Auto-Update: 2023-05-08T21:55:26.327729+00:00

This commit is contained in:
René Helmke 2023-05-08 23:55:29 +02:00
parent 6d7dc11289
commit 3cca92ecde
145 changed files with 12034 additions and 189 deletions

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-22645",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:13.900",
"lastModified": "2023-05-08T20:15:13.900",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-22649",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:13.943",
"lastModified": "2023-05-08T20:15:13.943",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-26689",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:13.997",
"lastModified": "2023-05-08T20:15:13.997",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-26692",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.050",
"lastModified": "2023-05-08T20:15:14.050",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-26705",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.097",
"lastModified": "2023-05-08T20:15:14.097",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-26729",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.147",
"lastModified": "2023-05-08T20:15:14.147",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-26732",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.187",
"lastModified": "2023-05-08T20:15:14.187",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-26733",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.233",
"lastModified": "2023-05-08T20:15:14.233",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-26734",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.280",
"lastModified": "2023-05-08T20:15:14.280",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-26735",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.330",
"lastModified": "2023-05-08T20:15:14.330",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32779",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.383",
"lastModified": "2023-05-08T20:15:14.383",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32791",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.427",
"lastModified": "2023-05-08T20:15:14.427",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32804",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.473",
"lastModified": "2023-05-08T20:15:14.473",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32806",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.517",
"lastModified": "2023-05-08T20:15:14.517",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32808",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.563",
"lastModified": "2023-05-08T20:15:14.563",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32809",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.613",
"lastModified": "2023-05-08T20:15:14.613",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32822",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.660",
"lastModified": "2023-05-08T20:15:14.660",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32850",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.707",
"lastModified": "2023-05-08T20:15:14.707",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32856",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.753",
"lastModified": "2023-05-08T20:15:14.753",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32873",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.803",
"lastModified": "2023-05-08T20:15:14.803",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32874",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.850",
"lastModified": "2023-05-08T20:15:14.850",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32878",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.897",
"lastModified": "2023-05-08T20:15:14.897",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32884",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:14.950",
"lastModified": "2023-05-08T20:15:14.950",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32885",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.003",
"lastModified": "2023-05-08T20:15:15.003",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32901",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.053",
"lastModified": "2023-05-08T20:15:15.053",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32921",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.103",
"lastModified": "2023-05-08T20:15:15.103",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-32930",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.150",
"lastModified": "2023-05-08T20:15:15.150",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-42794",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.213",
"lastModified": "2023-05-08T20:15:15.213",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-42802",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.257",
"lastModified": "2023-05-08T20:15:15.257",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-42804",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.303",
"lastModified": "2023-05-08T20:15:15.303",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-42822",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.353",
"lastModified": "2023-05-08T20:15:15.353",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-42835",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.400",
"lastModified": "2023-05-08T20:15:15.400",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-42857",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.450",
"lastModified": "2023-05-08T20:15:15.450",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-46703",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-04-10T19:15:07.080",
"lastModified": "2023-04-14T00:52:03.867",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-08T20:15:15.497",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, iOS 15.7.2 and iPadOS 15.7.2. An app may be able to read sensitive location information"
"value": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 15.7.2 and iPadOS 15.7.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2. An app may be able to read sensitive location information"
}
],
"metrics": {

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-46707",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.563",
"lastModified": "2023-05-08T20:15:15.563",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-46708",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.617",
"lastModified": "2023-05-08T20:15:15.617",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-46709",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-04-10T19:15:07.120",
"lastModified": "2023-04-14T22:50:38.577",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-08T20:15:15.663",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 16. An app may be able to execute arbitrary code with kernel privileges"
