Skip to content

Commit

Permalink
Show file tree
Hide file tree
Showing 12 changed files with 231 additions and 19 deletions.
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.3.0",
"id": "GHSA-rpj2-w6fr-79hc",
"modified": "2022-08-24T00:00:29Z",
"modified": "2022-12-01T15:30:19Z",
"published": "2022-08-24T00:00:29Z",
"aliases": [
"CVE-2020-35509"
],
"details": "A flaw was found in keycloak affecting versions 11.0.3 and 12.0.0. An expired certificate would be accepted by the direct-grant authenticator because of missing time stamp validations. The highest threat from this vulnerability is to data confidentiality and integrity.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
}
],
"affected": [

Expand All @@ -25,9 +28,9 @@
],
"database_specific": {
"cwe_ids": [

"CWE-295"
],
"severity": null,
"severity": "MODERATE",
"github_reviewed": false
}
}
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.3.0",
"id": "GHSA-3w8w-mhj7-j5rc",
"modified": "2022-11-24T00:30:51Z",
"modified": "2022-12-01T15:30:19Z",
"published": "2022-11-24T00:30:51Z",
"aliases": [
"CVE-2022-45873"
],
"details": "systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"affected": [

Expand All @@ -33,9 +36,9 @@
],
"database_specific": {
"cwe_ids": [

"CWE-400"
],
"severity": null,
"severity": "MODERATE",
"github_reviewed": false
}
}
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.3.0",
"id": "GHSA-9f3q-2p9h-qmq9",
"modified": "2022-11-25T18:30:26Z",
"modified": "2022-12-01T15:30:20Z",
"published": "2022-11-25T18:30:26Z",
"aliases": [
"CVE-2022-38377"
],
"details": "An improper access control vulnerability [CWE-284] in FortiManager 7.2.0, 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.0 through 6.2.9, 6.0.0 through 6.0.11 and FortiAnalyzer 7.2.0, 7.0.0 through 7.0.3, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.0 through 6.0.12 may allow a remote and authenticated admin user assigned to a specific ADOM to access other ADOMs information such as device information and dashboard information.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
}
],
"affected": [

Expand All @@ -27,7 +30,7 @@
"cwe_ids": [

],
"severity": null,
"severity": "LOW",
"github_reviewed": false
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -18,9 +18,33 @@
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45036"
},
{
"type": "WEB",
"url": "https://doc.velneo.com/v/32/velneo-vserver/funcionalidades/protocolo-vatps"
},
{
"type": "WEB",
"url": "https://doc.velneo.com/v/32/velneo/funcionalidades-comunes/conexion-con-velneo-vserver"
},
{
"type": "WEB",
"url": "https://doc.velneo.com/v/32/velneo/notas-de-la-version#a-partir-de-esta-version-todos-los-servidores-arrancaran-con-protocolo-vatps"
},
{
"type": "WEB",
"url": "https://doc.velneo.com/v/32/velneo/notas-de-la-version#mejoras-de-seguridad-en-validacion-de-usuario-y-contrasena"
},
{
"type": "WEB",
"url": "https://velneo.es/mivelneo/listado-de-cambios-velneo-32/"
},
{
"type": "WEB",
"url": "https://www.incibe-cert.es/en/early-warning/security-advisories/velneo-vclient-improper-authentication-0"
},
{
"type": "WEB",
"url": "https://www.velneo.com/blog/disponible-la-nueva-version-velneo-32"
}
],
"database_specific": {
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.3.0",
"id": "GHSA-px5q-x4wp-pg95",
"modified": "2022-11-25T15:30:21Z",
"modified": "2022-12-01T15:30:19Z",
"published": "2022-11-25T15:30:21Z",
"aliases": [
"CVE-2022-38767"
],
"details": "An issue was discovered in Wind River VxWorks 6.9 and 7, that allows a specifically crafted packet sent by a Radius server, may cause Denial of Service during the IP Radius access procedure.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"affected": [

