forked from github/advisory-database
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
GHSA-2c9q-4475-49j3 GHSA-45g9-v625-vr5r GHSA-47vg-jqf6-p59f GHSA-7xrr-p6hm-9f5f GHSA-84hw-65xp-5cx9 GHSA-865w-mq7p-j8f4 GHSA-ccr7-m2xp-492w GHSA-f3fc-w342-3j5r GHSA-j9wr-m578-9wvj GHSA-m23w-85pq-x692 GHSA-pmv9-f5mg-cp3v GHSA-q7q7-xc84-hcqj GHSA-r7ch-cwp4-rh7c GHSA-w62j-g234-3f6f
- Loading branch information
1 parent
5dfa42d
commit b5fb92c
Showing
14 changed files
with
274 additions
and
27 deletions.
There are no files selected for viewing
35 changes: 35 additions & 0 deletions
35
advisories/unreviewed/2023/02/GHSA-2c9q-4475-49j3/GHSA-2c9q-4475-49j3.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
{ | ||
"schema_version": "1.3.0", | ||
"id": "GHSA-2c9q-4475-49j3", | ||
"modified": "2023-02-13T18:30:25Z", | ||
"published": "2023-02-13T18:30:25Z", | ||
"aliases": [ | ||
"CVE-2023-23553" | ||
], | ||
"details": "Control By Web X-400 devices are vulnerable to a cross-site scripting attack, which could result in private and session information being transferred to the attacker.", | ||
"severity": [ | ||
|
||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23553" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-23-040-01" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-79" | ||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2023-02-13T18:15:00Z" | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
35 changes: 35 additions & 0 deletions
35
advisories/unreviewed/2023/02/GHSA-ccr7-m2xp-492w/GHSA-ccr7-m2xp-492w.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
{ | ||
"schema_version": "1.3.0", | ||
"id": "GHSA-ccr7-m2xp-492w", | ||
"modified": "2023-02-13T18:30:25Z", | ||
"published": "2023-02-13T18:30:25Z", | ||
"aliases": [ | ||
"CVE-2023-23551" | ||
], | ||
"details": "Control By Web X-600M devices run Lua scripts and are vulnerable to code injection, which could allow an attacker to remotely execute arbitrary code.", | ||
"severity": [ | ||
|
||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23551" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-23-040-01" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-94" | ||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2023-02-13T18:15:00Z" | ||
} | ||
} |
39 changes: 39 additions & 0 deletions
39
advisories/unreviewed/2023/02/GHSA-f3fc-w342-3j5r/GHSA-f3fc-w342-3j5r.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,39 @@ | ||
{ | ||
"schema_version": "1.3.0", | ||
"id": "GHSA-f3fc-w342-3j5r", | ||
"modified": "2023-02-13T18:30:25Z", | ||
"published": "2023-02-13T18:30:25Z", | ||
"aliases": [ | ||
"CVE-2023-0810" | ||
], | ||
"details": "Cross-site Scripting (XSS) - Stored in GitHub repository btcpayserver/btcpayserver prior to 1.7.11.", | ||
"severity": [ | ||
|
||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0810" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/btcpayserver/btcpayserver/commit/dffa6accb04df7b80bc584dedef22c9297292ce6" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://huntr.dev/bounties/a48414ea-63d9-453c-b3f3-2c927b71ec68" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-79" | ||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2023-02-13T17:15:00Z" | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
39 changes: 39 additions & 0 deletions
39
advisories/unreviewed/2023/02/GHSA-pmv9-f5mg-cp3v/GHSA-pmv9-f5mg-cp3v.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,39 @@ | ||
{ | ||
"schema_version": "1.3.0", | ||
"id": "GHSA-pmv9-f5mg-cp3v", | ||
"modified": "2023-02-13T18:30:25Z", | ||
"published": "2023-02-13T18:30:25Z", | ||
"aliases": [ | ||
"CVE-2022-48077" | ||
], | ||
"details": "Genymotion Desktop v3.3.2 was discovered to contain a DLL hijacking vulnerability that allows attackers to escalate privileges and execute arbitrary code via a crafted DLL.", | ||
"severity": [ | ||
|
||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48077" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://gist.github.com/hax3xploit/3210813c7221f3ae505494da57f26cbc" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/hax3xploit/CVEs/blob/master/GenymotionDesktop.md" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
|
||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2023-02-13T17:15:00Z" | ||
} | ||
} |
Oops, something went wrong.