Skip to content

Commit

Permalink
Show file tree
Hide file tree
Showing 22 changed files with 357 additions and 36 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,10 @@
"type": "WEB",
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2023/dsa-5506"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2023-41/"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.4.0",
"id": "GHSA-32vq-v62x-64mm",
"modified": "2023-09-28T15:30:17Z",
"modified": "2023-09-29T06:30:28Z",
"published": "2023-09-28T15:30:17Z",
"aliases": [
"CVE-2023-43860"
],
"details": "D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanNonLogin function.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"affected": [

Expand All @@ -29,7 +32,7 @@
],
"database_specific": {
"cwe_ids": [

"CWE-787"
],
"severity": null,
"github_reviewed": false,
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.4.0",
"id": "GHSA-46r2-w44r-8qr8",
"modified": "2023-09-28T15:30:17Z",
"modified": "2023-09-29T06:30:28Z",
"published": "2023-09-28T15:30:17Z",
"aliases": [
"CVE-2023-43862"
],
"details": "D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formLanguageChange function.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"affected": [

Expand All @@ -29,7 +32,7 @@
],
"database_specific": {
"cwe_ids": [

"CWE-787"
],
"severity": null,
"github_reviewed": false,
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.4.0",
"id": "GHSA-4w89-86x6-qgv9",
"modified": "2023-09-27T15:30:36Z",
"modified": "2023-09-29T06:30:28Z",
"published": "2023-09-27T15:30:36Z",
"aliases": [
"CVE-2023-40441"
],
"details": "A resource exhaustion issue was addressed with improved input validation. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to a denial-of-service.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
}
],
"affected": [

Expand All @@ -29,7 +32,7 @@
],
"database_specific": {
"cwe_ids": [

"CWE-400"
],
"severity": null,
"github_reviewed": false,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,10 @@
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846685"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2023/dsa-5506"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2023-41/"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.4.0",
"id": "GHSA-6x3p-j7vv-4vc2",
"modified": "2023-09-28T15:30:17Z",
"modified": "2023-09-29T06:30:28Z",
"published": "2023-09-28T15:30:17Z",
"aliases": [
"CVE-2023-43867"
],
"details": "D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanL2TP function.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"affected": [

Expand All @@ -29,7 +32,7 @@
],
"database_specific": {
"cwe_ids": [

"CWE-787"
],
"severity": null,
"github_reviewed": false,
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
{
"schema_version": "1.4.0",
"id": "GHSA-7wwm-57j8-wx2j",
"modified": "2023-09-29T06:30:29Z",
"published": "2023-09-29T06:30:29Z",
"aliases": [
"CVE-2023-44466"
],
"details": "An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "WEB",
"url": "https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44466"
},
{
"type": "WEB",
"url": "https://github.com/torvalds/linux/commit/a282a2f10539dce2aa619e71e1817570d557fc97"
},
{
"type": "WEB",
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a282a2f10539dce2aa619e71e1817570d557fc97"
},
{
"type": "WEB",
"url": "https://www.spinics.net/lists/ceph-devel/msg57909.html"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.4.0",
"id": "GHSA-82mc-rg5w-c9rj",
"modified": "2023-09-28T15:30:17Z",
"modified": "2023-09-29T06:30:28Z",
"published": "2023-09-28T15:30:17Z",
"aliases": [
"CVE-2023-43868"
],
"details": "D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via websGetVar function.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"affected": [

Expand All @@ -29,7 +32,7 @@
],
"database_specific": {
"cwe_ids": [

"CWE-787"
],
"severity": null,
"github_reviewed": false,
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.4.0",
"id": "GHSA-8v5f-8948-9qm6",
"modified": "2023-09-28T15:30:17Z",
"modified": "2023-09-29T06:30:28Z",
"published": "2023-09-28T15:30:17Z",
"aliases": [
"CVE-2023-43866"
],
"details": "D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard7 function.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"affected": [

Expand All @@ -29,7 +32,7 @@
],
"database_specific": {
"cwe_ids": [

"CWE-787"
],
"severity": null,
"github_reviewed": false,
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
{
"schema_version": "1.4.0",
"id": "GHSA-9jvx-p6mq-fw4v",
"modified": "2023-09-29T06:30:29Z",
"published": "2023-09-29T06:30:29Z",
"aliases": [
"CVE-2023-44464"
],
"details": "pretix before 2023.7.2 allows Pillow to parse EPS files.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44464"
},
{
"type": "WEB",
"url": "https://github.com/pretix/pretix/commit/8583bfb7d97263e9e923ad5d7f123ca1cadc8f2e"
},
{
"type": "WEB",
"url": "https://github.com/pretix/pretix/compare/v2023.7.1...v2023.7.2"
},
{
"type": "WEB",
"url": "https://github.com/pretix/pretix/tags"
},
{
"type": "WEB",
"url": "https://pretix.eu/about/en/ticketing"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
{
"schema_version": "1.4.0",
"id": "GHSA-f4xh-jq5v-423g",
"modified": "2023-09-29T06:30:29Z",
"published": "2023-09-29T06:30:29Z",
"aliases": [
"CVE-2023-26146"
],
"details": "All versions of the package ithewei/libhv are vulnerable to Cross-site Scripting (XSS) such that when a file with a name containing a malicious payload is served by the application, the filename is displayed without proper sanitization when it is rendered.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26146"
},
{
"type": "WEB",
"url": "https://gist.github.com/dellalibera/c53448135480cbe12257c4b413a90d20"
},
{
"type": "WEB",
"url": "https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730766"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.4.0",
"id": "GHSA-f6g2-47v5-3qv6",
"modified": "2023-09-28T15:30:17Z",
"modified": "2023-09-29T06:30:28Z",
"published": "2023-09-28T15:30:17Z",
"aliases": [
"CVE-2023-43863"
],
"details": "D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanDhcpplus function.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"affected": [

Expand All @@ -29,7 +32,7 @@
],
"database_specific": {
"cwe_ids": [

"CWE-787"
],
"severity": null,
"github_reviewed": false,
Expand Down
Loading

0 comments on commit 3fc0076

Please sign in to comment.