mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-12-04T03:00:18.824550+00:00
This commit is contained in:
parent
ad33d1b686
commit
823f5e3851
20
CVE-2022/CVE-2022-484xx/CVE-2022-48462.json
Normal file
20
CVE-2022/CVE-2022-484xx/CVE-2022-48462.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48462",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.053",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-484xx/CVE-2022-48463.json
Normal file
20
CVE-2022/CVE-2022-484xx/CVE-2022-48463.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48463",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.117",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-484xx/CVE-2022-48464.json
Normal file
20
CVE-2022/CVE-2022-484xx/CVE-2022-48464.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48464",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.163",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4957",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-03T19:15:07.950",
|
||||
"lastModified": "2023-12-03T19:15:07.950",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2023/CVE-2023-292xx/CVE-2023-29258.json
Normal file
59
CVE-2023/CVE-2023-292xx/CVE-2023-29258.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-29258",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-12-04T02:15:06.647",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1, and 11.5 is vulnerable to a denial of service through a specially crafted federated query on specific federation objects. IBM X-Force ID: 252048."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/252048",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7087218",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2023/CVE-2023-380xx/CVE-2023-38003.json
Normal file
47
CVE-2023/CVE-2023-380xx/CVE-2023-38003.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2023-38003",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-12-04T01:15:08.217",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 could allow a user with DATAACCESS privileges to execute routines that they should not have access to. IBM X-Force ID: 260214."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260214",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7078681",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-387xx/CVE-2023-38727.json
Normal file
59
CVE-2023/CVE-2023-387xx/CVE-2023-38727.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-38727",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-12-04T02:15:06.867",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted SQL statement. IBM X-Force ID: 262257."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/262257",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7087143",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-406xx/CVE-2023-40687.json
Normal file
59
CVE-2023/CVE-2023-406xx/CVE-2023-40687.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-40687",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-12-04T02:15:07.077",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM DB2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted RUNSTATS command on an 8TB table. IBM X-Force ID: 264809."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/264809",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7087149",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40692",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-12-04T00:15:07.000",
|
||||
"lastModified": "2023-12-04T00:15:07.000",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42671.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42671.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42671",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.383",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42672.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42672.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42672",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.433",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42673.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42673.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42673",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.483",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42674.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42674.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42674",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.537",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42675.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42675.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42675",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.587",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42676.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42676.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42676",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.630",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42677.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42677.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42677",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.673",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42678.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42678.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42678",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.727",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42679.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42679.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42679",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.773",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gpu driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42680.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42680.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42680",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.820",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gpu driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42681.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42681.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42681",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.873",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ion service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42682.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42682.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42682",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.927",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gsp driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42683.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42683.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42683",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:08.970",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gsp driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42684.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42684.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42684",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.017",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gsp driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42685.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42685.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42685",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.077",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42686.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42686.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42686",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.130",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42687.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42687.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42687",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.180",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42688.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42688.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42688",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.223",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42689.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42689.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42689",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.280",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42690.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42690.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42690",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.327",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42691.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42691.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42691",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.373",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42692.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42692.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42692",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.417",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42693.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42693.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42693",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.463",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42694.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42694.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42694",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.513",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42695.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42695.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42695",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.563",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42696.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42696.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42696",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.613",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42697.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42697.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42697",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.660",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In omacp service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42698.