From 823f5e3851ab1559cc9223b4d9a60c39e0982dc2 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 4 Dec 2023 03:00:23 +0000 Subject: [PATCH] Auto-Update: 2023-12-04T03:00:18.824550+00:00 --- CVE-2022/CVE-2022-484xx/CVE-2022-48462.json | 20 +++++++ CVE-2022/CVE-2022-484xx/CVE-2022-48463.json | 20 +++++++ CVE-2022/CVE-2022-484xx/CVE-2022-48464.json | 20 +++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4957.json | 4 +- CVE-2023/CVE-2023-292xx/CVE-2023-29258.json | 59 +++++++++++++++++++++ CVE-2023/CVE-2023-380xx/CVE-2023-38003.json | 47 ++++++++++++++++ CVE-2023/CVE-2023-387xx/CVE-2023-38727.json | 59 +++++++++++++++++++++ CVE-2023/CVE-2023-406xx/CVE-2023-40687.json | 59 +++++++++++++++++++++ CVE-2023/CVE-2023-406xx/CVE-2023-40692.json | 4 +- CVE-2023/CVE-2023-426xx/CVE-2023-42671.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42672.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42673.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42674.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42675.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42676.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42677.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42678.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42679.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42680.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42681.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42682.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42683.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42684.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42685.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42686.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42687.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42688.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42689.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42690.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42691.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42692.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42693.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42694.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42695.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42696.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42697.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42698.json | 20 +++++++ CVE-2023/CVE-2023-426xx/CVE-2023-42699.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42700.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42701.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42702.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42703.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42704.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42705.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42706.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42707.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42708.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42709.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42710.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42711.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42712.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42713.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42714.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42715.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42716.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42717.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42718.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42719.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42720.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42721.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42722.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42723.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42724.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42725.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42726.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42727.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42728.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42729.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42730.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42731.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42732.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42733.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42734.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42735.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42736.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42737.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42738.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42739.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42740.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42741.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42742.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42743.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42744.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42745.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42746.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42747.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42748.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42749.json | 20 +++++++ CVE-2023/CVE-2023-427xx/CVE-2023-42751.json | 20 +++++++ CVE-2023/CVE-2023-451xx/CVE-2023-45178.json | 4 +- CVE-2023/CVE-2023-461xx/CVE-2023-46167.json | 59 +++++++++++++++++++++ CVE-2023/CVE-2023-477xx/CVE-2023-47701.json | 59 +++++++++++++++++++++ CVE-2023/CVE-2023-499xx/CVE-2023-49946.json | 4 +- CVE-2023/CVE-2023-499xx/CVE-2023-49947.json | 4 +- CVE-2023/CVE-2023-499xx/CVE-2023-49948.json | 4 +- README.md | 44 ++++++++++++--- 96 files changed, 2051 insertions(+), 19 deletions(-) create mode 100644 CVE-2022/CVE-2022-484xx/CVE-2022-48462.json create mode 100644 CVE-2022/CVE-2022-484xx/CVE-2022-48463.json create mode 100644 CVE-2022/CVE-2022-484xx/CVE-2022-48464.json create mode 100644 CVE-2023/CVE-2023-292xx/CVE-2023-29258.json create mode 100644 CVE-2023/CVE-2023-380xx/CVE-2023-38003.json create mode 100644 CVE-2023/CVE-2023-387xx/CVE-2023-38727.json create mode 100644 CVE-2023/CVE-2023-406xx/CVE-2023-40687.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42671.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42672.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42673.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42674.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42675.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42676.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42677.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42678.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42679.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42680.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42681.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42682.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42683.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42684.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42685.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42686.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42687.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42688.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42689.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42690.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42691.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42692.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42693.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42694.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42695.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42696.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42697.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42698.json create mode 100644 CVE-2023/CVE-2023-426xx/CVE-2023-42699.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42700.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42701.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42702.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42703.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42704.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42705.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42706.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42707.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42708.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42709.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42710.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42711.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42712.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42713.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42714.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42715.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42716.