Auto-Update: 2023-12-04T03:00:18.824550+00:00

This commit is contained in:
cad-safe-bot 2023-12-04 03:00:23 +00:00
parent ad33d1b686
commit 823f5e3851
96 changed files with 2051 additions and 19 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48462",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.053",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48463",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.117",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48464",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.163",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4957",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-03T19:15:07.950",
"lastModified": "2023-12-03T19:15:07.950",
"vulnStatus": "Received",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-29258",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-12-04T02:15:06.647",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1, and 11.5 is vulnerable to a denial of service through a specially crafted federated query on specific federation objects. IBM X-Force ID: 252048."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/252048",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7087218",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2023-38003",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-12-04T01:15:08.217",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 could allow a user with DATAACCESS privileges to execute routines that they should not have access to. IBM X-Force ID: 260214."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260214",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7078681",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-38727",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-12-04T02:15:06.867",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted SQL statement. IBM X-Force ID: 262257."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/262257",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7087143",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-40687",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-12-04T02:15:07.077",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM DB2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted RUNSTATS command on an 8TB table. IBM X-Force ID: 264809."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/264809",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7087149",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40692",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-12-04T00:15:07.000",
"lastModified": "2023-12-04T00:15:07.000",
"vulnStatus": "Received",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42671",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.383",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42672",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.433",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42673",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.483",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42674",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.537",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42675",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.587",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42676",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.630",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42677",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.673",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42678",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.727",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42679",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.773",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In gpu driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42680",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.820",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In gpu driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42681",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.873",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In ion service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42682",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.927",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In gsp driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42683",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:08.970",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In gsp driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42684",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.017",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In gsp driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42685",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.077",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42686",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.130",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42687",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.180",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42688",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.223",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42689",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.280",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42690",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.327",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42691",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.373",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42692",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.417",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42693",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.463",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42694",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.513",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42695",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.563",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42696",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.613",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42697",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.660",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In omacp service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42698",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.707",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In omacp service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42699",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.753",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In omacp service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42700",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.800",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42701",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.850",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42702",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.897",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42703",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.940",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42704",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:09.987",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42705",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.040",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42706",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.083",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42707",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.130",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42708",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.173",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42709",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.220",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42710",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.263",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42711",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.310",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42712",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.353",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42713",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.403",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42714",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.443",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42715",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.490",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42716",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.530",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telephony service, there is a possible missing permission check. This could lead to remote information disclosure no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42717",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.577",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telephony service, there is a possible missing permission check. This could lead to remote information disclosure no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42718",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.627",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In dialer, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42719",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.673",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In video service, there is a possible out of bounds read due to a incorrect bounds check. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42720",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.723",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In video service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42721",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.770",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In flv extractor, there is a possible missing verification incorrect input. