Skip to content

Commit

Permalink
Show file tree
Hide file tree
Showing 12 changed files with 352 additions and 4 deletions.
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
{
"schema_version": "1.4.0",
"id": "GHSA-8pp6-343g-mgj6",
"modified": "2022-05-24T16:54:27Z",
"modified": "2023-10-09T18:30:19Z",
"published": "2022-05-24T16:54:27Z",
"aliases": [
"CVE-2019-5638"
],
"details": "Rapid7 Nexpose versions 6.5.50 and prior suffer from insufficient session expiration when an administrator performs a security relevant edit on an existing, logged on user. For example, if a user's password is changed by an administrator due to an otherwise unrelated credential leak, that user account's current session is still valid after the password change, potentially allowing the attacker who originally compromised the credential to remain logged in and able to cause further damage.",
"severity": [

{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"
}
],
"affected": [

Expand All @@ -18,16 +21,20 @@
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5638"
},
{
"type": "WEB",
"url": "https://docs.rapid7.com/insightvm/enable-insightvm-platform-login"
},
{
"type": "WEB",
"url": "https://help.rapid7.com/nexpose/en-us/release-notes/archive/2019/02/"
}
],
"database_specific": {
"cwe_ids": [

"CWE-613"
],
"severity": null,
"severity": "HIGH",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-08-21T20:15:00Z"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,10 @@
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2023/dsa-5506"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,10 @@
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,10 @@
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/"
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"schema_version": "1.4.0",
"id": "GHSA-3pfh-7988-fh4j",
"modified": "2023-10-09T18:30:20Z",
"published": "2023-10-09T18:30:20Z",
"aliases": [
"CVE-2023-41668"
],
"details": "Cross-Site Request Forgery (CSRF) vulnerability in Leadster plugin <= 1.1.2 versions.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41668"
},
{
"type": "WEB",
"url": "https://patchstack.com/database/vulnerability/leadster-marketing-conversacional/wordpress-leadster-plugin-1-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve"
}
],
"database_specific": {
"cwe_ids": [
"CWE-352"
],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
{
"schema_version": "1.4.0",
"id": "GHSA-3qhf-qr39-9c9w",
"modified": "2023-10-09T18:30:20Z",
"published": "2023-10-09T18:30:20Z",
"aliases": [
"CVE-2023-39194"
],
"details": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39194"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2023-39194"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226788"
},
{
"type": "WEB",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-CAN-18111/"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
{
"schema_version": "1.4.0",
"id": "GHSA-3rm2-4q4r-254r",
"modified": "2023-10-09T18:30:20Z",
"published": "2023-10-09T18:30:20Z",
"aliases": [
"CVE-2023-39189"
],
"details": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39189"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2023-39189"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226777"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"schema_version": "1.4.0",
"id": "GHSA-4g52-qrp4-6j69",
"modified": "2023-10-09T18:30:20Z",
"published": "2023-10-09T18:30:20Z",
"aliases": [
"CVE-2023-41667"
],
"details": "Cross-Site Request Forgery (CSRF) vulnerability in Ulf Benjaminsson WP-dTree plugin <= 4.4.5 versions.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41667"
},
{
"type": "WEB",
"url": "https://patchstack.com/database/vulnerability/wp-dtree-30/wordpress-wp-dtree-plugin-4-4-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve"
}
],
"database_specific": {
"cwe_ids": [
"CWE-352"
],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"schema_version": "1.4.0",
"id": "GHSA-j97x-4gxg-7x49",
"modified": "2023-10-09T18:30:20Z",
"published": "2023-10-09T18:30:20Z",
"aliases": [
"CVE-2023-5365"
],
"details": "HP LIFE Android Mobile application is potentially vulnerable to escalation of privilege and/or information disclosure.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5365"
},
{
"type": "WEB",
"url": "https://support.hp.com/us-en/document/ish_9393937-9393961-16/hpsbgn03870"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
{
"schema_version": "1.4.0",
"id": "GHSA-mpcv-wcv8-6rxw",
"modified": "2023-10-09T18:30:20Z",
"published": "2023-10-09T18:30:20Z",
"aliases": [
"CVE-2023-39193"
],
"details": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39193"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2023-39193"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226787"
},
{
"type": "WEB",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-CAN-18866/"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"schema_version": "1.4.0",
"id": "GHSA-q68p-h2v7-5w73",
"modified": "2023-10-09T18:30:19Z",
"published": "2023-10-09T18:30:19Z",
"aliases": [
"CVE-2023-30910"
],
"details": "HPE MSA Controller prior to version IN210R004 could be remotely exploited to allow inconsistent interpretation of HTTP requests. ",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30910"
},
{
"type": "WEB",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbst04539en_us"
}
],
"database_specific": {
"cwe_ids": [
"CWE-444"
],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Loading

0 comments on commit 472f1a4

Please sign in to comment.