diff --git a/data/mattermost/BIT-mattermost-2023-7113.json b/data/mattermost/BIT-mattermost-2023-7113.json new file mode 100644 index 000000000..9badc38ca --- /dev/null +++ b/data/mattermost/BIT-mattermost-2023-7113.json @@ -0,0 +1,50 @@ +{ + "schema_version": "1.5.0", + "id": "BIT-mattermost-2023-7113", + "details": "Mattermost version 8.1.6 and earlier fails to sanitize channel mention data in posts, which allows an attacker to inject markup in the web client.", + "aliases": [ + "CVE-2023-7113" + ], + "affected": [ + { + "package": { + "ecosystem": "Bitnami", + "name": "mattermost", + "purl": "pkg:bitnami/mattermost" + }, + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "ranges": [ + { + "type": "SEMVER", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "8.1.7" + } + ] + } + ] + } + ], + "database_specific": { + "severity": "Medium", + "cpes": [ + "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*" + ] + }, + "references": [ + { + "type": "WEB", + "url": "https://mattermost.com/security-updates" + } + ], + "published": "2024-01-06T07:20:54.357Z", + "modified": "2024-01-06T07:45:08.159Z" +} \ No newline at end of file diff --git a/data/node/BIT-node-2021-22930.json b/data/node/BIT-node-2021-22930.json index 50ae23cbd..f0b75fe95 100644 --- a/data/node/BIT-node-2021-22930.json +++ b/data/node/BIT-node-2021-22930.json @@ -72,8 +72,12 @@ { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20211112-0002/" + }, + { + "type": "WEB", + "url": "https://security.gentoo.org/glsa/202401-02" } ], "published": "2023-11-06T09:03:20.844Z", - "modified": "2023-11-07T16:28:29.749Z" + "modified": "2024-01-06T07:45:08.159Z" } \ No newline at end of file diff --git a/data/node/BIT-node-2021-22931.json b/data/node/BIT-node-2021-22931.json index b8586de0d..46698c1a0 100644 --- a/data/node/BIT-node-2021-22931.json +++ b/data/node/BIT-node-2021-22931.json @@ -96,8 +96,12 @@ { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "type": "WEB", + "url": "https://security.gentoo.org/glsa/202401-02" } ], "published": "2023-11-06T09:03:11.374Z", - "modified": "2023-11-07T16:28:29.749Z" + "modified": "2024-01-06T07:45:08.159Z" } \ No newline at end of file diff --git a/data/node/BIT-node-2021-22939.json b/data/node/BIT-node-2021-22939.json index f33e94854..d1f0b5735 100644 --- a/data/node/BIT-node-2021-22939.json +++ b/data/node/BIT-node-2021-22939.json @@ -84,8 +84,12 @@ { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "type": "WEB", + "url": "https://security.gentoo.org/glsa/202401-02" } ], "published": "2023-11-06T09:03:02.161Z", - "modified": "2023-11-07T16:28:29.749Z" + "modified": "2024-01-06T07:45:08.159Z" } \ No newline at end of file diff --git a/data/node/BIT-node-2021-22940.json b/data/node/BIT-node-2021-22940.json index c079e62b5..3c4b7ef07 100644 --- a/data/node/BIT-node-2021-22940.json +++ b/data/node/BIT-node-2021-22940.json @@ -84,8 +84,12 @@ { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "type": "WEB", + "url": "https://security.gentoo.org/glsa/202401-02" } ], "published": "2023-11-06T09:02:53.288Z", - "modified": "2023-11-07T16:28:29.749Z" + "modified": "2024-01-06T07:45:08.159Z" } \ No newline at end of file diff --git a/data/node/BIT-node-2021-3672.json b/data/node/BIT-node-2021-3672.json index 2fe933ad3..c2d728b28 100644 --- a/data/node/BIT-node-2021-3672.json +++ b/data/node/BIT-node-2021-3672.json @@ -80,8 +80,12 @@ { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "type": "WEB", + "url": "https://security.gentoo.org/glsa/202401-02" } ], "published": "2023-11-06T09:02:18.071Z", - "modified": "2023-11-07T16:28:29.749Z" + "modified": "2024-01-06T07:45:08.159Z" } \ No newline at end of file diff --git a/data/pgbouncer/BIT-pgbouncer-2021-3672.json b/data/pgbouncer/BIT-pgbouncer-2021-3672.json index df3a47c09..008b664e7 100644 --- a/data/pgbouncer/BIT-pgbouncer-2021-3672.json +++ b/data/pgbouncer/BIT-pgbouncer-2021-3672.json @@ -55,8 +55,12 @@ { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "type": "WEB", + "url": "https://security.gentoo.org/glsa/202401-02" } ], "published": "2023-11-06T08:59:00.876Z", - "modified": "2023-11-06T09:17:33.630Z" + "modified": "2024-01-06T07:45:08.159Z" } \ No newline at end of file diff --git a/data/sqlite/BIT-sqlite-2023-7104.json b/data/sqlite/BIT-sqlite-2023-7104.json new file mode 100644 index 000000000..3e9076369 --- /dev/null +++ b/data/sqlite/BIT-sqlite-2023-7104.json @@ -0,0 +1,66 @@ +{ + "schema_version": "1.5.0", + "id": "BIT-sqlite-2023-7104", + "details": "A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.", + "aliases": [ + "CVE-2023-7104" + ], + "affected": [ + { + "package": { + "ecosystem": "Bitnami", + "name": "sqlite", + "purl": "pkg:bitnami/sqlite" + }, + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "ranges": [ + { + "type": "SEMVER", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.43.0" + } + ] + } + ] + } + ], + "database_specific": { + "severity": "Critical", + "cpes": [ + "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*" + ] + }, + "references": [ + { + "type": "WEB", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/" + }, + { + "type": "WEB", + "url": "https://sqlite.org/forum/forumpost/5bcbf4571c" + }, + { + "type": "WEB", + "url": "https://sqlite.org/src/info/0e4e7a05c4204b47" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.248999" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.248999" + } + ], + "published": "2024-01-06T07:29:11.558Z", + "modified": "2024-01-06T07:45:08.159Z" +} \ No newline at end of file diff --git a/data/tomcat/BIT-tomcat-2023-46589.json b/data/tomcat/BIT-tomcat-2023-46589.json index ae416a7ae..48a3719b5 100644 --- a/data/tomcat/BIT-tomcat-2023-46589.json +++ b/data/tomcat/BIT-tomcat-2023-46589.json @@ -142,8 +142,12 @@ { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20231214-0009/" + }, + { + "type": "WEB", + "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00001.html" } ], "published": "2023-12-05T07:30:11.218Z", - "modified": "2023-12-15T07:45:13.493Z" + "modified": "2024-01-06T07:45:08.159Z" } \ No newline at end of file