mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2023-11-01T11:00:19.055360+00:00
This commit is contained in:
parent
c102a45795
commit
e1a6440996
20
CVE-2022/CVE-2022-484xx/CVE-2022-48454.json
Normal file
20
CVE-2022/CVE-2022-484xx/CVE-2022-48454.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48454",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:08.507",
|
||||
"lastModified": "2023-11-01T10:15:08.507",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-484xx/CVE-2022-48455.json
Normal file
20
CVE-2022/CVE-2022-484xx/CVE-2022-48455.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48455",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:08.620",
|
||||
"lastModified": "2023-11-01T10:15:08.620",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-484xx/CVE-2022-48456.json
Normal file
20
CVE-2022/CVE-2022-484xx/CVE-2022-48456.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48456",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:08.667",
|
||||
"lastModified": "2023-11-01T10:15:08.667",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In camera driver, there is a possible out of bounds write due to a incorrect bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-484xx/CVE-2022-48457.json
Normal file
20
CVE-2022/CVE-2022-484xx/CVE-2022-48457.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48457",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:08.717",
|
||||
"lastModified": "2023-11-01T10:15:08.717",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-484xx/CVE-2022-48458.json
Normal file
20
CVE-2022/CVE-2022-484xx/CVE-2022-48458.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48458",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:08.767",
|
||||
"lastModified": "2023-11-01T10:15:08.767",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-484xx/CVE-2022-48459.json
Normal file
20
CVE-2022/CVE-2022-484xx/CVE-2022-48459.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48459",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:08.817",
|
||||
"lastModified": "2023-11-01T10:15:08.817",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-484xx/CVE-2022-48460.json
Normal file
20
CVE-2022/CVE-2022-484xx/CVE-2022-48460.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48460",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:08.867",
|
||||
"lastModified": "2023-11-01T10:15:08.867",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In setting service, there is a possible undefined behavior due to incorrect error handling. This could lead to local denial of service with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-484xx/CVE-2022-48461.json
Normal file
20
CVE-2022/CVE-2022-484xx/CVE-2022-48461.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-48461",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:08.917",
|
||||
"lastModified": "2023-11-01T10:15:08.917",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-17xx/CVE-2023-1713.json
Normal file
55
CVE-2023/CVE-2023-17xx/CVE-2023-1713.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-1713",
|
||||
"sourceIdentifier": "info@starlabs.sg",
|
||||
"published": "2023-11-01T10:15:08.973",
|
||||
"lastModified": "2023-11-01T10:15:08.973",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure temporary file creation in bitrix/modules/crm/lib/order/import/instagram.php in Bitrix24 22.0.300 hosted on Apache HTTP Server allows remote authenticated attackers to execute arbitrary code via uploading a crafted \".htaccess\" file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://starlabs.sg/advisories/23/23-1713/",
|
||||
"source": "info@starlabs.sg"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-17xx/CVE-2023-1714.json
Normal file
55
CVE-2023/CVE-2023-17xx/CVE-2023-1714.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-1714",
|
||||
"sourceIdentifier": "info@starlabs.sg",
|
||||
"published": "2023-11-01T10:15:09.050",
|
||||
"lastModified": "2023-11-01T10:15:09.050",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unsafe variable extraction in bitrix/modules/main/classes/general/user_options.php in Bitrix24 22.0.300 allows remote authenticated attackers to execute arbitrary code via (1) appending arbitrary content to existing PHP files or (2) PHAR deserialization."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://starlabs.sg/advisories/23/23-1714/",
|
||||
"source": "info@starlabs.sg"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-17xx/CVE-2023-1715.json
Normal file
55
CVE-2023/CVE-2023-17xx/CVE-2023-1715.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-1715",
|
||||
"sourceIdentifier": "info@starlabs.sg",
|
||||
"published": "2023-11-01T10:15:09.113",
|
||||
"lastModified": "2023-11-01T10:15:09.113",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nA logic error when using mb_strpos() to check for potential XSS payload in Bitrix24 22.0.300 allows attackers to bypass XSS sanitisation via placing HTML tags at the begining of the payload.\n\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://starlabs.sg/advisories/23/23-1715/",
|
||||
"source": "info@starlabs.sg"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-17xx/CVE-2023-1716.json
Normal file
55
CVE-2023/CVE-2023-17xx/CVE-2023-1716.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-1716",
|
||||
"sourceIdentifier": "info@starlabs.sg",
|
||||
"published": "2023-11-01T10:15:09.183",
