mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-01-07T13:00:24.361027+00:00
This commit is contained in:
parent
4c9edabfc3
commit
123f39e0c2
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-8013",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2018-05-24T16:29:00.380",
|
||||
"lastModified": "2023-11-07T03:01:21.060",
|
||||
"lastModified": "2024-01-07T11:15:09.053",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -383,6 +383,10 @@
|
||||
"url": "https://mail-archives.apache.org/mod_mbox/xmlgraphics-batik-dev/201805.mbox/%3c000701d3f28f%24d01860a0%24704921e0%24%40gmail.com%3e",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-11",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/3661-1/",
|
||||
"source": "security@apache.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-17566",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2020-11-12T18:15:12.567",
|
||||
"lastModified": "2023-11-07T03:06:19.850",
|
||||
"lastModified": "2024-01-07T11:15:09.727",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -239,6 +239,10 @@
|
||||
"url": "https://lists.apache.org/thread.html/rcab14a9ec91aa4c151e0729966282920423eff50a22759fd21db6509%40%3Ccommits.myfaces.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-11",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"source": "security@apache.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-11987",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2021-02-24T18:15:11.093",
|
||||
"lastModified": "2023-11-07T03:15:17.567",
|
||||
"lastModified": "2024-01-07T11:15:09.903",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -292,6 +292,10 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7EAYO5XIHD6OIEA3HPK64UDDBSLNAC5/",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-11",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"source": "security@apache.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-38398",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2022-09-22T15:15:09.287",
|
||||
"lastModified": "2023-10-30T02:18:05.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:10.100",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -107,6 +107,10 @@
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-11",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-38648",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2022-09-22T15:15:09.350",
|
||||
"lastModified": "2023-10-30T16:18:09.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:10.223",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -107,6 +107,10 @@
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-11",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-40146",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2022-09-22T15:15:09.407",
|
||||
"lastModified": "2023-10-30T16:17:53.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:10.300",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -107,6 +107,10 @@
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-11",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-41704",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2022-10-25T17:15:57.527",
|
||||
"lastModified": "2022-12-08T03:54:23.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:10.407",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -113,6 +113,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-11",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2022/dsa-5264",
|
||||
"source": "security@apache.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-42890",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2022-10-25T17:15:57.637",
|
||||
"lastModified": "2022-12-08T03:42:50.753",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:10.500",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -113,6 +113,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-11",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2022/dsa-5264",
|
||||
"source": "security@apache.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-44729",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-08-22T19:16:29.833",
|
||||
"lastModified": "2023-10-30T02:17:57.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:10.567",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -112,6 +112,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-11",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://xmlgraphics.apache.org/security.html",
|
||||
"source": "security@apache.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-44730",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-08-22T19:16:29.930",
|
||||
"lastModified": "2023-10-30T02:18:01.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:10.670",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -112,6 +112,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-11",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://xmlgraphics.apache.org/security.html",
|
||||
"source": "security@apache.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32205",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-02T17:15:13.057",
|
||||
"lastModified": "2023-12-20T08:15:43.997",
|
||||
"lastModified": "2024-01-07T11:15:10.760",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -98,6 +98,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-03",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-16/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32206",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-02T17:15:13.100",
|
||||
"lastModified": "2023-12-20T08:15:44.277",
|
||||
"lastModified": "2024-01-07T11:15:10.863",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,6 +90,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-03",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-16/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32207",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-02T17:15:13.147",
|
||||
"lastModified": "2023-12-20T08:15:44.537",
|
||||