"value": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13, iOS 16. An app may be able to execute arbitrary code with kernel privileges"
}
],
"metrics": {
@ -72,6 +72,10 @@
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213488",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-46719",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.727",
"lastModified": "2023-05-08T20:15:15.727",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2022-46720",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:15.787",
"lastModified": "2023-05-08T20:15:15.787",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An integer overflow was addressed with improved input validation. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1. An app may be able to break out of its sandbox"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213530",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213532",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-46727",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.840",
"lastModified": "2023-05-08T20:15:15.840",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-46728",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:15.887",
"lastModified": "2023-05-08T20:15:15.887",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-1031",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-05-08T20:15:15.943",
"lastModified": "2023-05-08T20:15:15.943",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "MonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `settings` endpoint and first_name parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://fluidattacks.com/advisories/napoli",
"source": "help@fluidattacks.com"
},
{
"url": "https://www.monicahq.com/",
"source": "help@fluidattacks.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-1094",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-05-08T20:15:16.007",
"lastModified": "2023-05-08T20:15:16.007",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "MonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `people:id/food` endpoint and food parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://fluidattacks.com/advisories/napoli",
"source": "help@fluidattacks.com"
},
{
"url": "https://www.monicahq.com/",
"source": "help@fluidattacks.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21404",
"sourceIdentifier": "product-security@axis.com",
"published": "2023-05-08T21:15:10.727",
"lastModified": "2023-05-08T21:15:10.727",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "AXIS OS 11.0.X - 11.3.x use a static RSA key in legacy LUA-components to protect Axis-specific source code. The static RSA key is not used in any other secure communication nor can it be used to compromise the device or any customer data."
}
],
"metrics": {},
"references": [
{
"url": "https://www.axis.com/dam/public/07/0a/20/cve-2023-21404-en-US-398426.pdf",
"source": "product-security@axis.com"
}
]
}

View File

@ -2,27 +2,114 @@
"id": "CVE-2023-22614",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-11T21:15:17.680",
"lastModified": "2023-04-12T12:44:13.237",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-08T20:15:48.637",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ChipsetSvcSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. There is insufficient input validation in BIOS Guard updates. An attacker can induce memory corruption in SMM by supplying malformed inputs to the BIOS Guard SMI handler."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insyde:insydeh20:05.42.52.0026:*:*:*:*:*:*:*",
"matchCriteriaId": "30B97B7F-4FB9-47E1-BCB1-5DB1FFDD3F22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insyde:insydeh20:05.43.01.0026:*:*:*:*:*:*:*",
"matchCriteriaId": "5EDB9938-4B3A-4580-899A-AC27D3BD7198"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insyde:insydeh20:05.43.12.0056:*:*:*:*:*:*:*",
"matchCriteriaId": "5E340332-91BA-46F0-8324-7FA2D377C435"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insyde:insydeh20:05.44.34.0054:*:*:*:*:*:*:*",
"matchCriteriaId": "B5EFB485-7205-4788-92D5-F340B5F95798"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insyde:insydeh20:05.44.45.0015:*:*:*:*:*:*:*",
"matchCriteriaId": "20767831-07B6-4D1C-B5EF-67680C720559"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insyde:insydeh20:05.44.45.0028:*:*:*:*:*:*:*",
"matchCriteriaId": "E2900B6D-77E7-490F-886B-52CC89D90AFD"
}
]
}
]
}
],
"references": [
{
"url": "https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.insyde.com/security-pledge",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.insyde.com/security-pledge/SA-2023020",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-23494",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.063",
"lastModified": "2023-05-08T20:15:16.063",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 16.4 and iPadOS 16.4. A user in a privileged network position may be able to cause a denial-of-service"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-23523",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.117",
"lastModified": "2023-05-08T20:15:16.117",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4. Photos belonging to the Hidden Photos Album could be viewed without authentication through Visual Lookup"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-23525",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.170",
"lastModified": "2023-05-08T20:15:16.170",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4. An app may be able to gain root privileges"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-23526",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.220",
"lastModified": "2023-05-08T20:15:16.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This was addressed with additional checks by Gatekeeper on files downloaded from an iCloud shared-by-me folder. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4. A file from an iCloud shared-by-me folder may be able to bypass Gatekeeper"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2023-23527",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.277",
"lastModified": "2023-05-08T20:15:16.277",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, macOS Monterey 12.6.4, watchOS 9.4, tvOS 16.4, iOS 16.4 and iPadOS 16.4. A user may gain access to protected parts of the file system"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213674",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213678",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-23528",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.343",
"lastModified": "2023-05-08T20:15:16.343",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in tvOS 16.4, iOS 16.4 and iPadOS 16.4. Processing a maliciously crafted Bluetooth packet may result in disclosure of process memory"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213674",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-23532",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.403",