|
||||
"lastModified": "2023-11-01T10:15:09.183",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nCross-site scripting (XSS) vulnerability in Invoice Edit Page in Bitrix24 22.0.300 allows attackers to execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege.\n\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://starlabs.sg/advisories/23/23-1716/",
|
||||
"source": "info@starlabs.sg"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-17xx/CVE-2023-1717.json
Normal file
59
CVE-2023/CVE-2023-17xx/CVE-2023-1717.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-1717",
|
||||
"sourceIdentifier": "info@starlabs.sg",
|
||||
"published": "2023-11-01T10:15:09.243",
|
||||
"lastModified": "2023-11-01T10:15:09.243",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nPrototype pollution in bitrix/templates/bitrix24/components/bitrix/menu/left_vertical/script.js in Bitrix24 22.0.300 allows remote attackers to execute arbitrary JavaScript code in the victim\u2019s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via polluting `__proto__[tag]` and `__proto__[text]`.\n\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1321"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://starlabs.sg/advisories/23/23-1717/",
|
||||
"source": "info@starlabs.sg"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-17xx/CVE-2023-1718.json
Normal file
55
CVE-2023/CVE-2023-17xx/CVE-2023-1718.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-1718",
|
||||
"sourceIdentifier": "info@starlabs.sg",
|
||||
"published": "2023-11-01T10:15:09.307",
|
||||
"lastModified": "2023-11-01T10:15:09.307",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nImproper file stream access in /desktop_app/file.ajax.php?action=uploadfile in Bitrix24 22.0.300 allows unauthenticated remote attackers to cause denial-of-service via a crafted \"tmp_url\".\n\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://starlabs.sg/advisories/23/23-1718/",
|
||||
"source": "info@starlabs.sg"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-17xx/CVE-2023-1719.json
Normal file
55
CVE-2023/CVE-2023-17xx/CVE-2023-1719.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-1719",
|
||||
"sourceIdentifier": "info@starlabs.sg",
|
||||
"published": "2023-11-01T10:15:09.373",
|
||||
"lastModified": "2023-11-01T10:15:09.373",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Global variable extraction in bitrix/modules/main/tools.php in Bitrix24 22.0.300 allows unauthenticated remote attackers to (1) enumerate attachments on the server and (2) execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via overwriting uninitialised variables."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-665"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://starlabs.sg/advisories/23/23-1719/",
|
||||
"source": "info@starlabs.sg"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-17xx/CVE-2023-1720.json
Normal file
55
CVE-2023/CVE-2023-17xx/CVE-2023-1720.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-1720",
|
||||
"sourceIdentifier": "info@starlabs.sg",
|
||||
"published": "2023-11-01T10:15:09.440",
|
||||
"lastModified": "2023-11-01T10:15:09.440",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Lack of mime type response header in Bitrix24 22.0.300 allows authenticated remote attackers to execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via uploading a crafted HTML file through /desktop_app/file.ajax.php?action=uploadfile."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://starlabs.sg/advisories/23/23-1720/",
|
||||
"source": "info@starlabs.sg"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-41xx/CVE-2023-4198.json
Normal file
59
CVE-2023/CVE-2023-41xx/CVE-2023-4198.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-4198",
|
||||
"sourceIdentifier": "info@starlabs.sg",
|
||||
"published": "2023-11-01T09:15:09.477",
|
||||
"lastModified": "2023-11-01T09:15:09.477",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Access Control in Dolibarr ERP CRM <= v17.0.3 allows an unauthorized authenticated user to read a database table containing customer data"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@starlabs.sg",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Dolibarr/dolibarr/commit/3065b9ca6ade988e8d7a8a8550415c0abb56b9cb#diff-7d68365a708c954051853ade884c7e97c6ff13150ee92657d6ffc8603e0f947b",
|
||||
"source": "info@starlabs.sg"
|
||||
},
|
||||
{
|
||||
"url": "https://starlabs.sg/advisories/23/23-4198",
|
||||
"source": "info@starlabs.sg"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42631.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42631.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42631",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:09.513",
|
||||
"lastModified": "2023-11-01T10:15:09.513",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42632.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42632.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42632",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:09.560",
|
||||
"lastModified": "2023-11-01T10:15:09.560",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42633.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42633.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42633",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:09.613",
|
||||
