mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-01-06T00:55:25.022858+00:00
This commit is contained in:
parent
9dbcee056b
commit
bc9e21f82b
@ -2,19 +2,80 @@
|
||||
"id": "CVE-2023-41542",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-30T02:15:08.393",
|
||||
"lastModified": "2024-01-01T02:12:45.130",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-01-05T23:17:56.740",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in jeecg-boot version 3.5.3, allows remote attackers to escalate privileges and obtain sensitive information via the jmreport/qurestSql component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL en jeecg-boot versi\u00f3n 3.5.3, permite a atacantes remotos escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del componente jmreport/qurestSql."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.5.3",
|
||||
"matchCriteriaId": "AB2E1EE1-D408-4689-8A4F-CDF2C09DAC83"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://pho3n1x-web.github.io/2023/09/15/CVE-2023-41542%28JeecgBoot_sql%29/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,88 @@
|
||||
"id": "CVE-2023-41543",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-30T02:15:08.447",
|
||||
"lastModified": "2024-01-01T02:12:45.130",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-01-05T23:26:14.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in jeecg-boot v3.5.3, allows remote attackers to escalate privileges and obtain sensitive information via the component /sys/replicate/check."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL en jeecg-boot v3.5.3, permite a atacantes remotos escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del componente /sys/replicate/check."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.5.3",
|
||||
"matchCriteriaId": "AB2E1EE1-D408-4689-8A4F-CDF2C09DAC83"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mp.weixin.qq.com/s/q6R-kaN4XS5d_cgWtq46vw",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://pho3n1x-web.github.io/2023/09/18/CVE-2023-41543%28JeecgBoot_sql%29/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4468",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-29T10:15:13.140",
|
||||
"lastModified": "2023-12-29T13:56:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-01-05T23:46:50.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -75,22 +95,113 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:poly:trio_8800_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6307C9DD-572F-44E4-ADCD-205CC1553774"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:poly:trio_8800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39862A32-5AF6-41F9-9C25-9D68EB3784DC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:h:poly:trio_c60:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6CDD2376-BD9D-4B5E-B776-0F627D09E025"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:poly:trio_c60:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6CDD2376-BD9D-4B5E-B776-0F627D09E025"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:poly:lens:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7825DE09-D865-4905-BD9D-C6D3A805487F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://modzero.com/en/advisories/mz-23-01-poly-voip-devices/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://modzero.com/en/blog/multiple-vulnerabilities-in-poly-products/",
|
||||
"source": "nvd@nist.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.249261",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.249261",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49550",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-02T23:15:12.167",
|
||||
"lastModified": "2024-01-03T13:48:00.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-01-05T23:53:00.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,11 +14,68 @@
|
||||
"value": "Un problema en Cesanta mjs 2.20.0 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s del componente mjs+0x4ec508."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cesanta/mjs/issues/252",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49551",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-02T23:15:12.233",
|
||||
"lastModified": "2024-01-03T13:48:00.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-01-05T23:53:48.113",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,11 +14,68 @@
|
||||
"value": "Un problema en Cesanta mjs 2.20.0 permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n mjs_op_json_parse en el archivo msj.c."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cesanta/mjs/issues/257",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,82 @@