"lastModified": "2024-01-07T11:15:10.930",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,6 +90,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-03",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-16/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32208",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-19T10:15:09.480",
|
||||
"lastModified": "2023-06-27T08:27:23.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:11.003",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,6 +72,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-16/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32209",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-19T10:15:09.523",
|
||||
"lastModified": "2023-06-27T08:27:30.540",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:11.100",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,6 +72,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-16/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32210",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-19T10:15:09.573",
|
||||
"lastModified": "2023-06-27T08:26:14.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:11.177",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,6 +72,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-16/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32211",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-02T17:15:13.197",
|
||||
"lastModified": "2023-12-20T08:15:44.760",
|
||||
"lastModified": "2024-01-07T11:15:11.253",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,6 +90,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-03",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-16/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32212",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-02T17:15:13.240",
|
||||
"lastModified": "2023-12-20T08:15:45.060",
|
||||
"lastModified": "2024-01-07T11:15:11.333",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,6 +90,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-03",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-16/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32213",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-02T17:15:13.287",
|
||||
"lastModified": "2023-12-20T08:15:45.270",
|
||||
"lastModified": "2024-01-07T11:15:11.410",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,6 +90,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-03",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-16/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32214",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-19T10:15:09.613",
|
||||
"lastModified": "2023-12-20T08:15:45.510",
|
||||
"lastModified": "2024-01-07T11:15:11.490",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -100,6 +100,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-03",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-16/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32215",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-02T17:15:13.337",
|
||||
"lastModified": "2023-12-20T08:15:45.897",
|
||||
"lastModified": "2024-01-07T11:15:11.570",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,6 +90,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-03",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-16/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32216",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-19T10:15:09.660",
|
||||
"lastModified": "2023-06-27T08:25:02.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:11.650",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,6 +65,17 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746479%2C1806852%2C1815987%2C1820359%2C1823568%2C1824803%2C1824834%2C1825170%2C1827020%2C1828130",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-16/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-34414",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-19T11:15:10.927",
|
||||
"lastModified": "2023-12-20T08:15:46.113",
|
||||
"lastModified": "2024-01-07T11:15:11.720",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-03",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-19/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34415",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-19T11:15:10.980",
|
||||
"lastModified": "2023-06-27T17:05:48.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:11.810",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,6 +72,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-20/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-34416",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-19T11:15:11.023",
|
||||
"lastModified": "2023-12-20T08:15:46.477",
|
||||
"lastModified": "2024-01-07T11:15:11.880",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-03",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-19/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34417",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-06-19T11:15:11.067",
|
||||
"lastModified": "2023-06-27T16:54:49.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:11.953",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,6 +65,17 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746447%2C1820903%2C1832832",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-20/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3482",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-07-05T10:15:10.273",
|
||||
"lastModified": "2023-07-11T14:28:52.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:12.630",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -73,6 +73,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-22/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37203",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-07-05T10:15:09.687",
|
||||
"lastModified": "2023-07-11T13:48:51.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:12.023",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -73,6 +73,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-22/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37204",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-07-05T10:15:09.743",
