mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 11:07:05 +00:00
Auto-Update: 2023-10-08T06:00:24.384523+00:00
This commit is contained in:
parent
460be409b0
commit
f18707698f
20
CVE-2023/CVE-2023-406xx/CVE-2023-40631.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40631.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40631",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:55.547",
|
||||
"lastModified": "2023-10-08T04:15:55.547",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Dialer, there is a possible missing permission check. This could lead to local information disclosure with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40632.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40632.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40632",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:56.397",
|
||||
"lastModified": "2023-10-08T04:15:56.397",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In jpg driver, there is a possible use after free due to a logic error. This could lead to remote information disclosure no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40633.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40633.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40633",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:56.483",
|
||||
"lastModified": "2023-10-08T04:15:56.483",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In phasecheckserver, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40634.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40634.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40634",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:56.553",
|
||||
"lastModified": "2023-10-08T04:15:56.553",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In phasechecksercer, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40635.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40635.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40635",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:56.630",
|
||||
"lastModified": "2023-10-08T04:15:56.630",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In linkturbo, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40636.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40636.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40636",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:56.700",
|
||||
"lastModified": "2023-10-08T04:15:56.700",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telecom service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40637.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40637.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40637",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:56.773",
|
||||
"lastModified": "2023-10-08T04:15:56.773",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In telecom service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40638.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40638.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40638",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:56.833",
|
||||
"lastModified": "2023-10-08T04:15:56.833",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Telecom service, there is a possible missing permission check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40639.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40639.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40639",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:56.897",
|
||||
"lastModified": "2023-10-08T04:15:56.897",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In SoundRecorder service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40640.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40640.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40640",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:56.957",
|
||||
"lastModified": "2023-10-08T04:15:56.957",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In SoundRecorder service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40641.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40641.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40641",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.027",
|
||||
"lastModified": "2023-10-08T04:15:57.027",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40642.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40642.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40642",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.087",
|
||||
"lastModified": "2023-10-08T04:15:57.087",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40643.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40643.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40643",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.147",