|
||||
"id": "CVE-2023-50069",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-29T21:15:08.713",
|
||||
"lastModified": "2024-01-01T02:12:45.130",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-01-05T23:08:29.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored cross-site scripting (SXSS) through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "WireMock con GUI, las versiones 3.2.0.0 a 3.0.4.0 son vulnerables a cross-site scripting almacenado (SXSS) a trav\u00e9s de la funci\u00f3n de grabaci\u00f3n. Un atacante puede alojar un payload malicioso y realizar un mapeo de prueba que apunte al archivo del atacante, y el resultado se mostrar\u00e1 en la p\u00e1gina Coincidente en el \u00e1rea Cuerpo, lo que resultar\u00e1 en la ejecuci\u00f3n del payload. Esto ocurre porque el cuerpo de respuesta no est\u00e1 validado ni sanitizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wiremock:wiremock:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.4",
|
||||
"versionEndIncluding": "3.2.0",
|
||||
"matchCriteriaId": "C1A72A41-BF60-4FB0-8E43-810DB8735B17"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/holomekc/wiremock/issues/51",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,85 @@
|
||||
"id": "CVE-2023-50559",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-30T00:15:19.537",
|
||||
"lastModified": "2024-01-01T02:12:45.130",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-01-05T23:14:41.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in XiangShan v2.1, allows local attackers to obtain sensitive information via the L1D cache."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en XiangShan v2.1 que permite a atacantes locales obtener informaci\u00f3n confidencial a trav\u00e9s del cach\u00e9 L1D."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openxiangshan:xiangshan:2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC839723-E94B-48B2-AEF8-1CADA24A123E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/nieeka/5edb552e7cf62cdb18decd9c4292d429",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenXiangShan/XiangShan/issues/2534",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-51663",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-29T17:16:07.363",
|
||||
"lastModified": "2023-12-29T19:28:15.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-01-05T23:36:20.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hail is an open-source, general-purpose, Python-based data analysis tool with additional data types and methods for working with genomic data. Hail relies on OpenID Connect (OIDC) email addresses from ID tokens to verify the validity of a user's domain, but because users have the ability to change their email address, they could create accounts and use resources in clusters that they should not have access to. For example, a user could create a Microsoft or Google account and then change their email to `test@example.org`. This account can then be used to create a Hail Batch account in Hail Batch clusters whose organization domain is `example.org`. The attacker is not able to access private data or impersonate another user, but they would have the ability to run jobs if Hail Batch billing projects are enabled and create Azure Tenants if they have Azure Active Directory Administrator access."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Hail es una herramienta de an\u00e1lisis de datos de c\u00f3digo abierto, de uso general y basada en Python con tipos de datos y m\u00e9todos adicionales para trabajar con datos gen\u00f3micos. Hail depende de las direcciones de correo electr\u00f3nico de OpenID Connect (OIDC) de los tokens de identificaci\u00f3n para verificar la validez del dominio de un usuario, pero debido a que los usuarios tienen la capacidad de cambiar su direcci\u00f3n de correo electr\u00f3nico, podr\u00edan crear cuentas y usar recursos en cl\u00fasteres a los que no deber\u00edan tener acceso. Por ejemplo, un usuario podr\u00eda crear una cuenta de Microsoft o Google y luego cambiar su correo electr\u00f3nico a `test@example.org`. Luego, esta cuenta se puede usar para crear una cuenta de Hail Batch en cl\u00fasteres de Hail Batch cuyo dominio de organizaci\u00f3n es `example.org`. El atacante no puede acceder a datos privados ni hacerse pasar por otro usuario, pero tendr\u00eda la capacidad de ejecutar trabajos si los proyectos de facturaci\u00f3n Hail Batch est\u00e1n habilitados y crear Azure Tenants si tienen acceso a Azure Active Directory Administrator."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hail:hail:*:*:*:*:*:python:*:*",
|