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42717.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42718.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42719.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42720.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42721.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42722.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42723.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42724.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42725.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42726.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42727.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42728.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42729.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42730.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42731.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42732.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42733.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42734.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42735.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42736.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42737.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42738.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42739.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42740.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42741.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42742.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42743.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42744.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42745.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42746.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42747.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42748.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42749.json create mode 100644 CVE-2023/CVE-2023-427xx/CVE-2023-42751.json create mode 100644 CVE-2023/CVE-2023-461xx/CVE-2023-46167.json create mode 100644 CVE-2023/CVE-2023-477xx/CVE-2023-47701.json diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48462.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48462.json new file mode 100644 index 00000000000..14c68d77f31 --- /dev/null +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48462.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2022-48462", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.053", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48463.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48463.json new file mode 100644 index 00000000000..5aba688e5e2 --- /dev/null +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48463.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2022-48463", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.117", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48464.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48464.json new file mode 100644 index 00000000000..4cf08121e26 --- /dev/null +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48464.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2022-48464", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.163", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4957.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4957.json index 30170153eaf..a9dce980cf9 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4957.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4957.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4957", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-03T19:15:07.950", - "lastModified": "2023-12-03T19:15:07.950", - "vulnStatus": "Received", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29258.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29258.json new file mode 100644 index 00000000000..f918c5bc41c --- /dev/null +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29258.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-29258", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-12-04T02:15:06.647", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1, and 11.5 is vulnerable to a denial of service through a specially crafted federated query on specific federation objects. IBM X-Force ID: 252048." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/252048", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7087218", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38003.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38003.json new file mode 100644 index 00000000000..bb2753e3ab1 --- /dev/null +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38003.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2023-38003", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-12-04T01:15:08.217", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 could allow a user with DATAACCESS privileges to execute routines that they should not have access to. IBM X-Force ID: 260214." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260214", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7078681", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-387xx/CVE-2023-38727.json b/CVE-2023/CVE-2023-387xx/CVE-2023-38727.json new file mode 100644 index 00000000000..31ed0bde14a --- /dev/null +++ b/CVE-2023/CVE-2023-387xx/CVE-2023-38727.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38727", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-12-04T02:15:06.867", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted SQL statement. IBM X-Force ID: 262257." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/262257", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7087143", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40687.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40687.json new file mode 100644 index 00000000000..5e69acb895d --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40687.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-40687", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-12-04T02:15:07.077", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM DB2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted RUNSTATS command on an 8TB table. IBM X-Force ID: 264809." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/264809", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7087149", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40692.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40692.json index d6b0f627529..b2bb2c608b0 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40692.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40692.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40692", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-12-04T00:15:07.000", - "lastModified": "2023-12-04T00:15:07.000", - "vulnStatus": "Received", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42671.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42671.json new file mode 100644 index 00000000000..87a0a6bf22c --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42671.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42671", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.383", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42672.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42672.json new file mode 100644 index 00000000000..4d8762caca5 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42672.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42672", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.433", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42673.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42673.json new file mode 100644 index 00000000000..7b57ca0dc10 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42673.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42673", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.483", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42674.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42674.json new file mode 100644 index 00000000000..e6c5bbb0a27 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42674.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42674", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.537", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42675.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42675.json new file mode 100644 index 00000000000..a67c7eb1800 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42675.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42675", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.587", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42676.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42676.json new file mode 100644 index 00000000000..32ff2111473 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42676.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42676", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.630", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42677.