Auto-Update: 2023-11-01T11:00:19.055360+00:00

This commit is contained in:
cad-safe-bot 2023-11-01 11:00:22 +00:00
parent c102a45795
commit e1a6440996
44 changed files with 1213 additions and 10 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48454",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:08.507",
"lastModified": "2023-11-01T10:15:08.507",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48455",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:08.620",
"lastModified": "2023-11-01T10:15:08.620",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48456",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:08.667",
"lastModified": "2023-11-01T10:15:08.667",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In camera driver, there is a possible out of bounds write due to a incorrect bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48457",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:08.717",
"lastModified": "2023-11-01T10:15:08.717",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48458",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:08.767",
"lastModified": "2023-11-01T10:15:08.767",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48459",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:08.817",
"lastModified": "2023-11-01T10:15:08.817",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48460",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:08.867",
"lastModified": "2023-11-01T10:15:08.867",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In setting service, there is a possible undefined behavior due to incorrect error handling. This could lead to local denial of service with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-48461",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:08.917",
"lastModified": "2023-11-01T10:15:08.917",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-1713",
"sourceIdentifier": "info@starlabs.sg",
"published": "2023-11-01T10:15:08.973",
"lastModified": "2023-11-01T10:15:08.973",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Insecure temporary file creation in bitrix/modules/crm/lib/order/import/instagram.php in Bitrix24 22.0.300 hosted on Apache HTTP Server allows remote authenticated attackers to execute arbitrary code via uploading a crafted \".htaccess\" file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://starlabs.sg/advisories/23/23-1713/",
"source": "info@starlabs.sg"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-1714",
"sourceIdentifier": "info@starlabs.sg",
"published": "2023-11-01T10:15:09.050",
"lastModified": "2023-11-01T10:15:09.050",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Unsafe variable extraction in bitrix/modules/main/classes/general/user_options.php in Bitrix24 22.0.300 allows remote authenticated attackers to execute arbitrary code via (1) appending arbitrary content to existing PHP files or (2) PHAR deserialization."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://starlabs.sg/advisories/23/23-1714/",
"source": "info@starlabs.sg"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-1715",
"sourceIdentifier": "info@starlabs.sg",
"published": "2023-11-01T10:15:09.113",
"lastModified": "2023-11-01T10:15:09.113",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nA logic error when using mb_strpos() to check for potential XSS payload in Bitrix24 22.0.300 allows attackers to bypass XSS sanitisation via placing HTML tags at the begining of the payload.\n\n\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://starlabs.sg/advisories/23/23-1715/",
"source": "info@starlabs.sg"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-1716",
"sourceIdentifier": "info@starlabs.sg",
"published": "2023-11-01T10:15:09.183",
"lastModified": "2023-11-01T10:15:09.183",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nCross-site scripting (XSS) vulnerability in Invoice Edit Page in Bitrix24 22.0.300 allows attackers to execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege.\n\n\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://starlabs.sg/advisories/23/23-1716/",
"source": "info@starlabs.sg"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-1717",
"sourceIdentifier": "info@starlabs.sg",
"published": "2023-11-01T10:15:09.243",
"lastModified": "2023-11-01T10:15:09.243",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nPrototype pollution in bitrix/templates/bitrix24/components/bitrix/menu/left_vertical/script.js in Bitrix24 22.0.300 allows remote attackers to execute arbitrary JavaScript code in the victim\u2019s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via polluting `__proto__[tag]` and `__proto__[text]`.\n\n\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
},
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://starlabs.sg/advisories/23/23-1717/",
"source": "info@starlabs.sg"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-1718",
"sourceIdentifier": "info@starlabs.sg",
"published": "2023-11-01T10:15:09.307",
"lastModified": "2023-11-01T10:15:09.307",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nImproper file stream access in /desktop_app/file.ajax.php?action=uploadfile in Bitrix24 22.0.300 allows unauthenticated remote attackers to cause denial-of-service via a crafted \"tmp_url\".\n\n\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"references": [