|
||||
"lastModified": "2023-07-11T13:49:14.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:12.120",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -73,6 +73,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-22/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37205",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-07-05T10:15:09.803",
|
||||
"lastModified": "2023-07-11T13:49:23.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:12.190",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -73,6 +73,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-22/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37206",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-07-05T10:15:09.867",
|
||||
"lastModified": "2023-07-11T14:28:12.950",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:12.283",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -73,6 +73,10 @@
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-22/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37209",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-07-05T10:15:09.927",
|
||||
"lastModified": "2023-07-11T14:28:24.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:12.387",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -73,6 +73,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-22/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37210",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-07-05T10:15:09.987",
|
||||
"lastModified": "2023-07-11T14:28:31.860",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:12.470",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -73,6 +73,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-22/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37212",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-07-05T10:15:10.100",
|
||||
"lastModified": "2023-07-11T14:28:45.403",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:12.553",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,6 +65,17 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1750870%2C1825552%2C1826206%2C1827076%2C1828690%2C1833503%2C1835710%2C1838587",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-22/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-4058",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-08-01T16:15:10.133",
|
||||
"lastModified": "2023-08-04T17:50:09.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:13.423",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory safety bugs present in Firefox 115. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 116."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Fallos de seguridad de memoria presentes en Firefox 115. Algunos de estos fallos mostraban evidencias de corrupci\u00f3n de memoria y suponemos que con el suficiente esfuerzo algunos de ellos podr\u00edan haber sido explotados para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox versiones anteriores a la 116."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,6 +76,10 @@
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-29/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41335",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-09-27T15:19:30.283",
|
||||
"lastModified": "2023-11-03T21:15:15.927",
|
||||
"lastModified": "2024-01-07T11:15:12.703",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -144,6 +144,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-12",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42453",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-09-27T15:19:32.453",
|
||||
"lastModified": "2023-11-03T21:15:16.130",
|
||||
"lastModified": "2024-01-07T11:15:12.980",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -154,6 +154,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-12",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43796",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-10-31T17:15:23.270",
|
||||
"lastModified": "2023-12-28T16:13:08.610",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:13.123",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -146,6 +146,10 @@
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-12",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45129",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-10-10T18:15:19.093",
|
||||
"lastModified": "2023-11-03T21:15:17.253",
|
||||
"lastModified": "2024-01-07T11:15:13.270",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -158,6 +158,10 @@
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-12",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-4579",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-09-11T09:15:09.407",
|
||||
"lastModified": "2023-09-14T03:53:02.330",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:13.547",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Search queries in the default search engine could appear to have been the currently navigated URL if the search query itself was a well formed URL. This could have led to a site spoofing another if it had been maliciously set as the default search engine. This vulnerability affects Firefox < 117."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las consultas de b\u00fasqueda en el motor de b\u00fasqueda predeterminado podr\u00edan parecer haber sido la URL navegada actualmente si la consulta de b\u00fasqueda en s\u00ed fuera una URL bien formada. Esto podr\u00eda haber llevado a que un sitio suplantara a otro si se hubiera configurado maliciosamente como motor de b\u00fasqueda predeterminado. Esta vulnerabilidad afecta a Firefox < 117."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -73,6 +77,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-34/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4863",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-12T15:15:24.327",
|
||||
"lastModified": "2023-10-28T19:15:38.643",
|
||||