|
||||
"lastModified": "2023-10-08T04:15:57.147",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40644.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40644.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40644",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.207",
|
||||
"lastModified": "2023-10-08T04:15:57.207",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40645.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40645.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40645",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.270",
|
||||
"lastModified": "2023-10-08T04:15:57.270",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40646.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40646.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40646",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.347",
|
||||
"lastModified": "2023-10-08T04:15:57.347",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40647.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40647.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40647",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.423",
|
||||
"lastModified": "2023-10-08T04:15:57.423",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40648.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40648.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40648",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.493",
|
||||
"lastModified": "2023-10-08T04:15:57.493",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40649.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40649.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40649",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.563",
|
||||
"lastModified": "2023-10-08T04:15:57.563",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40650.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40650.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40650",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.627",
|
||||
"lastModified": "2023-10-08T04:15:57.627",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Telecom service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40651.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40651.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40651",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.693",
|
||||
"lastModified": "2023-10-08T04:15:57.693",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In urild service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40652.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40652.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40652",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.770",
|
||||
"lastModified": "2023-10-08T04:15:57.770",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In jpg driver, there is a possible out of bounds write due to improper input validation. This could lead to local denial of service with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40653.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40653.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40653",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.827",
|
||||
"lastModified": "2023-10-08T04:15:57.827",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In FW-PackageManager, there is a possible missing permission check. This could lead to local escalation of privilege with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-406xx/CVE-2023-40654.json
Normal file
20
CVE-2023/CVE-2023-406xx/CVE-2023-40654.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-40654",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.893",
|
||||
"lastModified": "2023-10-08T04:15:57.893",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In FW-PackageManager, there is a possible missing permission check. This could lead to local escalation of privilege with System execution privileges needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074",
|
||||
"source": "security@unisoc.com"
|
||||
}
|
||||
]
|
||||
}
|
61
README.md
61
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-10-07T22:00:24.986180+00:00
|
||||
2023-10-08T06:00:24.384523+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-10-07T21:15:16.767000+00:00
|
||||
2023-10-08T04:15:57.893000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -23,50 +23,49 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2023-10-07T00:00:13.585919+00:00
|
||||
2023-10-08T00:00:13.568515+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
227157
|
||||
227181
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `24`
|
||||
|
||||
* [CVE-2023-40631](CVE-2023/CVE-2023-406xx/CVE-2023-40631.json) (`2023-10-08T04:15:55.547`)
|
||||
* [CVE-2023-40632](CVE-2023/CVE-2023-406xx/CVE-2023-40632.json) (`2023-10-08T04:15:56.397`)