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42677.json new file mode 100644 index 00000000000..847e14fedf5 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42677.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42677", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.673", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42678.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42678.json new file mode 100644 index 00000000000..51f218ab701 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42678.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42678", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.727", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42679.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42679.json new file mode 100644 index 00000000000..fd673221aee --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42679.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42679", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.773", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In gpu driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42680.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42680.json new file mode 100644 index 00000000000..f3c01368787 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42680.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42680", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.820", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In gpu driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42681.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42681.json new file mode 100644 index 00000000000..9585a7e540c --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42681.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42681", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.873", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In ion service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42682.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42682.json new file mode 100644 index 00000000000..86764fa68e1 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42682.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42682", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.927", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In gsp driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42683.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42683.json new file mode 100644 index 00000000000..1011af33157 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42683.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42683", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:08.970", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In gsp driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42684.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42684.json new file mode 100644 index 00000000000..562c437f63c --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42684.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42684", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.017", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In gsp driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42685.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42685.json new file mode 100644 index 00000000000..fba2211233c --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42685.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42685", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.077", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42686.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42686.json new file mode 100644 index 00000000000..3158b35be0b --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42686.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42686", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.130", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42687.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42687.json new file mode 100644 index 00000000000..68194b6051f --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42687.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42687", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.180", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42688.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42688.json new file mode 100644 index 00000000000..eb6653c12ed --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42688.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42688", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.223", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42689.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42689.json new file mode 100644 index 00000000000..6f1f369f4a2 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42689.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42689", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.280", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42690.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42690.json new file mode 100644 index 00000000000..55a997f5a4a --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42690.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42690", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.327", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42691.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42691.json new file mode 100644 index 00000000000..47fee481297 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42691.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42691", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.373", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42692.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42692.json new file mode 100644 index 00000000000..3d2ab459409 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42692.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42692", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.417", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42693.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42693.json new file mode 100644 index 00000000000..5cfeeec431c --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42693.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42693", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.463", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42694.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42694.json new file mode 100644 index 00000000000..a29a5c0f07e --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42694.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42694", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.513", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42695.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42695.json new file mode 100644 index 00000000000..b028b56875f --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42695.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42695", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.563", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42696.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42696.json new file mode 100644 index 00000000000..8b6e8e310d7 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42696.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42696", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.613", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42697.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42697.json new file mode 100644 index 00000000000..2bb43a6f52f --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42697.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42697", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.660", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In omacp service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42698.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42698.json new file mode 100644 index 00000000000..54a6943560c --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42698.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42698", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.707", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In omacp service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42699.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42699.json new file mode 100644 index 00000000000..c16ef4a03d4 --- /dev/null +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42699.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42699", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.753", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In omacp service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42700.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42700.json new file mode 100644 index 00000000000..1e521c4a382 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42700.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42700", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.800", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42701.