"lastModified": "2024-01-07T11:15:13.650",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2023-09-13",
|
||||
"cisaActionDue": "2023-10-04",
|
||||
@ -410,6 +410,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230929-0011/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5170",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-09-27T15:19:42.177",
|
||||
"lastModified": "2023-10-02T18:58:23.177",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:13.833",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-41/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5172",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-09-27T15:19:42.283",
|
||||
"lastModified": "2023-10-02T16:06:23.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:13.917",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -76,6 +76,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-41/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5173",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-09-27T15:19:42.340",
|
||||
"lastModified": "2023-09-29T13:34:59.930",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:14.000",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -76,6 +76,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-41/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5175",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-09-27T15:19:42.630",
|
||||
"lastModified": "2023-09-29T13:46:01.483",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:14.073",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -76,6 +76,10 @@
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-41/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5722",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-10-25T18:17:44.030",
|
||||
"lastModified": "2023-11-01T19:24:13.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:14.150",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-45/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5723",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-10-25T18:17:44.073",
|
||||
"lastModified": "2023-11-01T19:14:35.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:14.250",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -76,6 +76,10 @@
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-45/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5729",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-10-25T18:17:44.360",
|
||||
"lastModified": "2023-11-01T19:53:53.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:14.310",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-45/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5731",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-10-25T18:17:44.453",
|
||||
"lastModified": "2023-11-01T19:27:41.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:14.370",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-45/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5758",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-10-25T18:17:45.037",
|
||||
"lastModified": "2023-11-01T20:21:27.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:14.427",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-48/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6135",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:07.143",
|
||||
"lastModified": "2023-12-22T11:11:05.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:14.493",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-56/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6210",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-11-21T15:15:08.010",
|
||||
"lastModified": "2023-11-28T19:35:05.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:14.607",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-49/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6211",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-11-21T15:15:08.057",
|
||||
"lastModified": "2023-11-28T19:31:26.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:14.740",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-49/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6213",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-11-21T15:15:08.170",
|
||||
"lastModified": "2023-11-28T19:29:57.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:14.840",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -76,6 +76,10 @@
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-49/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6856",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:07.313",
|
||||
"lastModified": "2023-12-29T13:15:11.453",
|
||||
"lastModified": "2024-01-07T11:15:14.967",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5581",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6857",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:07.377",
|
||||
"lastModified": "2023-12-29T12:15:46.270",
|
||||
"lastModified": "2024-01-07T11:15:15.063",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -139,6 +139,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5581",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6858",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:07.420",
|
||||
"lastModified": "2023-12-29T13:15:11.527",
|
||||
"lastModified": "2024-01-07T11:15:15.150",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5581",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6859",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:07.467",
|
||||
"lastModified": "2023-12-29T12:15:46.510",
|
||||
"lastModified": "2024-01-07T11:15:15.240",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5581",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6860",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:07.510",
|
||||
"lastModified": "2023-12-29T12:15:46.590",
|
||||
"lastModified": "2024-01-07T11:15:15.317",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5581",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6861",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:07.560",