"lastModified": "2023-11-01T10:15:09.613",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42634.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42634.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42634",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:09.660",
|
||||
"lastModified": "2023-11-01T10:15:09.660",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42635.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42635.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42635",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:09.707",
|
||||
"lastModified": "2023-11-01T10:15:09.707",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42636.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42636.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42636",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:09.757",
|
||||
"lastModified": "2023-11-01T10:15:09.757",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42637.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42637.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42637",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:09.807",
|
||||
"lastModified": "2023-11-01T10:15:09.807",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42638.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42638.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42638",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:09.853",
|
||||
"lastModified": "2023-11-01T10:15:09.853",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42639.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42639.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42639",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:09.900",
|
||||
"lastModified": "2023-11-01T10:15:09.900",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42640.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42640.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42640",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:09.950",
|
||||
"lastModified": "2023-11-01T10:15:09.950",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42641.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42641.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42641",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.003",
|
||||
"lastModified": "2023-11-01T10:15:10.003",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42642.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42642.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42642",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.050",
|
||||
"lastModified": "2023-11-01T10:15:10.050",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42643.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42643.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42643",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.097",
|
||||
"lastModified": "2023-11-01T10:15:10.097",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42644.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42644.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42644",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.143",
|
||||
"lastModified": "2023-11-01T10:15:10.143",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In dm service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42645.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42645.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42645",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.187",
|
||||
"lastModified": "2023-11-01T10:15:10.187",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In sim service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42646.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42646.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42646",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.233",
|
||||
"lastModified": "2023-11-01T10:15:10.233",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Ifaa service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42647.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42647.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42647",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.280",
|
||||
"lastModified": "2023-11-01T10:15:10.280",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Ifaa service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42648.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42648.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42648",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.330",
|
||||
"lastModified": "2023-11-01T10:15:10.330",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42649.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42649.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42649",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.380",
|
||||
"lastModified": "2023-11-01T10:15:10.380",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42650.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42650.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42650",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.427",
|
||||
"lastModified": "2023-11-01T10:15:10.427",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42651.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42651.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42651",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.473",