|
||||
* [CVE-2023-40633](CVE-2023/CVE-2023-406xx/CVE-2023-40633.json) (`2023-10-08T04:15:56.483`)
|
||||
* [CVE-2023-40634](CVE-2023/CVE-2023-406xx/CVE-2023-40634.json) (`2023-10-08T04:15:56.553`)
|
||||
* [CVE-2023-40635](CVE-2023/CVE-2023-406xx/CVE-2023-40635.json) (`2023-10-08T04:15:56.630`)
|
||||
* [CVE-2023-40636](CVE-2023/CVE-2023-406xx/CVE-2023-40636.json) (`2023-10-08T04:15:56.700`)
|
||||
* [CVE-2023-40637](CVE-2023/CVE-2023-406xx/CVE-2023-40637.json) (`2023-10-08T04:15:56.773`)
|
||||
* [CVE-2023-40638](CVE-2023/CVE-2023-406xx/CVE-2023-40638.json) (`2023-10-08T04:15:56.833`)
|
||||
* [CVE-2023-40639](CVE-2023/CVE-2023-406xx/CVE-2023-40639.json) (`2023-10-08T04:15:56.897`)
|
||||
* [CVE-2023-40640](CVE-2023/CVE-2023-406xx/CVE-2023-40640.json) (`2023-10-08T04:15:56.957`)
|
||||
* [CVE-2023-40641](CVE-2023/CVE-2023-406xx/CVE-2023-40641.json) (`2023-10-08T04:15:57.027`)
|
||||
* [CVE-2023-40642](CVE-2023/CVE-2023-406xx/CVE-2023-40642.json) (`2023-10-08T04:15:57.087`)
|
||||
* [CVE-2023-40643](CVE-2023/CVE-2023-406xx/CVE-2023-40643.json) (`2023-10-08T04:15:57.147`)
|
||||
* [CVE-2023-40644](CVE-2023/CVE-2023-406xx/CVE-2023-40644.json) (`2023-10-08T04:15:57.207`)
|
||||
* [CVE-2023-40645](CVE-2023/CVE-2023-406xx/CVE-2023-40645.json) (`2023-10-08T04:15:57.270`)
|
||||
* [CVE-2023-40646](CVE-2023/CVE-2023-406xx/CVE-2023-40646.json) (`2023-10-08T04:15:57.347`)
|
||||
* [CVE-2023-40647](CVE-2023/CVE-2023-406xx/CVE-2023-40647.json) (`2023-10-08T04:15:57.423`)
|
||||
* [CVE-2023-40648](CVE-2023/CVE-2023-406xx/CVE-2023-40648.json) (`2023-10-08T04:15:57.493`)
|
||||
* [CVE-2023-40649](CVE-2023/CVE-2023-406xx/CVE-2023-40649.json) (`2023-10-08T04:15:57.563`)
|
||||
* [CVE-2023-40650](CVE-2023/CVE-2023-406xx/CVE-2023-40650.json) (`2023-10-08T04:15:57.627`)
|
||||
* [CVE-2023-40651](CVE-2023/CVE-2023-406xx/CVE-2023-40651.json) (`2023-10-08T04:15:57.693`)
|
||||
* [CVE-2023-40652](CVE-2023/CVE-2023-406xx/CVE-2023-40652.json) (`2023-10-08T04:15:57.770`)
|
||||
* [CVE-2023-40653](CVE-2023/CVE-2023-406xx/CVE-2023-40653.json) (`2023-10-08T04:15:57.827`)
|
||||
* [CVE-2023-40654](CVE-2023/CVE-2023-406xx/CVE-2023-40654.json) (`2023-10-08T04:15:57.893`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `47`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2020-11096](CVE-2020/CVE-2020-110xx/CVE-2020-11096.json) (`2023-10-07T21:15:13.937`)
|
||||
* [CVE-2020-11097](CVE-2020/CVE-2020-110xx/CVE-2020-11097.json) (`2023-10-07T21:15:14.067`)
|
||||
* [CVE-2020-11098](CVE-2020/CVE-2020-110xx/CVE-2020-11098.json) (`2023-10-07T21:15:14.173`)
|
||||
* [CVE-2020-11099](CVE-2020/CVE-2020-110xx/CVE-2020-11099.json) (`2023-10-07T21:15:14.277`)
|
||||
* [CVE-2020-13396](CVE-2020/CVE-2020-133xx/CVE-2020-13396.json) (`2023-10-07T21:15:14.397`)
|
||||
* [CVE-2020-13397](CVE-2020/CVE-2020-133xx/CVE-2020-13397.json) (`2023-10-07T21:15:14.513`)
|
||||
* [CVE-2020-13398](CVE-2020/CVE-2020-133xx/CVE-2020-13398.json) (`2023-10-07T21:15:14.607`)
|
||||
* [CVE-2020-15103](CVE-2020/CVE-2020-151xx/CVE-2020-15103.json) (`2023-10-07T21:15:14.697`)
|
||||
* [CVE-2020-4030](CVE-2020/CVE-2020-40xx/CVE-2020-4030.json) (`2023-10-07T21:15:14.837`)
|
||||
* [CVE-2020-4031](CVE-2020/CVE-2020-40xx/CVE-2020-4031.json) (`2023-10-07T21:15:14.957`)
|
||||
* [CVE-2020-4032](CVE-2020/CVE-2020-40xx/CVE-2020-4032.json) (`2023-10-07T21:15:15.087`)
|
||||
* [CVE-2020-4033](CVE-2020/CVE-2020-40xx/CVE-2020-4033.json) (`2023-10-07T21:15:15.193`)
|
||||
* [CVE-2023-39350](CVE-2023/CVE-2023-393xx/CVE-2023-39350.json) (`2023-10-07T21:15:15.343`)
|
||||
* [CVE-2023-39351](CVE-2023/CVE-2023-393xx/CVE-2023-39351.json) (`2023-10-07T21:15:15.470`)
|
||||
* [CVE-2023-39352](CVE-2023/CVE-2023-393xx/CVE-2023-39352.json) (`2023-10-07T21:15:15.583`)
|
||||
* [CVE-2023-39353](CVE-2023/CVE-2023-393xx/CVE-2023-39353.json) (`2023-10-07T21:15:15.703`)
|
||||
* [CVE-2023-39354](CVE-2023/CVE-2023-393xx/CVE-2023-39354.json) (`2023-10-07T21:15:15.820`)
|
||||
* [CVE-2023-39355](CVE-2023/CVE-2023-393xx/CVE-2023-39355.json) (`2023-10-07T21:15:15.933`)
|
||||
* [CVE-2023-39356](CVE-2023/CVE-2023-393xx/CVE-2023-39356.json) (`2023-10-07T21:15:16.030`)
|
||||
* [CVE-2023-40181](CVE-2023/CVE-2023-401xx/CVE-2023-40181.json) (`2023-10-07T21:15:16.153`)
|
||||
* [CVE-2023-40186](CVE-2023/CVE-2023-401xx/CVE-2023-40186.json) (`2023-10-07T21:15:16.273`)
|
||||
* [CVE-2023-40188](CVE-2023/CVE-2023-401xx/CVE-2023-40188.json) (`2023-10-07T21:15:16.400`)
|
||||
* [CVE-2023-40567](CVE-2023/CVE-2023-405xx/CVE-2023-40567.json) (`2023-10-07T21:15:16.537`)
|
||||
* [CVE-2023-40569](CVE-2023/CVE-2023-405xx/CVE-2023-40569.json) (`2023-10-07T21:15:16.657`)
|
||||
* [CVE-2023-40589](CVE-2023/CVE-2023-405xx/CVE-2023-40589.json) (`2023-10-07T21:15:16.767`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user