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42722",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.817",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In camera service, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42723",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.863",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In camera service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42724",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.910",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In gpu driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42725",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:10.957",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In gpu driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42726",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.000",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In TeleService, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42727",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.047",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In gpu driver, there is a possible out of bounds write due to a incorrect bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42728",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.090",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In phasecheckserver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42729",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.137",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In ril service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42730",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.183",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In IMS service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42731",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.233",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In Gnss service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42732",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.277",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42733",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.320",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42734",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.370",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42735",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.423",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42736",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.470",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42737",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.517",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telecom service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42738",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.560",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telocom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42739",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.607",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In engineermode service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42740",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.650",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telecom service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42741",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.697",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telecom service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42742",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.740",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In sysui, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42743",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.783",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42744",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.830",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telecom service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42745",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.873",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42746",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.920",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In power manager, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42747",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.957",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In camera service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42748",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:12.000",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42749",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:12.047",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In enginnermode service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42751",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:12.097",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In gnss service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049",
"source": "security@unisoc.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45178",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-12-03T18:15:42.273",
"lastModified": "2023-12-03T18:15:42.273",
"vulnStatus": "Received",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-46167",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-12-04T01:15:12.147",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 federated server is vulnerable to a denial of service when a specially crafted cursor is used. IBM X-Force ID: 269367."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269367",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7087203",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-47701",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-12-04T01:15:12.340",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted query. IBM X-Force ID: 266166."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/266166",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7087180",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49946",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-03T19:15:08.227",
"lastModified": "2023-12-03T19:15:08.227",
"vulnStatus": "Received",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49947",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-03T19:15:08.280",
"lastModified": "2023-12-03T19:15:08.280",
"vulnStatus": "Received",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49948",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-03T19:15:08.330",
"lastModified": "2023-12-03T19:15:08.330",
"vulnStatus": "Received",
"lastModified": "2023-12-04T02:58:50.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-12-04T00:55:18.173209+00:00
2023-12-04T03:00:18.824550+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-12-04T00:15:07+00:00
2023-12-04T02:58:50.030000+00:00
```
### Last Data Feed Release
@ -23,26 +23,56 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2023-12-03T01:00:13.535727+00:00
2023-12-04T01:00:13.555729+00:00
```
### Total Number of included CVEs
```plain
231998
232087
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `89`
* [CVE-2023-40692](CVE-2023/CVE-2023-406xx/CVE-2023-40692.json) (`2023-12-04T00:15:07.000`)
* [CVE-2023-42731](CVE-2023/CVE-2023-427xx/CVE-2023-42731.json) (`2023-12-04T01:15:11.233`)
* [CVE-2023-42732](CVE-2023/CVE-2023-427xx/CVE-2023-42732.json) (`2023-12-04T01:15:11.277`)
* [CVE-2023-42733](CVE-2023/CVE-2023-427xx/CVE-2023-42733.json) (`2023-12-04T01:15:11.320`)
* [CVE-2023-42734](CVE-2023/CVE-2023-427xx/CVE-2023-42734.json) (`2023-12-04T01:15:11.370`)
* [CVE-2023-42735](CVE-2023/CVE-2023-427xx/CVE-2023-42735.json) (`2023-12-04T01:15:11.423`)
* [CVE-2023-42736](CVE-2023/CVE-2023-427xx/CVE-2023-42736.json) (`2023-12-04T01:15:11.470`)
* [CVE-2023-42737](CVE-2023/CVE-2023-427xx/CVE-2023-42737.json) (`2023-12-04T01:15:11.517`)
* [CVE-2023-42738](CVE-2023/CVE-2023-427xx/CVE-2023-42738.json) (`2023-12-04T01:15:11.560`)
* [CVE-2023-42739](CVE-2023/CVE-2023-427xx/CVE-2023-42739.json) (`2023-12-04T01:15:11.607`)
* [CVE-2023-42740](CVE-2023/CVE-2023-427xx/CVE-2023-42740.json) (`2023-12-04T01:15:11.650`)
* [CVE-2023-42741](CVE-2023/CVE-2023-427xx/CVE-2023-42741.json) (`2023-12-04T01:15:11.697`)
* [CVE-2023-42742](CVE-2023/CVE-2023-427xx/CVE-2023-42742.json) (`2023-12-04T01:15:11.740`)
* [CVE-2023-42743](CVE-2023/CVE-2023-427xx/CVE-2023-42743.json) (`2023-12-04T01:15:11.783`)
* [CVE-2023-42744](CVE-2023/CVE-2023-427xx/CVE-2023-42744.json) (`2023-12-04T01:15:11.830`)
* [CVE-2023-42745](CVE-2023/CVE-2023-427xx/CVE-2023-42745.json) (`2023-12-04T01:15:11.873`)
* [CVE-2023-42746](CVE-2023/CVE-2023-427xx/CVE-2023-42746.json) (`2023-12-04T01:15:11.920`)
* [CVE-2023-42747](CVE-2023/CVE-2023-427xx/CVE-2023-42747.json) (`2023-12-04T01:15:11.957`)
* [CVE-2023-42748](CVE-2023/CVE-2023-427xx/CVE-2023-42748.json) (`2023-12-04T01:15:12.000`)
* [CVE-2023-42749](CVE-2023/CVE-2023-427xx/CVE-2023-42749.json) (`2023-12-04T01:15:12.047`)
* [CVE-2023-42751](CVE-2023/CVE-2023-427xx/CVE-2023-42751.json) (`2023-12-04T01:15:12.097`)
* [CVE-2023-46167](CVE-2023/CVE-2023-461xx/CVE-2023-46167.json) (`2023-12-04T01:15:12.147`)
* [CVE-2023-47701](CVE-2023/CVE-2023-477xx/CVE-2023-47701.json) (`2023-12-04T01:15:12.340`)
* [CVE-2023-29258](CVE-2023/CVE-2023-292xx/CVE-2023-29258.json) (`2023-12-04T02:15:06.647`)
* [CVE-2023-38727](CVE-2023/CVE-2023-387xx/CVE-2023-38727.json) (`2023-12-04T02:15:06.867`)
* [CVE-2023-40687](CVE-2023/CVE-2023-406xx/CVE-2023-40687.json) (`2023-12-04T02:15:07.077`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `6`
* [CVE-2022-4957](CVE-2022/CVE-2022-49xx/CVE-2022-4957.json) (`2023-12-04T02:58:50.030`)
* [CVE-2023-45178](CVE-2023/CVE-2023-451xx/CVE-2023-45178.json) (`2023-12-04T02:58:50.030`)
* [CVE-2023-49946](CVE-2023/CVE-2023-499xx/CVE-2023-49946.json) (`2023-12-04T02:58:50.030`)
* [CVE-2023-49947](CVE-2023/CVE-2023-499xx/CVE-2023-49947.json) (`2023-12-04T02:58:50.030`)
* [CVE-2023-49948](CVE-2023/CVE-2023-499xx/CVE-2023-49948.json) (`2023-12-04T02:58:50.030`)
* [CVE-2023-40692](CVE-2023/CVE-2023-406xx/CVE-2023-40692.json) (`2023-12-04T02:58:50.030`)
## Download and Usage