{
"url": "https://starlabs.sg/advisories/23/23-1718/",
"source": "info@starlabs.sg"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-1719",
"sourceIdentifier": "info@starlabs.sg",
"published": "2023-11-01T10:15:09.373",
"lastModified": "2023-11-01T10:15:09.373",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Global variable extraction in bitrix/modules/main/tools.php in Bitrix24 22.0.300 allows unauthenticated remote attackers to (1) enumerate attachments on the server and (2) execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via overwriting uninitialised variables."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-665"
}
]
}
],
"references": [
{
"url": "https://starlabs.sg/advisories/23/23-1719/",
"source": "info@starlabs.sg"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-1720",
"sourceIdentifier": "info@starlabs.sg",
"published": "2023-11-01T10:15:09.440",
"lastModified": "2023-11-01T10:15:09.440",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Lack of mime type response header in Bitrix24 22.0.300 allows authenticated remote attackers to execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via uploading a crafted HTML file through /desktop_app/file.ajax.php?action=uploadfile."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://starlabs.sg/advisories/23/23-1720/",
"source": "info@starlabs.sg"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-4198",
"sourceIdentifier": "info@starlabs.sg",
"published": "2023-11-01T09:15:09.477",
"lastModified": "2023-11-01T09:15:09.477",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Access Control in Dolibarr ERP CRM <= v17.0.3 allows an unauthorized authenticated user to read a database table containing customer data"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://github.com/Dolibarr/dolibarr/commit/3065b9ca6ade988e8d7a8a8550415c0abb56b9cb#diff-7d68365a708c954051853ade884c7e97c6ff13150ee92657d6ffc8603e0f947b",
"source": "info@starlabs.sg"
},
{
"url": "https://starlabs.sg/advisories/23/23-4198",
"source": "info@starlabs.sg"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42631",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:09.513",
"lastModified": "2023-11-01T10:15:09.513",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42632",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:09.560",
"lastModified": "2023-11-01T10:15:09.560",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42633",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:09.613",
"lastModified": "2023-11-01T10:15:09.613",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42634",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:09.660",
"lastModified": "2023-11-01T10:15:09.660",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42635",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:09.707",
"lastModified": "2023-11-01T10:15:09.707",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42636",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:09.757",
"lastModified": "2023-11-01T10:15:09.757",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42637",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:09.807",
"lastModified": "2023-11-01T10:15:09.807",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42638",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:09.853",
"lastModified": "2023-11-01T10:15:09.853",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42639",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:09.900",
"lastModified": "2023-11-01T10:15:09.900",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42640",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:09.950",
"lastModified": "2023-11-01T10:15:09.950",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42641",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.003",
"lastModified": "2023-11-01T10:15:10.003",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42642",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.050",
"lastModified": "2023-11-01T10:15:10.050",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42643",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.097",
"lastModified": "2023-11-01T10:15:10.097",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42644",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.143",
"lastModified": "2023-11-01T10:15:10.143",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In dm service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42645",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.187",
"lastModified": "2023-11-01T10:15:10.187",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In sim service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42646",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.233",
"lastModified": "2023-11-01T10:15:10.233",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In Ifaa service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42647",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.280",