"lastModified": "2023-05-08T20:15:16.403",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4. An app may be able to break out of its sandbox"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-23533",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.457",
"lastModified": "2023-05-08T20:15:16.457",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4. An app may be able to modify protected parts of the file system"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-23534",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.507",
"lastModified": "2023-05-08T20:15:16.507",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5. Processing a maliciously crafted image may result in disclosure of process memory"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2023-23535",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.567",
"lastModified": "2023-05-08T20:15:16.567",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, watchOS 9.4, tvOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, iOS 16.4 and iPadOS 16.4. Processing a maliciously crafted image may result in disclosure of process memory"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213673",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213674",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213678",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-23536",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.630",
"lastModified": "2023-05-08T20:15:16.630",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Ventura 13.3, iOS 15.7.4 and iPadOS 15.7.4, iOS 16.4 and iPadOS 16.4. An app may be able to execute arbitrary code with kernel privileges"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213673",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-23537",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.687",
"lastModified": "2023-05-08T20:15:16.687",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, watchOS 9.4, iOS 15.7.4 and iPadOS 15.7.4, iOS 16.4 and iPadOS 16.4. An app may be able to read sensitive location information"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213673",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213678",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-23538",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.747",
"lastModified": "2023-05-08T20:15:16.747",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4. An app may be able to modify protected parts of the file system"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-23540",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.797",
"lastModified": "2023-05-08T20:15:16.797",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.4, macOS Big Sur 11.7.5, iOS 16.4 and iPadOS 16.4. An app may be able to execute arbitrary code with kernel privileges"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-23541",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.860",
"lastModified": "2023-05-08T20:15:16.860",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 15.7.4 and iPadOS 15.7.4, iOS 16.4 and iPadOS 16.4. An app may be able to access information about a user\u2019s contacts"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213673",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-23542",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.923",
"lastModified": "2023-05-08T20:15:16.923",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Big Sur 11.7.5. An app may be able to access user-sensitive data"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-23543",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.003",
"lastModified": "2023-05-08T20:15:17.003",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with additional restrictions on the observability of app states. This issue is fixed in macOS Ventura 13.3, iOS 15.7.4 and iPadOS 15.7.4, iOS 16.4 and iPadOS 16.4. A sandboxed app may be able to determine which app is currently using the camera"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213673",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2349",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-27T16:15:11.063",
"lastModified": "2023-04-27T16:26:09.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T20:21:45.167",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%204.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.227592",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.227592",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2350",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-27T16:15:11.207",
"lastModified": "2023-04-27T16:26:09.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T20:21:55.863",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%205.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.227593",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.227593",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-24505",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2023-05-08T21:15:10.797",
"lastModified": "2023-05-08T21:15:10.797",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nMilesight NCR/camera version 71.8.0.6-r5 discloses sensitive information through an unspecified request. \n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-24506",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2023-05-08T21:15:10.867",
"lastModified": "2023-05-08T21:15:10.867",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\n\n\nMilesight NCR/camera version 71.8.0.6-r5 exposes credentials through an unspecified request. \n\n \n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-24507",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2023-05-08T21:15:10.937",
"lastModified": "2023-05-08T21:15:10.937",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\n\n\nAgilePoint NX v8.0 SU2.2 & SU2.3 \u2013 Insecure File Upload -\u00a0Vulnerability allows insecure file upload, by an unspecified request.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2023-2478",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-08T21:15:10.997",
"lastModified": "2023-05-08T21:15:10.997",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.9.7, all versions starting from 15.10 before 15.10.6, all versions starting from 15.11 before 15.11.2. Under certain conditions, a malicious unauthorized GitLab user may use a GraphQL endpoint to attach a malicious runner to any project."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 5.8
}
]
},
"references": [
{
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2478.json",
"source": "cve@gitlab.com"
},
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/409470",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/1969599",
"source": "cve@gitlab.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2023-2513",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-08T21:15:11.077",
"lastModified": "2023-05-08T21:15:11.077",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors."