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42701.json new file mode 100644 index 00000000000..8f70f71a7f6 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42701.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42701", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.850", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42702.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42702.json new file mode 100644 index 00000000000..28b2d02efca --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42702.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42702", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.897", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42703.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42703.json new file mode 100644 index 00000000000..3e9acdd82f3 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42703.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42703", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.940", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42704.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42704.json new file mode 100644 index 00000000000..8a27a08d5ed --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42704.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42704", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:09.987", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42705.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42705.json new file mode 100644 index 00000000000..dbdd6e4f20a --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42705.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42705", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.040", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42706.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42706.json new file mode 100644 index 00000000000..7a3f73c56b9 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42706.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42706", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.083", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42707.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42707.json new file mode 100644 index 00000000000..1f85ec8486c --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42707.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42707", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.130", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42708.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42708.json new file mode 100644 index 00000000000..b4a84a3542c --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42708.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42708", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.173", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42709.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42709.json new file mode 100644 index 00000000000..c5933efa314 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42709.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42709", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.220", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42710.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42710.json new file mode 100644 index 00000000000..99887f0783d --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42710.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42710", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.263", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42711.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42711.json new file mode 100644 index 00000000000..6fbdfab5dd1 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42711.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42711", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.310", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42712.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42712.json new file mode 100644 index 00000000000..3dae9368524 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42712.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42712", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.353", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42713.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42713.json new file mode 100644 index 00000000000..e025970ff56 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42713.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42713", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.403", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42714.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42714.json new file mode 100644 index 00000000000..fb2bccf9b10 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42714.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42714", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.443", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42715.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42715.json new file mode 100644 index 00000000000..7a1815ec0a8 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42715.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42715", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.490", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42716.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42716.json new file mode 100644 index 00000000000..6b345b804dd --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42716.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42716", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.530", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telephony service, there is a possible missing permission check. This could lead to remote information disclosure no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42717.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42717.json new file mode 100644 index 00000000000..b2df27ed38f --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42717.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42717", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.577", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telephony service, there is a possible missing permission check. This could lead to remote information disclosure no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42718.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42718.json new file mode 100644 index 00000000000..88acc9ae240 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42718.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42718", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.627", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In dialer, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42719.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42719.json new file mode 100644 index 00000000000..dd912f7cbc4 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42719.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42719", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.673", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In video service, there is a possible out of bounds read due to a incorrect bounds check. This could lead to local denial of service with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42720.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42720.json new file mode 100644 index 00000000000..bb82a876e56 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42720.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42720", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.723", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In video service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42721.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42721.json new file mode 100644 index 00000000000..48c2109c647 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42721.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42721", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.770", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In flv extractor, there is a possible missing verification incorrect input. This could lead to local denial of service with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42722.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42722.json new file mode 100644 index 00000000000..07407b6c1cf --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42722.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42722", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.817", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In camera service, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42723.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42723.json new file mode 100644 index 00000000000..91a694e5049 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42723.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42723", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.863", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In camera service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42724.