||||
"versionEndExcluding": "0.2.127",
|
||||
"matchCriteriaId": "93EC3CA1-BC31-491A-A1F0-5D23431D34FA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hail-is/hail/security/advisories/GHSA-487p-qx68-5vjw",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-51766",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-24T06:15:07.673",
|
||||
"lastModified": "2024-01-04T18:15:08.680",
|
||||
"lastModified": "2024-01-05T23:15:08.963",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -205,6 +205,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/",
|
||||
"source": "cve@mitre.org",
|
||||
|
44
README.md
44
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-01-05T23:00:24.775086+00:00
|
||||
2024-01-06T00:55:25.022858+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-01-05T22:25:32.113000+00:00
|
||||
2024-01-05T23:53:48.113000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -34,41 +34,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
* [CVE-2024-21641](CVE-2024/CVE-2024-216xx/CVE-2024-21641.json) (`2024-01-05T21:15:43.337`)
|
||||
* [CVE-2024-21642](CVE-2024/CVE-2024-216xx/CVE-2024-21642.json) (`2024-01-05T22:15:43.190`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `26`
|
||||
Recently modified CVEs: `9`
|
||||
|
||||
* [CVE-2023-49135](CVE-2023/CVE-2023-491xx/CVE-2023-49135.json) (`2024-01-05T22:04:16.437`)
|
||||
* [CVE-2023-48360](CVE-2023/CVE-2023-483xx/CVE-2023-48360.json) (`2024-01-05T22:04:53.347`)
|
||||
* [CVE-2023-47857](CVE-2023/CVE-2023-478xx/CVE-2023-47857.json) (`2024-01-05T22:05:02.297`)
|
||||
* [CVE-2023-52182](CVE-2023/CVE-2023-521xx/CVE-2023-52182.json) (`2024-01-05T22:05:15.113`)
|
||||
* [CVE-2023-52181](CVE-2023/CVE-2023-521xx/CVE-2023-52181.json) (`2024-01-05T22:05:24.617`)
|
||||
* [CVE-2023-39157](CVE-2023/CVE-2023-391xx/CVE-2023-39157.json) (`2024-01-05T22:05:37.803`)
|
||||
* [CVE-2023-7130](CVE-2023/CVE-2023-71xx/CVE-2023-7130.json) (`2024-01-05T22:06:29.740`)
|
||||
* [CVE-2023-52286](CVE-2023/CVE-2023-522xx/CVE-2023-52286.json) (`2024-01-05T22:06:41.313`)
|
||||
* [CVE-2023-7188](CVE-2023/CVE-2023-71xx/CVE-2023-7188.json) (`2024-01-05T22:19:11.897`)
|
||||
* [CVE-2023-7187](CVE-2023/CVE-2023-71xx/CVE-2023-7187.json) (`2024-01-05T22:19:30.973`)
|
||||
* [CVE-2023-52134](CVE-2023/CVE-2023-521xx/CVE-2023-52134.json) (`2024-01-05T22:20:17.520`)
|
||||
* [CVE-2023-52185](CVE-2023/CVE-2023-521xx/CVE-2023-52185.json) (`2024-01-05T22:20:28.577`)
|
||||
* [CVE-2023-7193](CVE-2023/CVE-2023-71xx/CVE-2023-7193.json) (`2024-01-05T22:20:43.460`)
|
||||
* [CVE-2023-51423](CVE-2023/CVE-2023-514xx/CVE-2023-51423.json) (`2024-01-05T22:21:01.370`)
|
||||
* [CVE-2023-51503](CVE-2023/CVE-2023-515xx/CVE-2023-51503.json) (`2024-01-05T22:21:26.020`)
|
||||
* [CVE-2023-47216](CVE-2023/CVE-2023-472xx/CVE-2023-47216.json) (`2024-01-05T22:22:24.657`)
|
||||
* [CVE-2023-4463](CVE-2023/CVE-2023-44xx/CVE-2023-4463.json) (`2024-01-05T22:23:17.760`)
|
||||
* [CVE-2023-7189](CVE-2023/CVE-2023-71xx/CVE-2023-7189.json) (`2024-01-05T22:23:53.007`)
|
||||
* [CVE-2023-7190](CVE-2023/CVE-2023-71xx/CVE-2023-7190.json) (`2024-01-05T22:24:05.917`)
|
||||
* [CVE-2023-7191](CVE-2023/CVE-2023-71xx/CVE-2023-7191.json) (`2024-01-05T22:24:14.347`)
|
||||
* [CVE-2023-7183](CVE-2023/CVE-2023-71xx/CVE-2023-7183.json) (`2024-01-05T22:24:57.750`)
|
||||
* [CVE-2023-7184](CVE-2023/CVE-2023-71xx/CVE-2023-7184.json) (`2024-01-05T22:25:17.277`)
|
||||
* [CVE-2023-7185](CVE-2023/CVE-2023-71xx/CVE-2023-7185.json) (`2024-01-05T22:25:25.280`)
|
||||
* [CVE-2023-7186](CVE-2023/CVE-2023-71xx/CVE-2023-7186.json) (`2024-01-05T22:25:32.113`)
|
||||
* [CVE-2024-0247](CVE-2024/CVE-2024-02xx/CVE-2024-0247.json) (`2024-01-05T22:12:18.497`)
|
||||
* [CVE-2023-50069](CVE-2023/CVE-2023-500xx/CVE-2023-50069.json) (`2024-01-05T23:08:29.450`)
|
||||
* [CVE-2023-50559](CVE-2023/CVE-2023-505xx/CVE-2023-50559.json) (`2024-01-05T23:14:41.273`)
|
||||
* [CVE-2023-51766](CVE-2023/CVE-2023-517xx/CVE-2023-51766.json) (`2024-01-05T23:15:08.963`)
|
||||
* [CVE-2023-41542](CVE-2023/CVE-2023-415xx/CVE-2023-41542.json) (`2024-01-05T23:17:56.740`)
|
||||
* [CVE-2023-41543](CVE-2023/CVE-2023-415xx/CVE-2023-41543.json) (`2024-01-05T23:26:14.287`)
|
||||
* [CVE-2023-51663](CVE-2023/CVE-2023-516xx/CVE-2023-51663.json) (`2024-01-05T23:36:20.463`)
|
||||
* [CVE-2023-4468](CVE-2023/CVE-2023-44xx/CVE-2023-4468.json) (`2024-01-05T23:46:50.800`)
|
||||
* [CVE-2023-49550](CVE-2023/CVE-2023-495xx/CVE-2023-49550.json) (`2024-01-05T23:53:00.187`)
|
||||
* [CVE-2023-49551](CVE-2023/CVE-2023-495xx/CVE-2023-49551.json) (`2024-01-05T23:53:48.113`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user