}
],
"metrics": {},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2193097",
"source": "secalert@redhat.com"
},
{
"url": "https://github.com/torvalds/linux/commit/67d7d8ad99be",
"source": "secalert@redhat.com"
},
{
"url": "https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1@huawei.com/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-2582",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-05-08T21:15:11.150",
"lastModified": "2023-05-08T21:15:11.150",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A prototype pollution vulnerability exists in Strikingly CMS which can result in reflected cross-site scripting (XSS) in affected applications and sites built with Strikingly. The vulnerability exists because of Strikingly JavaScript library parsing the URL fragment allows access to the __proto__ or constructor properties and the Object prototype. By leveraging an embedded gadget like jQuery, an attacker who convinces a victim to visit a specially crafted link could achieve arbitrary javascript execution in the context of the user's browser."
}
],
"metrics": {},
"references": [
{
"url": "https://www.tenable.com/security/research/tra-2023-18",
"source": "vulnreport@tenable.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26021",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-04-28T19:15:16.713",
"lastModified": "2023-04-28T22:22:40.580",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T20:38:54.350",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,14 +76,100 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.1",
"versionEndExcluding": "11.1.4",
"matchCriteriaId": "421BBE95-3D5B-421A-9DC1-8B08D019B2A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.5",
"versionEndExcluding": "11.5.8",
"matchCriteriaId": "65161064-A4A3-48E5-AC0A-388429FF2F53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1.4:-:*:*:*:*:*:*",
"matchCriteriaId": "7F91EC14-CD9A-42EB-9D81-6025A1D74749"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp1:*:*:*:*:*:*",
"matchCriteriaId": "5D098641-0833-4718-BB6A-273E1CA0F887"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp2:*:*:*:*:*:*",
"matchCriteriaId": "8B451F96-2A58-4758-86E6-F8A030805C51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp3:*:*:*:*:*:*",
"matchCriteriaId": "69CBC98E-BECE-41A4-A0D9-9F3AC1602ABE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp4:*:*:*:*:*:*",
"matchCriteriaId": "20386F14-BC32-4174-9F3A-F7406486976A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp5:*:*:*:*:*:*",
"matchCriteriaId": "DD0DD54B-AB2E-4C56-B348-FF87C174270A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp6:*:*:*:*:*:*",
"matchCriteriaId": "CC14EF40-FE00-47F9-8A78-98713F903D9C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/247864",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/6985681",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26022",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-04-28T19:15:16.787",
"lastModified": "2023-04-28T22:22:40.580",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T20:41:20.463",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,14 +76,160 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.1",
"versionEndExcluding": "11.1.4",
"matchCriteriaId": "421BBE95-3D5B-421A-9DC1-8B08D019B2A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.5",
"versionEndExcluding": "11.5.8",
"matchCriteriaId": "65161064-A4A3-48E5-AC0A-388429FF2F53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:-:*:*:*:*:*:*",
"matchCriteriaId": "190AE881-F7BF-486E-BDAE-197337D70CDB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:fp1:*:*:*:*:*:*",
"matchCriteriaId": "8D1BAA43-4C77-4AC7-8561-93EDE0AED000"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:fp10:*:*:*:*:*:*",
"matchCriteriaId": "F6FDF4D8-1822-43E6-AE65-3E4F8743D3A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:fp2:*:*:*:*:*:*",
"matchCriteriaId": "87C39880-D0E9-4487-9A80-B4D1A999032F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:fp3:*:*:*:*:*:*",
"matchCriteriaId": "8842A8B6-E470-4536-AB5D-DA1C62A05F58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:fp3a:*:*:*:*:*:*",
"matchCriteriaId": "92BF0482-E4FE-454E-84DD-27074097F3F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:fp4:*:*:*:*:*:*",
"matchCriteriaId": "3705A79B-7903-4055-9CDC-55D60D2AC2E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:fp5:*:*:*:*:*:*",
"matchCriteriaId": "CBDFCE61-EE04-4901-844D-61B8966C1B81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:fp6:*:*:*:*:*:*",
"matchCriteriaId": "53A23363-413D-4785-B8C1-9AC2F96000EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:fp7:*:*:*:*:*:*",
"matchCriteriaId": "6E22D884-A33F-41D7-84CB-B6360A39863F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:fp8:*:*:*:*:*:*",
"matchCriteriaId": "4DA56D35-93E9-4659-B180-2FD636A39BAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:10.5:fp9:*:*:*:*:*:*",
"matchCriteriaId": "6E7F0B02-EA0B-4BD1-AA0C-2A4735221963"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1.4:-:*:*:*:*:*:*",
"matchCriteriaId": "7F91EC14-CD9A-42EB-9D81-6025A1D74749"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp1:*:*:*:*:*:*",
"matchCriteriaId": "5D098641-0833-4718-BB6A-273E1CA0F887"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp2:*:*:*:*:*:*",
"matchCriteriaId": "8B451F96-2A58-4758-86E6-F8A030805C51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp3:*:*:*:*:*:*",