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42698.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42698",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.707",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In omacp service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42699.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42699.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42699",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.753",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In omacp service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42700.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42700.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42700",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.800",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42701.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42701.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42701",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.850",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42702.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42702.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42702",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.897",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42703.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42703.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42703",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.940",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42704.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42704.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42704",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:09.987",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42705.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42705.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42705",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.040",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42706.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42706.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42706",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.083",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42707.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42707.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42707",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.130",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42708.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42708.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42708",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.173",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42709.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42709.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42709",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.220",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42710.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42710.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42710",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.263",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42711.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42711.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42711",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.310",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42712.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42712.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42712",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.353",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42713.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42713.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42713",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.403",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42714.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42714.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42714",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.443",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42715.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42715.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42715",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.490",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42716.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42716.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42716",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.530",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telephony service, there is a possible missing permission check. This could lead to remote information disclosure no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42717.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42717.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42717",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.577",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telephony service, there is a possible missing permission check. This could lead to remote information disclosure no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42718.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42718.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42718",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.627",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In dialer, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42719.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42719.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42719",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.673",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In video service, there is a possible out of bounds read due to a incorrect bounds check. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42720.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42720.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42720",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.723",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In video service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42721.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42721.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42721",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.770",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In flv extractor, there is a possible missing verification incorrect input. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42722.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42722.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42722",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.817",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In camera service, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42723.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42723.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42723",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.863",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In camera service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42724.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42724.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42724",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.910",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gpu driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42725.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42725.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42725",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:10.957",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gpu driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42726.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42726.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42726",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.000",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TeleService, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42727.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42727.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42727",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.047",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gpu driver, there is a possible out of bounds write due to a incorrect bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42728.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42728.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42728",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.090",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In phasecheckserver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42729.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42729.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42729",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.137",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ril service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42730.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42730.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42730",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.183",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In IMS service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42731.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42731.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42731",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.233",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Gnss service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42732.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42732.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42732",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.277",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42733.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42733.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42733",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.320",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42734.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42734.