-
Notifications
You must be signed in to change notification settings - Fork 332
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
a4d017d
commit 6e5f741
Showing
2 changed files
with
70 additions
and
0 deletions.
There are no files selected for viewing
35 changes: 35 additions & 0 deletions
35
advisories/unreviewed/2023/02/GHSA-gp5r-64rh-wjrv/GHSA-gp5r-64rh-wjrv.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
{ | ||
"schema_version": "1.3.0", | ||
"id": "GHSA-gp5r-64rh-wjrv", | ||
"modified": "2023-02-23T09:30:17Z", | ||
"published": "2023-02-23T09:30:17Z", | ||
"aliases": [ | ||
"CVE-2023-0939" | ||
], | ||
"details": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NTN Information Technologies Online Services Software allows SQL Injection.This issue affects Online Services Software: before 1.17.", | ||
"severity": [ | ||
|
||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0939" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.usom.gov.tr/bildirim/tr-23-0103" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
|
||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2023-02-23T08:15:00Z" | ||
} | ||
} |
35 changes: 35 additions & 0 deletions
35
advisories/unreviewed/2023/02/GHSA-mrpv-5pmr-p92h/GHSA-mrpv-5pmr-p92h.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
{ | ||
"schema_version": "1.3.0", | ||
"id": "GHSA-mrpv-5pmr-p92h", | ||
"modified": "2023-02-23T09:30:17Z", | ||
"published": "2023-02-23T09:30:17Z", | ||
"aliases": [ | ||
"CVE-2023-25621" | ||
], | ||
"details": "Privilege Escalation vulnerability in Apache Software Foundation Apache Sling. Any content author is able to create i18n dictionaries in the repository in a location the author has write access to. As these translations are used across the whole product, it allows an author to change any text or dialog in the product. For example an attacker might fool someone by changing the text on a delete button to \"Info\". This issue affects the i18n module of Apache Sling up to version 2.5.18. Version 2.6.2 and higher limit by default i18m dictionaries to certain paths in the repository (/libs and /apps). Users of the module are advised to update to version 2.6.2 or higher, check the configuration for resource loading and then adjust the access permissions for the configured path accordingly.", | ||
"severity": [ | ||
|
||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25621" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://sling.apache.org/news.html" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
|
||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2023-02-23T09:15:00Z" | ||
} | ||
} |