Skip to content

Commit

Permalink
Advisory Database Sync
Browse files Browse the repository at this point in the history
  • Loading branch information
advisory-database[bot] committed Jul 29, 2024
1 parent 142ec73 commit 17f4972
Show file tree
Hide file tree
Showing 38 changed files with 1,150 additions and 10 deletions.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-4xx3-xg55-3wr5",
"modified": "2023-08-08T15:31:24Z",
"modified": "2024-07-29T21:30:51Z",
"published": "2021-11-24T00:00:27Z",
"aliases": [
"CVE-2021-38003"
Expand Down Expand Up @@ -29,6 +29,10 @@
"type": "WEB",
"url": "https://crbug.com/1263462"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744"
Expand All @@ -40,6 +44,7 @@
],
"database_specific": {
"cwe_ids": [
"CWE-755",
"CWE-787"
],
"severity": "HIGH",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,8 @@
],
"database_specific": {
"cwe_ids": [
"CWE-20"
"CWE-20",
"CWE-601"
],
"severity": "MODERATE",
"github_reviewed": false,
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-gmxf-qj4v-rf52",
"modified": "2022-08-16T00:00:43Z",
"modified": "2024-07-29T21:30:51Z",
"published": "2022-05-24T19:05:33Z",
"aliases": [
"CVE-2021-30551"
Expand Down Expand Up @@ -29,6 +29,14 @@
"type": "WEB",
"url": "https://crbug.com/1216437"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43"
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"schema_version": "1.4.0",
"id": "GHSA-2rmc-r8fj-3p89",
"modified": "2024-07-29T21:30:54Z",
"published": "2024-07-29T21:30:54Z",
"aliases": [
"CVE-2024-6620"
],
"details": "Honeywell PC42t, PC42tp, and PC42d Printers, T10.19.020016 to T10.20.060398, contain a cross-site scripting vulnerability. A(n) attacker could potentially inject malicious code which may lead to information disclosure, session theft, or client-side request forgery. Honeywell recommends updating to the most recent version of this firmware, PC42 Printer Firmware Version 20.6 T10.20.060398.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6620"
},
{
"type": "WEB",
"url": "https://sps.honeywell.com/us/en/support/productivity/cyber-security-notifications"
}
],
"database_specific": {
"cwe_ids": [
"CWE-602"
],
"severity": "LOW",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-29T20:15:03Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
{
"schema_version": "1.4.0",
"id": "GHSA-2vvq-mgpq-88xw",
"modified": "2024-07-29T21:30:54Z",
"published": "2024-07-29T21:30:53Z",
"aliases": [
"CVE-2019-19761"
],
"details": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19761"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-29T20:15:03Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"schema_version": "1.4.0",
"id": "GHSA-3394-cqqj-2g45",
"modified": "2024-07-29T21:30:54Z",
"published": "2024-07-29T21:30:54Z",
"aliases": [
"CVE-2023-42918"
],
"details": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. A sandboxed process may be able to circumvent sandbox restrictions.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42918"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213940"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-29T21:15:11Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
{
"schema_version": "1.4.0",
"id": "GHSA-3c78-wrg5-fqxr",
"modified": "2024-07-29T21:30:54Z",
"published": "2024-07-29T21:30:54Z",
"aliases": [
"CVE-2023-40396"
],
"details": "The issue was addressed with improved memory handling. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14, watchOS 10, tvOS 17. An app may be able to execute arbitrary code with kernel privileges.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40396"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213936"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213937"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213938"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213940"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-29T21:15:11Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
{
"schema_version": "1.4.0",
"id": "GHSA-52gh-pmq6-vv84",
"modified": "2024-07-29T21:30:52Z",
"published": "2024-07-29T21:30:52Z",
"aliases": [
"CVE-2024-37856"
],
"details": "Cross Site Scripting vulnerability in Lost and Found Information System 1.0 allows a remote attacker to escalate privileges via the first, last, middle name fields in the User Profile page.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37856"
},
{
"type": "WEB",
"url": "https://packetstormsecurity.com/files/179078/Lost-And-Found-Information-System-1.0-Cross-Site-Scripting.html"
},
{
"type": "WEB",
"url": "https://www.sourcecodester.com"
},
{
"type": "WEB",
"url": "http://lost.com"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-29T19:15:12Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
{
"schema_version": "1.4.0",
"id": "GHSA-5488-c7c3-vx9f",
"modified": "2024-07-29T21:30:55Z",
"published": "2024-07-29T21:30:55Z",
"aliases": [
"CVE-2023-42957"
],
"details": "A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14, watchOS 10. An app may be able to read sensitive location information.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42957"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213937"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213938"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213940"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-29T21:15:11Z"
}
}
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.4.0",
"id": "GHSA-5wrg-9r62-c97f",
"modified": "2024-07-24T06:31:10Z",
"modified": "2024-07-29T21:30:52Z",
"published": "2024-07-24T06:31:10Z",
"aliases": [
"CVE-2024-6094"
],
"details": "The WP ULike WordPress plugin before 4.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N"
}
],
"affected": [

Expand All @@ -25,9 +28,9 @@
],
"database_specific": {
"cwe_ids": [

"CWE-79"
],
"severity": null,
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-24T06:15:01Z"
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"schema_version": "1.4.0",
"id": "GHSA-636v-w45r-96qj",
"modified": "2024-07-29T21:30:52Z",
"published": "2024-07-29T21:30:52Z",
"aliases": [
"CVE-2024-28806"
],
"details": "An issue was discovered in Italtel i-MCS NFV 12.1.0-20211215. Remote unauthenticated attackers can upload files at an arbitrary path.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28806"
},
{
"type": "WEB",
"url": "https://www.gruppotim.it/it/footer/red-team.html"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-29T19:15:12Z"
}
}
Loading

0 comments on commit 17f4972

Please sign in to comment.