mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
36 lines
1.1 KiB
JSON
36 lines
1.1 KiB
JSON
{
|
|
"id": "CVE-2023-34127",
|
|
"sourceIdentifier": "PSIRT@sonicwall.com",
|
|
"published": "2023-07-13T01:15:08.893",
|
|
"lastModified": "2023-07-13T08:32:09.673",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SonicWall GMS, SonicWall Analytics enables an authenticated attacker to execute arbitrary code with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"weaknesses": [
|
|
{
|
|
"source": "PSIRT@sonicwall.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-78"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010",
|
|
"source": "PSIRT@sonicwall.com"
|
|
},
|
|
{
|
|
"url": "https://www.sonicwall.com/support/notices/230710150218060",
|
|
"source": "PSIRT@sonicwall.com"
|
|
}
|
|
]
|
|
} |