|
||||
"lastModified": "2023-12-29T12:15:46.757",
|
||||
"lastModified": "2024-01-07T11:15:15.410",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5581",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6862",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:07.603",
|
||||
"lastModified": "2023-12-29T12:15:46.900",
|
||||
"lastModified": "2024-01-07T11:15:15.487",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -111,6 +111,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5581",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6863",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:07.650",
|
||||
"lastModified": "2023-12-29T12:15:46.990",
|
||||
"lastModified": "2024-01-07T11:15:15.567",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -112,6 +112,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5581",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6864",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:07.707",
|
||||
"lastModified": "2023-12-29T13:15:11.627",
|
||||
"lastModified": "2024-01-07T11:15:15.660",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -116,6 +116,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5581",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6865",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:07.777",
|
||||
"lastModified": "2023-12-29T12:15:47.270",
|
||||
"lastModified": "2024-01-07T11:15:15.740",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -107,6 +107,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5581",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6866",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:07.847",
|
||||
"lastModified": "2023-12-22T10:54:33.320",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:15.853",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-56/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6867",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:07.933",
|
||||
"lastModified": "2023-12-29T12:15:47.417",
|
||||
"lastModified": "2024-01-07T11:15:15.940",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -107,6 +107,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5581",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6868",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:07.983",
|
||||
"lastModified": "2023-12-22T10:52:54.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:16.030",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -89,6 +89,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-56/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6869",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:08.040",
|
||||
"lastModified": "2023-12-22T10:52:43.520",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:16.117",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-56/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6870",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:08.087",
|
||||
"lastModified": "2023-12-22T12:17:34.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:16.200",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -94,6 +94,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-56/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6871",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:08.133",
|
||||
"lastModified": "2023-12-22T10:43:54.310",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:16.287",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-56/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6872",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:08.180",
|
||||
"lastModified": "2023-12-22T10:43:30.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-07T11:15:16.370",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2023-56/",
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6873",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-12-19T14:15:08.227",
|
||||
"lastModified": "2023-12-29T13:15:11.773",
|
||||
"lastModified": "2024-01-07T11:15:16.447",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -101,6 +101,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-10",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5582",
|
||||
"source": "security@mozilla.org",
|
||||
|
88
CVE-2024/CVE-2024-02xx/CVE-2024-0272.json
Normal file
88
CVE-2024/CVE-2024-02xx/CVE-2024-0272.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-0272",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-01-07T11:15:16.537",
|
||||
"lastModified": "2024-01-07T11:15:16.537",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Kashipara Food Management System up to 1.0 and classified as critical. This issue affects some unknown processing of the file addmaterialsubmit.php. The manipulation of the argument material_name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249827."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Food%20Management%20System/Food%20Management%20System%20-%20vuln%208.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.249827",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.249827",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-02xx/CVE-2024-0273.json
Normal file
88
CVE-2024/CVE-2024-02xx/CVE-2024-0273.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-0273",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-01-07T11:15:16.987",
|
||||
"lastModified": "2024-01-07T11:15:16.987",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Kashipara Food Management System up to 1.0. It has been classified as critical. Affected is an unknown function of the file addwaste_entry.php. The manipulation of the argument item_name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249828."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Food%20Management%20System/Food%20Management%20System%20-%20vuln%203.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.249828",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.249828",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-02xx/CVE-2024-0274.json