|
||||
"lastModified": "2023-11-01T10:15:10.473",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42652.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42652.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42652",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.517",
|
||||
"lastModified": "2023-11-01T10:15:10.517",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42653.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42653.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42653",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.563",
|
||||
"lastModified": "2023-11-01T10:15:10.563",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In faceid service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42654.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42654.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42654",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.607",
|
||||
"lastModified": "2023-11-01T10:15:10.607",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In dm service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-426xx/CVE-2023-42655.json
Normal file
20
CVE-2023/CVE-2023-426xx/CVE-2023-42655.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42655",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.657",
|
||||
"lastModified": "2023-11-01T10:15:10.657",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In sim service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-427xx/CVE-2023-42750.json
Normal file
20
CVE-2023/CVE-2023-427xx/CVE-2023-42750.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-42750",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-11-01T10:15:10.700",
|
||||
"lastModified": "2023-11-01T10:15:10.700",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gnss service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
40
README.md
40
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-11-01T09:00:18.975257+00:00
|
||||
2023-11-01T11:00:19.055360+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-11-01T08:15:07.333000+00:00
|
||||
2023-11-01T10:15:10.700000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,24 +29,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
229439
|
||||
229482
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `43`
|
||||
|
||||
* [CVE-2023-4197](CVE-2023/CVE-2023-41xx/CVE-2023-4197.json) (`2023-11-01T08:15:07.333`)
|
||||
* [CVE-2023-42632](CVE-2023/CVE-2023-426xx/CVE-2023-42632.json) (`2023-11-01T10:15:09.560`)
|
||||
* [CVE-2023-42633](CVE-2023/CVE-2023-426xx/CVE-2023-42633.json) (`2023-11-01T10:15:09.613`)
|
||||
* [CVE-2023-42634](CVE-2023/CVE-2023-426xx/CVE-2023-42634.json) (`2023-11-01T10:15:09.660`)
|
||||
* [CVE-2023-42635](CVE-2023/CVE-2023-426xx/CVE-2023-42635.json) (`2023-11-01T10:15:09.707`)
|
||||
* [CVE-2023-42636](CVE-2023/CVE-2023-426xx/CVE-2023-42636.json) (`2023-11-01T10:15:09.757`)
|
||||
* [CVE-2023-42637](CVE-2023/CVE-2023-426xx/CVE-2023-42637.json) (`2023-11-01T10:15:09.807`)
|
||||
* [CVE-2023-42638](CVE-2023/CVE-2023-426xx/CVE-2023-42638.json) (`2023-11-01T10:15:09.853`)
|
||||
* [CVE-2023-42639](CVE-2023/CVE-2023-426xx/CVE-2023-42639.json) (`2023-11-01T10:15:09.900`)
|
||||
* [CVE-2023-42640](CVE-2023/CVE-2023-426xx/CVE-2023-42640.json) (`2023-11-01T10:15:09.950`)
|
||||
* [CVE-2023-42641](CVE-2023/CVE-2023-426xx/CVE-2023-42641.json) (`2023-11-01T10:15:10.003`)
|
||||
* [CVE-2023-42642](CVE-2023/CVE-2023-426xx/CVE-2023-42642.json) (`2023-11-01T10:15:10.050`)
|
||||
* [CVE-2023-42643](CVE-2023/CVE-2023-426xx/CVE-2023-42643.json) (`2023-11-01T10:15:10.097`)
|
||||
* [CVE-2023-42644](CVE-2023/CVE-2023-426xx/CVE-2023-42644.json) (`2023-11-01T10:15:10.143`)
|
||||
* [CVE-2023-42645](CVE-2023/CVE-2023-426xx/CVE-2023-42645.json) (`2023-11-01T10:15:10.187`)
|
||||
* [CVE-2023-42646](CVE-2023/CVE-2023-426xx/CVE-2023-42646.json) (`2023-11-01T10:15:10.233`)
|
||||
* [CVE-2023-42647](CVE-2023/CVE-2023-426xx/CVE-2023-42647.json) (`2023-11-01T10:15:10.280`)
|
||||
* [CVE-2023-42648](CVE-2023/CVE-2023-426xx/CVE-2023-42648.json) (`2023-11-01T10:15:10.330`)
|
||||
* [CVE-2023-42649](CVE-2023/CVE-2023-426xx/CVE-2023-42649.json) (`2023-11-01T10:15:10.380`)
|
||||
* [CVE-2023-42650](CVE-2023/CVE-2023-426xx/CVE-2023-42650.json) (`2023-11-01T10:15:10.427`)
|
||||
* [CVE-2023-42651](CVE-2023/CVE-2023-426xx/CVE-2023-42651.json) (`2023-11-01T10:15:10.473`)
|
||||
* [CVE-2023-42652](CVE-2023/CVE-2023-426xx/CVE-2023-42652.json) (`2023-11-01T10:15:10.517`)
|
||||
* [CVE-2023-42653](CVE-2023/CVE-2023-426xx/CVE-2023-42653.json) (`2023-11-01T10:15:10.563`)
|
||||
* [CVE-2023-42654](CVE-2023/CVE-2023-426xx/CVE-2023-42654.json) (`2023-11-01T10:15:10.607`)
|
||||
* [CVE-2023-42655](CVE-2023/CVE-2023-426xx/CVE-2023-42655.json) (`2023-11-01T10:15:10.657`)
|
||||
* [CVE-2023-42750](CVE-2023/CVE-2023-427xx/CVE-2023-42750.json) (`2023-11-01T10:15:10.700`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2023-34058](CVE-2023/CVE-2023-340xx/CVE-2023-34058.json) (`2023-11-01T07:15:08.690`)
|
||||
* [CVE-2023-34059](CVE-2023/CVE-2023-340xx/CVE-2023-34059.json) (`2023-11-01T07:15:08.917`)
|
||||
* [CVE-2023-44981](CVE-2023/CVE-2023-449xx/CVE-2023-44981.json) (`2023-11-01T07:15:09.027`)
|
||||
* [CVE-2023-4701](CVE-2023/CVE-2023-47xx/CVE-2023-4701.json) (`2023-11-01T07:15:10.400`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user