) (`2023-05-09T01:01:22.827`)
|
||||
* [CVE-2023-2373](CVE-2023/CVE-2023-23xx/CVE-2023-2373.json) (`2023-05-09T01:47:02.103`)
|
||||
* [CVE-2023-26782](CVE-2023/CVE-2023-267xx/CVE-2023-26782.json) (`2023-05-09T01:54:45.817`)
|
||||
* [CVE-2023-29268](CVE-2023/CVE-2023-292xx/CVE-2023-29268.json) (`2023-05-09T01:31:28.760`)
|
||||
* [CVE-2023-30125](CVE-2023/CVE-2023-301xx/CVE-2023-30125.json) (`2023-05-09T01:07:27.727`)
|
||||
* [CVE-2023-30854](CVE-2023/CVE-2023-308xx/CVE-2023-30854.json) (`2023-05-09T01:14:01.287`)
|
||||
* [CVE-2020-26298](CVE-2020/CVE-2020-262xx/CVE-2020-26298.json) (`2023-05-09T03:15:09.043`)
|
||||
* [CVE-2023-26813](CVE-2023/CVE-2023-268xx/CVE-2023-26813.json) (`2023-05-09T02:25:14.460`)
|
||||
* [CVE-2023-28762](CVE-2023/CVE-2023-287xx/CVE-2023-28762.json) (`2023-05-09T02:15:12.050`)
|
||||
* [CVE-2023-30265](CVE-2023/CVE-2023-302xx/CVE-2023-30265.json) (`2023-05-09T03:15:09.390`)
|
||||
* [CVE-2023-30269](CVE-2023/CVE-2023-302xx/CVE-2023-30269.json) (`2023-05-09T03:15:09.733`)
|
||||
* [CVE-2023-30441](CVE-2023/CVE-2023-304xx/CVE-2023-30441.json) (`2023-05-09T02:31:07.290`)
|
||||
* [CVE-2023-30454](CVE-2023/CVE-2023-304xx/CVE-2023-30454.json) (`2023-05-09T02:04:28.353`)
|
||||
* [CVE-2023-30455](CVE-2023/CVE-2023-304xx/CVE-2023-30455.json) (`2023-05-09T02:16:18.417`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user