Normal file
88
CVE-2024/CVE-2024-02xx/CVE-2024-0274.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-0274",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-01-07T12:15:14.580",
|
||||
"lastModified": "2024-01-07T12:15:14.580",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Kashipara Food Management System up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file billAjax.php. The manipulation of the argument item_name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249829 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Food%20Management%20System/Food%20Management%20System%20-%20vuln%202.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.249829",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.249829",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-02xx/CVE-2024-0275.json
Normal file
88
CVE-2024/CVE-2024-02xx/CVE-2024-0275.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-0275",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-01-07T12:15:14.820",
|
||||
"lastModified": "2024-01-07T12:15:14.820",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Kashipara Food Management System up to 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file item_edit_submit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249830 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Food%20Management%20System/Food%20Management%20System%20-%20vuln%204.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.249830",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.249830",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
48
README.md
48
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-01-07T11:00:24.841428+00:00
|
||||
2024-01-07T13:00:24.361027+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-01-07T10:15:08.907000+00:00
|
||||
2024-01-07T12:15:14.820000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,30 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
234984
|
||||
234988
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2023-7209](CVE-2023/CVE-2023-72xx/CVE-2023-7209.json) (`2024-01-07T09:15:08.853`)
|
||||
* [CVE-2023-7210](CVE-2023/CVE-2023-72xx/CVE-2023-7210.json) (`2024-01-07T10:15:08.660`)
|
||||
* [CVE-2023-7211](CVE-2023/CVE-2023-72xx/CVE-2023-7211.json) (`2024-01-07T10:15:08.907`)
|
||||
* [CVE-2024-0271](CVE-2024/CVE-2024-02xx/CVE-2024-0271.json) (`2024-01-07T09:15:09.140`)
|
||||
* [CVE-2024-0272](CVE-2024/CVE-2024-02xx/CVE-2024-0272.json) (`2024-01-07T11:15:16.537`)
|
||||
* [CVE-2024-0273](CVE-2024/CVE-2024-02xx/CVE-2024-0273.json) (`2024-01-07T11:15:16.987`)
|
||||
* [CVE-2024-0274](CVE-2024/CVE-2024-02xx/CVE-2024-0274.json) (`2024-01-07T12:15:14.580`)
|
||||
* [CVE-2024-0275](CVE-2024/CVE-2024-02xx/CVE-2024-0275.json) (`2024-01-07T12:15:14.820`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `7`
|
||||
Recently modified CVEs: `72`
|
||||
|
||||
* [CVE-2021-37600](CVE-2021/CVE-2021-376xx/CVE-2021-37600.json) (`2024-01-07T09:15:08.003`)
|
||||
* [CVE-2021-3995](CVE-2021/CVE-2021-39xx/CVE-2021-3995.json) (`2024-01-07T09:15:08.413`)
|
||||
* [CVE-2021-3996](CVE-2021/CVE-2021-39xx/CVE-2021-3996.json) (`2024-01-07T09:15:08.600`)
|
||||
* [CVE-2022-0563](CVE-2022/CVE-2022-05xx/CVE-2022-0563.json) (`2024-01-07T09:15:08.713`)
|
||||
* [CVE-2023-0809](CVE-2023/CVE-2023-08xx/CVE-2023-0809.json) (`2024-01-07T10:15:08.310`)
|
||||
* [CVE-2023-28366](CVE-2023/CVE-2023-283xx/CVE-2023-28366.json) (`2024-01-07T10:15:08.467`)
|
||||
* [CVE-2023-3592](CVE-2023/CVE-2023-35xx/CVE-2023-3592.json) (`2024-01-07T10:15:08.563`)
|
||||
* [CVE-2023-5729](CVE-2023/CVE-2023-57xx/CVE-2023-5729.json) (`2024-01-07T11:15:14.310`)
|
||||
* [CVE-2023-5731](CVE-2023/CVE-2023-57xx/CVE-2023-5731.json) (`2024-01-07T11:15:14.370`)
|
||||
* [CVE-2023-5758](CVE-2023/CVE-2023-57xx/CVE-2023-5758.json) (`2024-01-07T11:15:14.427`)
|
||||
* [CVE-2023-6135](CVE-2023/CVE-2023-61xx/CVE-2023-6135.json) (`2024-01-07T11:15:14.493`)
|
||||
* [CVE-2023-6210](CVE-2023/CVE-2023-62xx/CVE-2023-6210.json) (`2024-01-07T11:15:14.607`)
|
||||
* [CVE-2023-6211](CVE-2023/CVE-2023-62xx/CVE-2023-6211.json) (`2024-01-07T11:15:14.740`)
|
||||
* [CVE-2023-6213](CVE-2023/CVE-2023-62xx/CVE-2023-6213.json) (`2024-01-07T11:15:14.840`)
|
||||
* [CVE-2023-6856](CVE-2023/CVE-2023-68xx/CVE-2023-6856.json) (`2024-01-07T11:15:14.967`)
|
||||
* [CVE-2023-6857](CVE-2023/CVE-2023-68xx/CVE-2023-6857.json) (`2024-01-07T11:15:15.063`)
|
||||
* [CVE-2023-6858](CVE-2023/CVE-2023-68xx/CVE-2023-6858.json) (`2024-01-07T11:15:15.150`)
|
||||
* [CVE-2023-6859](CVE-2023/CVE-2023-68xx/CVE-2023-6859.json) (`2024-01-07T11:15:15.240`)
|
||||
* [CVE-2023-6860](CVE-2023/CVE-2023-68xx/CVE-2023-6860.json) (`2024-01-07T11:15:15.317`)
|
||||
* [CVE-2023-6861](CVE-2023/CVE-2023-68xx/CVE-2023-6861.json) (`2024-01-07T11:15:15.410`)
|
||||
* [CVE-2023-6862](CVE-2023/CVE-2023-68xx/CVE-2023-6862.json) (`2024-01-07T11:15:15.487`)
|
||||
* [CVE-2023-6863](CVE-2023/CVE-2023-68xx/CVE-2023-6863.json) (`2024-01-07T11:15:15.567`)
|
||||
* [CVE-2023-6864](CVE-2023/CVE-2023-68xx/CVE-2023-6864.json) (`2024-01-07T11:15:15.660`)
|
||||
* [CVE-2023-6865](CVE-2023/CVE-2023-68xx/CVE-2023-6865.json) (`2024-01-07T11:15:15.740`)
|
||||
* [CVE-2023-6866](CVE-2023/CVE-2023-68xx/CVE-2023-6866.json) (`2024-01-07T11:15:15.853`)
|
||||
* [CVE-2023-6867](CVE-2023/CVE-2023-68xx/CVE-2023-6867.json) (`2024-01-07T11:15:15.940`)
|
||||
* [CVE-2023-6868](CVE-2023/CVE-2023-68xx/CVE-2023-6868.json) (`2024-01-07T11:15:16.030`)
|
||||
* [CVE-2023-6869](CVE-2023/CVE-2023-68xx/CVE-2023-6869.json) (`2024-01-07T11:15:16.117`)
|
||||
* [CVE-2023-6870](CVE-2023/CVE-2023-68xx/CVE-2023-6870.json) (`2024-01-07T11:15:16.200`)
|
||||
* [CVE-2023-6871](CVE-2023/CVE-2023-68xx/CVE-2023-6871.json) (`2024-01-07T11:15:16.287`)
|
||||
* [CVE-2023-6872](CVE-2023/CVE-2023-68xx/CVE-2023-6872.json) (`2024-01-07T11:15:16.370`)
|
||||
* [CVE-2023-6873](CVE-2023/CVE-2023-68xx/CVE-2023-6873.json) (`2024-01-07T11:15:16.447`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user