"lastModified": "2023-11-01T10:15:10.280",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In Ifaa service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42648",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.330",
"lastModified": "2023-11-01T10:15:10.330",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42649",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.380",
"lastModified": "2023-11-01T10:15:10.380",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42650",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.427",
"lastModified": "2023-11-01T10:15:10.427",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42651",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.473",
"lastModified": "2023-11-01T10:15:10.473",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42652",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.517",
"lastModified": "2023-11-01T10:15:10.517",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42653",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.563",
"lastModified": "2023-11-01T10:15:10.563",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In faceid service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42654",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.607",
"lastModified": "2023-11-01T10:15:10.607",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In dm service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42655",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.657",
"lastModified": "2023-11-01T10:15:10.657",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In sim service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42750",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-11-01T10:15:10.700",
"lastModified": "2023-11-01T10:15:10.700",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In gnss service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
}
],
"metrics": {},
"references": [
{
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857",
"source": "security@unisoc.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-01T09:00:18.975257+00:00
2023-11-01T11:00:19.055360+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-01T08:15:07.333000+00:00
2023-11-01T10:15:10.700000+00:00
```
### Last Data Feed Release
@ -29,24 +29,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
229439
229482
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `43`
* [CVE-2023-4197](CVE-2023/CVE-2023-41xx/CVE-2023-4197.json) (`2023-11-01T08:15:07.333`)
* [CVE-2023-42632](CVE-2023/CVE-2023-426xx/CVE-2023-42632.json) (`2023-11-01T10:15:09.560`)
* [CVE-2023-42633](CVE-2023/CVE-2023-426xx/CVE-2023-42633.json) (`2023-11-01T10:15:09.613`)
* [CVE-2023-42634](CVE-2023/CVE-2023-426xx/CVE-2023-42634.json) (`2023-11-01T10:15:09.660`)
* [CVE-2023-42635](CVE-2023/CVE-2023-426xx/CVE-2023-42635.json) (`2023-11-01T10:15:09.707`)
* [CVE-2023-42636](CVE-2023/CVE-2023-426xx/CVE-2023-42636.json) (`2023-11-01T10:15:09.757`)
* [CVE-2023-42637](CVE-2023/CVE-2023-426xx/CVE-2023-42637.json) (`2023-11-01T10:15:09.807`)
* [CVE-2023-42638](CVE-2023/CVE-2023-426xx/CVE-2023-42638.json) (`2023-11-01T10:15:09.853`)
* [CVE-2023-42639](CVE-2023/CVE-2023-426xx/CVE-2023-42639.json) (`2023-11-01T10:15:09.900`)
* [CVE-2023-42640](CVE-2023/CVE-2023-426xx/CVE-2023-42640.json) (`2023-11-01T10:15:09.950`)
* [CVE-2023-42641](CVE-2023/CVE-2023-426xx/CVE-2023-42641.json) (`2023-11-01T10:15:10.003`)
* [CVE-2023-42642](CVE-2023/CVE-2023-426xx/CVE-2023-42642.json) (`2023-11-01T10:15:10.050`)
* [CVE-2023-42643](CVE-2023/CVE-2023-426xx/CVE-2023-42643.json) (`2023-11-01T10:15:10.097`)
* [CVE-2023-42644](CVE-2023/CVE-2023-426xx/CVE-2023-42644.json) (`2023-11-01T10:15:10.143`)
* [CVE-2023-42645](CVE-2023/CVE-2023-426xx/CVE-2023-42645.json) (`2023-11-01T10:15:10.187`)
* [CVE-2023-42646](CVE-2023/CVE-2023-426xx/CVE-2023-42646.json) (`2023-11-01T10:15:10.233`)
* [CVE-2023-42647](CVE-2023/CVE-2023-426xx/CVE-2023-42647.json) (`2023-11-01T10:15:10.280`)
* [CVE-2023-42648](CVE-2023/CVE-2023-426xx/CVE-2023-42648.json) (`2023-11-01T10:15:10.330`)
* [CVE-2023-42649](CVE-2023/CVE-2023-426xx/CVE-2023-42649.json) (`2023-11-01T10:15:10.380`)
* [CVE-2023-42650](CVE-2023/CVE-2023-426xx/CVE-2023-42650.json) (`2023-11-01T10:15:10.427`)
* [CVE-2023-42651](CVE-2023/CVE-2023-426xx/CVE-2023-42651.json) (`2023-11-01T10:15:10.473`)
* [CVE-2023-42652](CVE-2023/CVE-2023-426xx/CVE-2023-42652.json) (`2023-11-01T10:15:10.517`)
* [CVE-2023-42653](CVE-2023/CVE-2023-426xx/CVE-2023-42653.json) (`2023-11-01T10:15:10.563`)
* [CVE-2023-42654](CVE-2023/CVE-2023-426xx/CVE-2023-42654.json) (`2023-11-01T10:15:10.607`)
* [CVE-2023-42655](CVE-2023/CVE-2023-426xx/CVE-2023-42655.json) (`2023-11-01T10:15:10.657`)
* [CVE-2023-42750](CVE-2023/CVE-2023-427xx/CVE-2023-42750.json) (`2023-11-01T10:15:10.700`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `0`
* [CVE-2023-34058](CVE-2023/CVE-2023-340xx/CVE-2023-34058.json) (`2023-11-01T07:15:08.690`)
* [CVE-2023-34059](CVE-2023/CVE-2023-340xx/CVE-2023-34059.json) (`2023-11-01T07:15:08.917`)
* [CVE-2023-44981](CVE-2023/CVE-2023-449xx/CVE-2023-44981.json) (`2023-11-01T07:15:09.027`)
* [CVE-2023-4701](CVE-2023/CVE-2023-47xx/CVE-2023-4701.json) (`2023-11-01T07:15:10.400`)
## Download and Usage