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42734",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.370",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42735.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42735.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42735",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.423",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42736.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42736.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42736",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.470",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42737.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42737.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42737",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.517",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telecom service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42738.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42738.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42738",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.560",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telocom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42739.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42739.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42739",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.607",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In engineermode service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42740.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42740.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42740",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.650",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telecom service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42741.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42741.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42741",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.697",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telecom service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42742.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42742.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42742",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.740",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In sysui, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42743.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42743.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42743",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.783",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42744.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42744.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42744",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.830",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telecom service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42745.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42745.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42745",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.873",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42746.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42746.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42746",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.920",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In power manager, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42747.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42747.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42747",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.957",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In camera service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42748.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42748.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42748",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:12.000",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42749.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42749.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42749",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:12.047",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In enginnermode service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42751.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42751.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42751",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:12.097",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gnss service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45178",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-12-03T18:15:42.273",
|
||||
"lastModified": "2023-12-03T18:15:42.273",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2023/CVE-2023-461xx/CVE-2023-46167.json
Normal file
59
CVE-2023/CVE-2023-461xx/CVE-2023-46167.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-46167",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-12-04T01:15:12.147",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 federated server is vulnerable to a denial of service when a specially crafted cursor is used. IBM X-Force ID: 269367."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269367",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7087203",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-477xx/CVE-2023-47701.json
Normal file
59
CVE-2023/CVE-2023-477xx/CVE-2023-47701.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-47701",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-12-04T01:15:12.340",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted query. IBM X-Force ID: 266166."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/266166",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7087180",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49946",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-03T19:15:08.227",
|
||||
"lastModified": "2023-12-03T19:15:08.227",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49947",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-03T19:15:08.280",
|
||||
"lastModified": "2023-12-03T19:15:08.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49948",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-03T19:15:08.330",
|
||||
"lastModified": "2023-12-03T19:15:08.330",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-04T02:58:50.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
44
README.md
44
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-12-04T00:55:18.173209+00:00
|
||||
2023-12-04T03:00:18.824550+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-12-04T00:15:07+00:00
|
||||
2023-12-04T02:58:50.030000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -23,26 +23,56 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2023-12-03T01:00:13.535727+00:00
|
||||
2023-12-04T01:00:13.555729+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
231998
|
||||
232087
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `89`
|
||||
|
||||
* [CVE-2023-40692](CVE-2023/CVE-2023-406xx/CVE-2023-40692.json) (`2023-12-04T00:15:07.000`)
|
||||
* [CVE-2023-42731](CVE-2023/CVE-2023-427xx/CVE-2023-42731.json) (`2023-12-04T01:15:11.233`)
|
||||
* [CVE-2023-42732](CVE-2023/CVE-2023-427xx/CVE-2023-42732.json) (`2023-12-04T01:15:11.277`)
|
||||
* [CVE-2023-42733](CVE-2023/CVE-2023-427xx/CVE-2023-42733.json) (`2023-12-04T01:15:11.320`)
|
||||
* [CVE-2023-42734](CVE-2023/CVE-2023-427xx/CVE-2023-42734.json) (`2023-12-04T01:15:11.370`)
|
||||
* [CVE-2023-42735](CVE-2023/CVE-2023-427xx/CVE-2023-42735.json) (`2023-12-04T01:15:11.423`)
|
||||
* [CVE-2023-42736](CVE-2023/CVE-2023-427xx/CVE-2023-42736.json) (`2023-12-04T01:15:11.470`)
|
||||
* [CVE-2023-42737](CVE-2023/CVE-2023-427xx/CVE-2023-42737.json) (`2023-12-04T01:15:11.517`)
|
||||
* [CVE-2023-42738](CVE-2023/CVE-2023-427xx/CVE-2023-42738.json) (`2023-12-04T01:15:11.560`)
|
||||
* [CVE-2023-42739](CVE-2023/CVE-2023-427xx/CVE-2023-42739.json) (`2023-12-04T01:15:11.607`)
|
||||
* [CVE-2023-42740](CVE-2023/CVE-2023-427xx/CVE-2023-42740.json) (`2023-12-04T01:15:11.650`)
|
||||
* [CVE-2023-42741](CVE-2023/CVE-2023-427xx/CVE-2023-42741.json) (`2023-12-04T01:15:11.697`)
|
||||
* [CVE-2023-42742](CVE-2023/CVE-2023-427xx/CVE-2023-42742.json) (`2023-12-04T01:15:11.740`)
|
||||
* [CVE-2023-42743](CVE-2023/CVE-2023-427xx/CVE-2023-42743.json) (`2023-12-04T01:15:11.783`)
|
||||
* [CVE-2023-42744](CVE-2023/CVE-2023-427xx/CVE-2023-42744.json) (`2023-12-04T01:15:11.830`)
|
||||
* [CVE-2023-42745](CVE-2023/CVE-2023-427xx/CVE-2023-42745.json) (`2023-12-04T01:15:11.873`)
|
||||
* [CVE-2023-42746](CVE-2023/CVE-2023-427xx/CVE-2023-42746.json) (`2023-12-04T01:15:11.920`)
|
||||
* [CVE-2023-42747](CVE-2023/CVE-2023-427xx/CVE-2023-42747.json) (`2023-12-04T01:15:11.957`)
|
||||
* [CVE-2023-42748](CVE-2023/CVE-2023-427xx/CVE-2023-42748.json) (`2023-12-04T01:15:12.000`)
|
||||
* [CVE-2023-42749](CVE-2023/CVE-2023-427xx/CVE-2023-42749.json) (`2023-12-04T01:15:12.047`)
|
||||
* [CVE-2023-42751](CVE-2023/CVE-2023-427xx/CVE-2023-42751.json) (`2023-12-04T01:15:12.097`)
|
||||
* [CVE-2023-46167](CVE-2023/CVE-2023-461xx/CVE-2023-46167.json) (`2023-12-04T01:15:12.147`)
|
||||
* [CVE-2023-47701](CVE-2023/CVE-2023-477xx/CVE-2023-47701.json) (`2023-12-04T01:15:12.340`)
|
||||
* [CVE-2023-29258](CVE-2023/CVE-2023-292xx/CVE-2023-29258.json) (`2023-12-04T02:15:06.647`)
|
||||
* [CVE-2023-38727](CVE-2023/CVE-2023-387xx/CVE-2023-38727.json) (`2023-12-04T02:15:06.867`)
|
||||
* [CVE-2023-40687](CVE-2023/CVE-2023-406xx/CVE-2023-40687.json) (`2023-12-04T02:15:07.077`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `6`
|
||||
|
||||
* [CVE-2022-4957](CVE-2022/CVE-2022-49xx/CVE-2022-4957.json) (`2023-12-04T02:58:50.030`)
|
||||
* [CVE-2023-45178](CVE-2023/CVE-2023-451xx/CVE-2023-45178.json) (`2023-12-04T02:58:50.030`)
|
||||
* [CVE-2023-49946](CVE-2023/CVE-2023-499xx/CVE-2023-49946.json) (`2023-12-04T02:58:50.030`)
|
||||
* [CVE-2023-49947](CVE-2023/CVE-2023-499xx/CVE-2023-49947.json) (`2023-12-04T02:58:50.030`)
|
||||
* [CVE-2023-49948](CVE-2023/CVE-2023-499xx/CVE-2023-49948.json) (`2023-12-04T02:58:50.030`)
|
||||
* [CVE-2023-40692](CVE-2023/CVE-2023-406xx/CVE-2023-40692.json) (`2023-12-04T02:58:50.030`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user