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42724.json new file mode 100644 index 00000000000..4872c7fad90 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42724.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42724", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.910", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In gpu driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42725.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42725.json new file mode 100644 index 00000000000..7fb12ec3105 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42725.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42725", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:10.957", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In gpu driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42726.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42726.json new file mode 100644 index 00000000000..cceac1136a2 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42726.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42726", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.000", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In TeleService, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42727.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42727.json new file mode 100644 index 00000000000..350fa1c40d6 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42727.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42727", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.047", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In gpu driver, there is a possible out of bounds write due to a incorrect bounds check. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42728.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42728.json new file mode 100644 index 00000000000..9eb307e7b1c --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42728.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42728", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.090", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In phasecheckserver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42729.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42729.json new file mode 100644 index 00000000000..4801598b6c1 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42729.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42729", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.137", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In ril service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42730.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42730.json new file mode 100644 index 00000000000..88fdc863a4e --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42730.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42730", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.183", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In IMS service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42731.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42731.json new file mode 100644 index 00000000000..0dc9eae6ba8 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42731.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42731", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.233", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In Gnss service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42732.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42732.json new file mode 100644 index 00000000000..9c20a781799 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42732.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42732", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.277", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42733.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42733.json new file mode 100644 index 00000000000..be12ba2db5c --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42733.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42733", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.320", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42734.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42734.json new file mode 100644 index 00000000000..359d26a89e4 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42734.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42734", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.370", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42735.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42735.json new file mode 100644 index 00000000000..35474d8a001 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42735.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42735", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.423", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telephony service, there is a possible missing permission check. This could lead to local information disclosure with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42736.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42736.json new file mode 100644 index 00000000000..4efbb74a3eb --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42736.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42736", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.470", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42737.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42737.json new file mode 100644 index 00000000000..554b111d7e7 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42737.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42737", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.517", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telecom service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42738.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42738.json new file mode 100644 index 00000000000..fa05d505d4d --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42738.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42738", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.560", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telocom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42739.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42739.json new file mode 100644 index 00000000000..c2bb37d248b --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42739.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42739", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.607", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In engineermode service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42740.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42740.json new file mode 100644 index 00000000000..e5fb5fa4a69 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42740.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42740", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.650", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telecom service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42741.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42741.json new file mode 100644 index 00000000000..48924e6f2e1 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42741.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42741", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.697", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telecom service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42742.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42742.json new file mode 100644 index 00000000000..9a9ef5e4b20 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42742.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42742", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.740", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In sysui, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42743.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42743.json new file mode 100644 index 00000000000..d479459fff7 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42743.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42743", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.783", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42744.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42744.json new file mode 100644 index 00000000000..dd56fa2f089 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42744.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42744", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.830", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telecom service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42745.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42745.json new file mode 100644 index 00000000000..c82a0118e58 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42745.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42745", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.873", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42746.