File tree Expand file tree Collapse file tree 7 files changed +46
-14
lines changed
advisories/github-reviewed
2022/08/GHSA-6278-2q4m-cmf3 Expand file tree Collapse file tree 7 files changed +46
-14
lines changed Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-6278-2q4m-cmf3" ,
4- "modified" : " 2022-09-16T18:37:18Z " ,
4+ "modified" : " 2025-10-22T19:19:35Z " ,
55 "published" : " 2022-08-27T00:00:43Z" ,
66 "aliases" : [
77 " CVE-2022-36537"
1111 "severity" : [
1212 {
1313 "type" : " CVSS_V3" ,
14- "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
14+ "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H "
1515 }
1616 ],
1717 "affected" : [
131131 {
132132 "type" : " WEB" ,
133133 "url" : " https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw"
134+ },
135+ {
136+ "type" : " WEB" ,
137+ "url" : " https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-36537"
134138 }
135139 ],
136140 "database_specific" : {
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-5cx2-vq3h-x52c" ,
4- "modified" : " 2024-04-08T15:35:54Z " ,
4+ "modified" : " 2025-10-22T19:20:31Z " ,
55 "published" : " 2023-04-24T18:30:30Z" ,
66 "aliases" : [
77 " CVE-2023-27524"
1111 "severity" : [
1212 {
1313 "type" : " CVSS_V3" ,
14- "score" : " CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L"
14+ "score" : " CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L/E:H "
1515 }
1616 ],
1717 "affected" : [
6060 "type" : " WEB" ,
6161 "url" : " https://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html"
6262 },
63+ {
64+ "type" : " WEB" ,
65+ "url" : " https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-27524"
66+ },
67+ {
68+ "type" : " WEB" ,
69+ "url" : " https://www.openwall.com/lists/oss-security/2023/04/24/2"
70+ },
6371 {
6472 "type" : " WEB" ,
6573 "url" : " http://www.openwall.com/lists/oss-security/2023/04/24/2"
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-gw42-f939-fhvm" ,
4- "modified" : " 2023-07-20T18:57:26Z " ,
4+ "modified" : " 2025-10-22T19:20:57Z " ,
55 "published" : " 2023-05-23T19:54:30Z" ,
66 "aliases" : [
77 " CVE-2023-32315"
1111 "severity" : [
1212 {
1313 "type" : " CVSS_V3" ,
14- "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
14+ "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L/E:H "
1515 }
1616 ],
1717 "affected" : [
9191 "type" : " WEB" ,
9292 "url" : " https://igniterealtime.atlassian.net/browse/OF-2595"
9393 },
94+ {
95+ "type" : " WEB" ,
96+ "url" : " https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-32315"
97+ },
9498 {
9599 "type" : " WEB" ,
96100 "url" : " http://packetstormsecurity.com/files/173607/Openfire-Authentication-Bypass-Remote-Code-Execution.html"
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-x3cq-8f32-5f63" ,
4- "modified" : " 2025-01-29T22:00:17Z " ,
4+ "modified" : " 2025-10-22T19:21:22Z " ,
55 "published" : " 2023-07-06T21:15:04Z" ,
66 "aliases" : [
77 " CVE-2023-33246"
1111 "severity" : [
1212 {
1313 "type" : " CVSS_V3" ,
14- "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+ "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H "
1515 }
1616 ],
1717 "affected" : [
121121 "type" : " WEB" ,
122122 "url" : " https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp"
123123 },
124+ {
125+ "type" : " WEB" ,
126+ "url" : " https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-33246"
127+ },
124128 {
125129 "type" : " WEB" ,
126130 "url" : " https://www.vicarius.io/vsociety/posts/rocketmq-rce-cve-2023-33246-33247"
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-vmch-3w2x-vhgq" ,
4- "modified" : " 2024-06-27T21:35:49Z " ,
4+ "modified" : " 2025-10-22T19:21:48Z " ,
55 "published" : " 2023-08-09T12:56:43Z" ,
66 "aliases" : [
77 " CVE-2023-38180"
1111 "severity" : [
1212 {
1313 "type" : " CVSS_V3" ,
14- "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
14+ "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H "
1515 }
1616 ],
1717 "affected" : [
242242 {
243243 "type" : " WEB" ,
244244 "url" : " https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180"
245+ },
246+ {
247+ "type" : " WEB" ,
248+ "url" : " https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-38180"
245249 }
246250 ],
247251 "database_specific" : {
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-2pxw-r47w-4p8c" ,
4- "modified" : " 2023-09-05T15:45:10Z " ,
4+ "modified" : " 2025-10-22T19:20:02Z " ,
55 "published" : " 2023-09-05T15:45:10Z" ,
66 "aliases" : [
77 " CVE-2023-28434"
1111 "severity" : [
1212 {
1313 "type" : " CVSS_V3" ,
14- "score" : " CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+ "score" : " CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H "
1515 }
1616 ],
1717 "affected" : [
5555 {
5656 "type" : " PACKAGE" ,
5757 "url" : " https://github.com/minio/minio"
58+ },
59+ {
60+ "type" : " WEB" ,
61+ "url" : " https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28434"
5862 }
5963 ],
6064 "database_specific" : {
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-crg9-44h2-xw35" ,
4- "modified" : " 2025-02-13T19:20:36Z " ,
4+ "modified" : " 2025-10-22T19:22:19Z " ,
55 "published" : " 2023-10-27T15:30:20Z" ,
66 "aliases" : [
77 " CVE-2023-46604"
1111 "severity" : [
1212 {
1313 "type" : " CVSS_V3" ,
14- "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H"
14+ "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H/E:H "
1515 }
1616 ],
1717 "affected" : [
225225 "type" : " WEB" ,
226226 "url" : " https://security.netapp.com/advisory/ntap-20231110-0010"
227227 },
228+ {
229+ "type" : " WEB" ,
230+ "url" : " https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-46604"
231+ },
228232 {
229233 "type" : " WEB" ,
230234 "url" : " https://www.openwall.com/lists/oss-security/2023/10/27/5"
You can’t perform that action at this time.
0 commit comments