File tree Expand file tree Collapse file tree 4 files changed +25
-9
lines changed
advisories/github-reviewed
2023/09/GHSA-v92f-jx6p-73rx Expand file tree Collapse file tree 4 files changed +25
-9
lines changed Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-36p3-wjmg-h94x" ,
4- "modified" : " 2025-01-29T18:38:36Z " ,
4+ "modified" : " 2025-10-22T19:18:34Z " ,
55 "published" : " 2022-03-31T18:30:50Z" ,
66 "aliases" : [
77 " CVE-2022-22965"
1111 "severity" : [
1212 {
1313 "type" : " CVSS_V3" ,
14- "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+ "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H "
1515 }
1616 ],
1717 "affected" : [
255255 "type" : " WEB" ,
256256 "url" : " https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67"
257257 },
258+ {
259+ "type" : " WEB" ,
260+ "url" : " https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22965"
261+ },
258262 {
259263 "type" : " WEB" ,
260264 "url" : " https://www.kb.cert.org/vuls/id/970766"
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-6v73-fgf6-w5j7" ,
4- "modified" : " 2022-08-11T21:35:54Z " ,
4+ "modified" : " 2025-10-22T19:18:02Z " ,
55 "published" : " 2022-04-03T00:00:59Z" ,
66 "aliases" : [
77 " CVE-2022-22963"
1111 "severity" : [
1212 {
1313 "type" : " CVSS_V3" ,
14- "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+ "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H "
1515 }
1616 ],
1717 "affected" : [
7575 "type" : " WEB" ,
7676 "url" : " https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH"
7777 },
78+ {
79+ "type" : " WEB" ,
80+ "url" : " https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22963"
81+ },
7882 {
7983 "type" : " WEB" ,
8084 "url" : " https://www.oracle.com/security-alerts/cpuapr2022.html"
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-4x9r-j582-cgr8" ,
4- "modified" : " 2025-07-30T11:44:29Z " ,
4+ "modified" : " 2025-10-22T19:19:14Z " ,
55 "published" : " 2022-07-19T00:00:29Z" ,
66 "aliases" : [
77 " CVE-2022-33891"
1111 "severity" : [
1212 {
1313 "type" : " CVSS_V3" ,
14- "score" : " CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+ "score" : " CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H "
1515 },
1616 {
1717 "type" : " CVSS_V4" ,
18- "score" : " CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N"
18+ "score" : " CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:A "
1919 }
2020 ],
2121 "affected" : [
117117 "type" : " WEB" ,
118118 "url" : " https://packetstormsecurity.com/files/168309/Apache-Spark-Unauthenticated-Command-Injection.html"
119119 },
120+ {
121+ "type" : " WEB" ,
122+ "url" : " https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-33891"
123+ },
120124 {
121125 "type" : " WEB" ,
122126 "url" : " https://www.openwall.com/lists/oss-security/2023/05/02/1"
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-v92f-jx6p-73rx" ,
4- "modified" : " 2025-02-18T22:39:30Z " ,
4+ "modified" : " 2025-10-22T19:17:43Z " ,
55 "published" : " 2023-09-19T20:35:16Z" ,
66 "aliases" : [
77 " CVE-2022-24816"
1111 "severity" : [
1212 {
1313 "type" : " CVSS_V3" ,
14- "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
14+ "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H "
1515 }
1616 ],
1717 "affected" : [
7070 {
7171 "type" : " PACKAGE" ,
7272 "url" : " https://github.com/geosolutions-it/jai-ext"
73+ },
74+ {
75+ "type" : " WEB" ,
76+ "url" : " https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-24816"
7377 }
7478 ],
7579 "database_specific" : {
You can’t perform that action at this time.
0 commit comments