"matchCriteriaId": "69CBC98E-BECE-41A4-A0D9-9F3AC1602ABE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp4:*:*:*:*:*:*",
"matchCriteriaId": "20386F14-BC32-4174-9F3A-F7406486976A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp5:*:*:*:*:*:*",
"matchCriteriaId": "DD0DD54B-AB2E-4C56-B348-FF87C174270A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp6:*:*:*:*:*:*",
"matchCriteriaId": "CC14EF40-FE00-47F9-8A78-98713F903D9C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/247868",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/6985669",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2023-27928",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.063",
"lastModified": "2023-05-08T20:15:17.063",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, watchOS 9.4, tvOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, iOS 16.4 and iPadOS 16.4. An app may be able to access information about a user\u2019s contacts"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213673",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213674",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213678",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-27929",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.130",
"lastModified": "2023-05-08T20:15:17.130",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3, tvOS 16.4, watchOS 9.4, iOS 16.4 and iPadOS 16.4. Processing a maliciously crafted image may result in disclosure of process memory"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213674",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213678",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-27931",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.197",
"lastModified": "2023-05-08T20:15:17.197",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.3, tvOS 16.4, watchOS 9.4, iOS 16.4 and iPadOS 16.4. An app may be able to access user-sensitive data"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213674",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213678",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-27932",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.247",
"lastModified": "2023-05-08T20:15:17.247",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, watchOS 9.4, tvOS 16.4, Safari 16.4, iOS 16.4 and iPadOS 16.4. Processing maliciously crafted web content may bypass Same Origin Policy"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213671",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213674",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213678",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-27933",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.310",
"lastModified": "2023-05-08T20:15:17.310",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, watchOS 9.4, tvOS 16.4, iOS 16.4 and iPadOS 16.4. An app with root privileges may be able to execute arbitrary code with kernel privileges"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213674",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213678",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-27934",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.367",
"lastModified": "2023-05-08T20:15:17.367",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A memory initialization issue was addressed. This issue is fixed in macOS Ventura 13.3. A remote user may be able to cause unexpected app termination or arbitrary code execution"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-27935",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.423",
"lastModified": "2023-05-08T20:15:17.423",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Big Sur 11.7.5. A remote user may be able to cause unexpected app termination or arbitrary code execution"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-27936",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.493",
"lastModified": "2023-05-08T20:15:17.493",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 15.7.4 and iPadOS 15.7.4, macOS Big Sur 11.7.5. An app may be able to cause unexpected system termination or write kernel memory"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213673",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2023-27937",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.550",
"lastModified": "2023-05-08T20:15:17.550",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An integer overflow was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, macOS Monterey 12.6.4, watchOS 9.4, tvOS 16.4, iOS 16.4 and iPadOS 16.4. Parsing a maliciously crafted plist may lead to an unexpected app termination or arbitrary code execution"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213674",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213678",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-27938",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.610",
"lastModified": "2023-05-08T20:15:17.610",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in GarageBand for macOS 10.4.8. Parsing a maliciously crafted MIDI file may lead to an unexpected application termination or arbitrary code execution"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213650",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-27941",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.670",