Expand All @@ -31,7 +34,7 @@
"cwe_ids": [

],
"severity": null,
"severity": "HIGH",
"github_reviewed": false
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@
],
"database_specific": {
"cwe_ids": [

"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": false
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.3.0",
"id": "GHSA-qj9h-vqcc-rfjq",
"modified": "2022-11-25T21:30:26Z",
"modified": "2022-12-01T15:30:19Z",
"published": "2022-11-25T21:30:26Z",
"aliases": [
"CVE-2022-41158"
],
"details": "Remote code execution vulnerability can be achieved by using cookie values as paths to a file by this builder program. A remote attacker could exploit the vulnerability to execute or inject malicious code.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"affected": [

Expand All @@ -25,9 +28,9 @@
],
"database_specific": {
"cwe_ids": [

"CWE-94"
],
"severity": null,
"severity": "CRITICAL",
"github_reviewed": false
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
{
"schema_version": "1.3.0",
"id": "GHSA-9rrf-x8wr-qf65",
"modified": "2022-12-01T15:30:19Z",
"published": "2022-12-01T15:30:19Z",
"aliases": [
"CVE-2022-30528"
],
"details": "SQL Injection vulnerability in asith-eranga ISIC tour booking through version published on Feb 13th 2018, allows attackers to execute arbitrary commands via the username parameter to /system/user/modules/mod_users/controller.php.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30528"
},
{
"type": "WEB",
"url": "https://github.com/asith-eranga/isic"
},
{
"type": "WEB",
"url": "https://github.com/killmonday/isic.lk-RCE"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
{
"schema_version": "1.3.0",
"id": "GHSA-g76x-m5qr-8rc7",
"modified": "2022-12-01T15:30:19Z",
"published": "2022-12-01T15:30:19Z",
"aliases": [
"CVE-2022-28607"
],
"details": "An issue was discovered in asith-eranga ISIC tour booking through version published on Feb 13th 2018, allows attackers to gain sensitive information via the action parameter to /system/user/modules/mod_users/controller.php.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28607"
},
{
"type": "WEB",
"url": "https://github.com/killmonday/isic.lk-RCE"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
{
"schema_version": "1.3.0",
"id": "GHSA-jvx4-vmw6-g8xc",
"modified": "2022-12-01T15:30:19Z",
"published": "2022-12-01T15:30:19Z",
"aliases": [
"CVE-2022-4257"
],
"details": "A vulnerability was found in C-DATA Web Management System. It has been rated as critical. This issue affects some unknown processing of the file cgi-bin/jumpto.php of the component GET Parameter Handler. The manipulation of the argument hostname leads to argument injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214631.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4257"
},
{
"type": "WEB",
"url": "https://github.com/siriuswhiter/VulnHub/blob/main/C-Data/rce1.md"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.214631"
}
],
"database_specific": {
"cwe_ids": [
"CWE-74"
],
"severity": null,
"github_reviewed": false
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
{
"schema_version": "1.3.0",
"id": "GHSA-xf35-ghx9-6hhf",
"modified": "2022-12-01T15:30:19Z",
"published": "2022-12-01T15:30:19Z",
"aliases": [
"CVE-2022-37016"
],
"details": "Symantec Endpoint Protection (Windows) agent may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37016"
},
{
"type": "WEB",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/21014"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
{
"schema_version": "1.3.0",
"id": "GHSA-xrrv-gjcc-h93v",
"modified": "2022-12-01T15:30:19Z",
"published": "2022-12-01T15:30:19Z",
"aliases": [
"CVE-2022-37017"
],
"details": "Symantec Endpoint Protection (Windows) agent, prior to 14.3 RU6/14.3 RU5 Patch 1, may be susceptible to a Security Control Bypass vulnerability, which is a type of issue that can potentially allow a threat actor to circumvent existing security controls. This CVE applies narrowly to the Client User Interface Password protection and Policy Import/Export Password protection, if it has been enabled.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37017"
},
{
"type": "WEB",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/21014"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false
}
}

0 comments on commit db3a9ef

Please sign in to comment.