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42746.json new file mode 100644 index 00000000000..8cd40038586 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42746.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42746", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.920", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In power manager, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42747.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42747.json new file mode 100644 index 00000000000..e8618cec0d4 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42747.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42747", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:11.957", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In camera service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42748.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42748.json new file mode 100644 index 00000000000..c4db76fa7fd --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42748.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42748", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:12.000", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42749.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42749.json new file mode 100644 index 00000000000..41cef57e26e --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42749.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42749", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:12.047", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In enginnermode service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42751.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42751.json new file mode 100644 index 00000000000..b1af56b1ab5 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42751.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42751", + "sourceIdentifier": "security@unisoc.com", + "published": "2023-12-04T01:15:12.097", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In gnss service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049", + "source": "security@unisoc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45178.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45178.json index c72104e9696..1d6e96137a7 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45178.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45178.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45178", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-12-03T18:15:42.273", - "lastModified": "2023-12-03T18:15:42.273", - "vulnStatus": "Received", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46167.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46167.json new file mode 100644 index 00000000000..a2020338677 --- /dev/null +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46167.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-46167", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-12-04T01:15:12.147", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 federated server is vulnerable to a denial of service when a specially crafted cursor is used. IBM X-Force ID: 269367." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269367", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7087203", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47701.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47701.json new file mode 100644 index 00000000000..2659d73f106 --- /dev/null +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47701.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-47701", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-12-04T01:15:12.340", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted query. IBM X-Force ID: 266166." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/266166", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7087180", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49946.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49946.json index 25b9570a227..cbabe87bb80 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49946.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49946.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49946", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-03T19:15:08.227", - "lastModified": "2023-12-03T19:15:08.227", - "vulnStatus": "Received", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49947.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49947.json index 38da438c623..d4aea94a665 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49947.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49947.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49947", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-03T19:15:08.280", - "lastModified": "2023-12-03T19:15:08.280", - "vulnStatus": "Received", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49948.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49948.json index 5b0fa167a4c..f89c37b96d1 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49948.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49948.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49948", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-03T19:15:08.330", - "lastModified": "2023-12-03T19:15:08.330", - "vulnStatus": "Received", + "lastModified": "2023-12-04T02:58:50.030", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index baee3464342..ef2cf189a62 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-04T00:55:18.173209+00:00 +2023-12-04T03:00:18.824550+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-04T00:15:07+00:00 +2023-12-04T02:58:50.030000+00:00 ``` ### Last Data Feed Release @@ -23,26 +23,56 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2023-12-03T01:00:13.535727+00:00 +2023-12-04T01:00:13.555729+00:00 ``` ### Total Number of included CVEs ```plain -231998 +232087 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `89` -* [CVE-2023-40692](CVE-2023/CVE-2023-406xx/CVE-2023-40692.json) (`2023-12-04T00:15:07.000`) +* [CVE-2023-42731](CVE-2023/CVE-2023-427xx/CVE-2023-42731.json) (`2023-12-04T01:15:11.233`) +* [CVE-2023-42732](CVE-2023/CVE-2023-427xx/CVE-2023-42732.json) (`2023-12-04T01:15:11.277`) +* [CVE-2023-42733](CVE-2023/CVE-2023-427xx/CVE-2023-42733.json) (`2023-12-04T01:15:11.320`) +* [CVE-2023-42734](CVE-2023/CVE-2023-427xx/CVE-2023-42734.json) (`2023-12-04T01:15:11.370`) +* [CVE-2023-42735](CVE-2023/CVE-2023-427xx/CVE-2023-42735.json) (`2023-12-04T01:15:11.423`) +* [CVE-2023-42736](CVE-2023/CVE-2023-427xx/CVE-2023-42736.json) (`2023-12-04T01:15:11.470`) +* [CVE-2023-42737](CVE-2023/CVE-2023-427xx/CVE-2023-42737.json) (`2023-12-04T01:15:11.517`) +* [CVE-2023-42738](CVE-2023/CVE-2023-427xx/CVE-2023-42738.json) (`2023-12-04T01:15:11.560`) +* [CVE-2023-42739](CVE-2023/CVE-2023-427xx/CVE-2023-42739.json) (`2023-12-04T01:15:11.607`) +* [CVE-2023-42740](CVE-2023/CVE-2023-427xx/CVE-2023-42740.json) (`2023-12-04T01:15:11.650`) +* [CVE-2023-42741](CVE-2023/CVE-2023-427xx/CVE-2023-42741.json) (`2023-12-04T01:15:11.697`) +* [CVE-2023-42742](CVE-2023/CVE-2023-427xx/CVE-2023-42742.json) (`2023-12-04T01:15:11.740`) +* [CVE-2023-42743](CVE-2023/CVE-2023-427xx/CVE-2023-42743.json) (`2023-12-04T01:15:11.783`) +* [CVE-2023-42744](CVE-2023/CVE-2023-427xx/CVE-2023-42744.json) (`2023-12-04T01:15:11.830`) +* [CVE-2023-42745](CVE-2023/CVE-2023-427xx/CVE-2023-42745.json) (`2023-12-04T01:15:11.873`) +* [CVE-2023-42746](CVE-2023/CVE-2023-427xx/CVE-2023-42746.json) (`2023-12-04T01:15:11.920`) +* [CVE-2023-42747](CVE-2023/CVE-2023-427xx/CVE-2023-42747.json) (`2023-12-04T01:15:11.957`) +* [CVE-2023-42748](CVE-2023/CVE-2023-427xx/CVE-2023-42748.json) (`2023-12-04T01:15:12.000`) +* [CVE-2023-42749](CVE-2023/CVE-2023-427xx/CVE-2023-42749.json) (`2023-12-04T01:15:12.047`) +* [CVE-2023-42751](CVE-2023/CVE-2023-427xx/CVE-2023-42751.json) (`2023-12-04T01:15:12.097`) +* [CVE-2023-46167](CVE-2023/CVE-2023-461xx/CVE-2023-46167.json) (`2023-12-04T01:15:12.147`) +* [CVE-2023-47701](CVE-2023/CVE-2023-477xx/CVE-2023-47701.json) (`2023-12-04T01:15:12.340`) +* [CVE-2023-29258](CVE-2023/CVE-2023-292xx/CVE-2023-29258.json) (`2023-12-04T02:15:06.647`) +* [CVE-2023-38727](CVE-2023/CVE-2023-387xx/CVE-2023-38727.json) (`2023-12-04T02:15:06.867`) +* [CVE-2023-40687](CVE-2023/CVE-2023-406xx/CVE-2023-40687.json) (`2023-12-04T02:15:07.077`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `6` +* [CVE-2022-4957](CVE-2022/CVE-2022-49xx/CVE-2022-4957.json) (`2023-12-04T02:58:50.030`) +* [CVE-2023-45178](CVE-2023/CVE-2023-451xx/CVE-2023-45178.json) (`2023-12-04T02:58:50.030`) +* [CVE-2023-49946](CVE-2023/CVE-2023-499xx/CVE-2023-49946.json) (`2023-12-04T02:58:50.030`) +* [CVE-2023-49947](CVE-2023/CVE-2023-499xx/CVE-2023-49947.json) (`2023-12-04T02:58:50.030`) +* [CVE-2023-49948](CVE-2023/CVE-2023-499xx/CVE-2023-49948.json) (`2023-12-04T02:58:50.030`) +* [CVE-2023-40692](CVE-2023/CVE-2023-406xx/CVE-2023-40692.json) (`2023-12-04T02:58:50.030`) ## Download and Usage