"lastModified": "2023-05-08T20:15:17.670",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Ventura 13.3, iOS 15.7.4 and iPadOS 15.7.4. An app may be able to disclose kernel memory"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213673",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-27942",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.733",
"lastModified": "2023-05-08T20:15:17.733",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, watchOS 9.4, tvOS 16.4, iOS 16.4 and iPadOS 16.4. An app may be able to access user-sensitive data"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213674",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213678",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-27943",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.790",
"lastModified": "2023-05-08T20:15:17.790",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4. Files downloaded from the internet may not have the quarantine flag applied"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-27944",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.857",
"lastModified": "2023-05-08T20:15:17.857",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with a new entitlement. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Big Sur 11.7.5. An app may be able to break out of its sandbox"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-27945",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.930",
"lastModified": "2023-05-08T20:15:17.930",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved entitlements. This issue is fixed in Xcode 14.3. A sandboxed app may be able to collect system logs"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213679",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-27946",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.990",
"lastModified": "2023-05-08T20:15:17.990",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 15.7.4 and iPadOS 15.7.4, macOS Big Sur 11.7.5. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213673",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-27949",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:18.043",
"lastModified": "2023-05-08T20:15:18.043",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 15.7.4 and iPadOS 15.7.4. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213673",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-27951",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:18.100",
"lastModified": "2023-05-08T20:15:18.100",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Big Sur 11.7.5. An archive may be able to bypass Gatekeeper"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-27952",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:18.157",
"lastModified": "2023-05-08T20:15:18.157",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A race condition was addressed with improved locking. This issue is fixed in macOS Ventura 13.3. An app may bypass Gatekeeper checks"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-27953",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:18.207",
"lastModified": "2023-05-08T20:15:18.207",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Big Sur 11.7.5. A remote user may be able to cause unexpected system termination or corrupt kernel memory"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2023-27954",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:18.267",
"lastModified": "2023-05-08T20:15:18.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed by removing origin information. This issue is fixed in macOS Ventura 13.3, watchOS 9.4, tvOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, Safari 16.4, iOS 16.4 and iPadOS 16.4. A website may be able to track sensitive user information"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213671",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213673",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213674",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213678",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-27955",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:18.317",
"lastModified": "2023-05-08T20:15:18.317",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Big Sur 11.7.5, iOS 16.4 and iPadOS 16.4. An app may be able to read arbitrary files"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213675",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213677",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-27956",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:18.383",
"lastModified": "2023-05-08T20:15:18.383",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3, watchOS 9.4, tvOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, iOS 16.4 and iPadOS 16.4. Processing a maliciously crafted image may result in disclosure of process memory"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213673",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213674",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213678",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-27957",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:18.433",
"lastModified": "2023-05-08T20:15:18.433",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution"
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com"
}
]
}

Some files were not shown because too many files have changed in this diff Show More