diff --git a/mapping.csv b/mapping.csv index cb604c14d1f..13378a60a15 100644 --- a/mapping.csv +++ b/mapping.csv @@ -225714,3 +225714,32 @@ vulnerability,CVE-2024-25298,vulnerability--fe567565-967a-46aa-9b06-7247912316aa vulnerability,CVE-2022-42443,vulnerability--cadd7601-598b-4adb-8e82-aa75af46454a vulnerability,CVE-2022-41738,vulnerability--32e188cc-7708-4cb8-b73c-f59f288ae0ec vulnerability,CVE-2022-41737,vulnerability--920e47b4-d99e-476e-97fd-885aa6f31750 +vulnerability,CVE-2023-52374,vulnerability--3c732906-da7b-4088-9613-c59d024c3a26 +vulnerability,CVE-2023-52375,vulnerability--8c073f4f-44c1-46c0-aec0-04cfb835cf60 +vulnerability,CVE-2023-52373,vulnerability--5a8630bc-5717-4b38-b9c0-1412aeef9788 +vulnerability,CVE-2023-52367,vulnerability--36a836d7-f3c5-4e1a-ba3f-43faa9401843 +vulnerability,CVE-2023-52379,vulnerability--8c803fde-2fae-4777-b97e-7a7d774cb676 +vulnerability,CVE-2023-52097,vulnerability--2386907e-bc93-4567-b570-ae08dbf660fe +vulnerability,CVE-2023-52360,vulnerability--f14b65e1-c25c-4e3c-b0ef-48903a5b9921 +vulnerability,CVE-2023-52362,vulnerability--ab8dc0ad-000f-44fb-ade0-25e8310f8c56 +vulnerability,CVE-2023-52380,vulnerability--db8592ad-72ab-480a-b631-9385a577c8b3 +vulnerability,CVE-2023-52363,vulnerability--75888c38-38e5-42f7-a4b1-30e55bafcc2b +vulnerability,CVE-2023-52372,vulnerability--15ee2db4-a5a4-438a-9538-fadfdea1bbec +vulnerability,CVE-2023-52365,vulnerability--706953d7-8fbb-45bc-b4e2-074ff387e6c0 +vulnerability,CVE-2023-52361,vulnerability--a3098fd8-d656-4397-9678-f124e4a61b7e +vulnerability,CVE-2023-52366,vulnerability--15d77e36-fe7c-4a2c-93bb-afa48b919975 +vulnerability,CVE-2023-52357,vulnerability--09853221-fb93-40c4-bbd1-5fa35173bb5e +vulnerability,CVE-2023-52381,vulnerability--415e3ede-9c26-4e77-a032-1aa2e2ff42c6 +vulnerability,CVE-2023-52369,vulnerability--79ce79ef-1d36-4bbb-b4ea-f3d7408097da +vulnerability,CVE-2023-52376,vulnerability--750f96d4-0a12-4d03-b9d3-1dfee4856360 +vulnerability,CVE-2023-52378,vulnerability--8715c8bc-1f79-494e-8a65-1aca8a6c8315 +vulnerability,CVE-2023-52371,vulnerability--6d39de89-4d8d-4d38-8ee8-1c228c51f0ce +vulnerability,CVE-2023-52387,vulnerability--fa9786c6-0c18-4a8b-96cb-16edb2636cfb +vulnerability,CVE-2023-52368,vulnerability--0eb842d9-7281-4651-b534-651191e0a40e +vulnerability,CVE-2023-52377,vulnerability--55a28130-0e62-458c-8eb1-5bcea579f63c +vulnerability,CVE-2023-52358,vulnerability--0383bbaf-57c5-44ae-ad09-3a8f23ac4153 +vulnerability,CVE-2023-52370,vulnerability--d078d0d6-a6f2-410a-aced-b65cbc2c13dd +vulnerability,CVE-2023-5779,vulnerability--8f1f5eb0-c099-4697-aa90-6bba2caeb0e6 +vulnerability,CVE-2023-6249,vulnerability--01af6cb5-8f0a-41e6-9bed-1b6d08f2592e +vulnerability,CVE-2023-6749,vulnerability--cbdcd2de-94b6-4824-951d-3e7aea2bd205 +vulnerability,CVE-2022-48621,vulnerability--13ab0ab0-484d-4330-ac3f-55c4b1242571 diff --git a/objects/vulnerability/vulnerability--01af6cb5-8f0a-41e6-9bed-1b6d08f2592e.json b/objects/vulnerability/vulnerability--01af6cb5-8f0a-41e6-9bed-1b6d08f2592e.json new file mode 100644 index 00000000000..dfd0d2cfdce --- /dev/null +++ b/objects/vulnerability/vulnerability--01af6cb5-8f0a-41e6-9bed-1b6d08f2592e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1bf307a2-4fb8-479b-93ad-abd4b24cac42", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--01af6cb5-8f0a-41e6-9bed-1b6d08f2592e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:09.104124Z", + "modified": "2024-02-19T00:28:09.104124Z", + "name": "CVE-2023-6249", + "description": "Signed to unsigned conversion esp32_ipm_send", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-6249" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0383bbaf-57c5-44ae-ad09-3a8f23ac4153.json b/objects/vulnerability/vulnerability--0383bbaf-57c5-44ae-ad09-3a8f23ac4153.json new file mode 100644 index 00000000000..3cacfa241f9 --- /dev/null +++ b/objects/vulnerability/vulnerability--0383bbaf-57c5-44ae-ad09-3a8f23ac4153.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ce6498a3-a18f-48b5-928c-ba6017f9a0f7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0383bbaf-57c5-44ae-ad09-3a8f23ac4153", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.545119Z", + "modified": "2024-02-19T00:28:08.545119Z", + "name": "CVE-2023-52358", + "description": "Vulnerability of configuration defects in some APIs of the audio module.Successful exploitation of this vulnerability may affect availability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52358" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--09853221-fb93-40c4-bbd1-5fa35173bb5e.json b/objects/vulnerability/vulnerability--09853221-fb93-40c4-bbd1-5fa35173bb5e.json new file mode 100644 index 00000000000..067590b92ab --- /dev/null +++ b/objects/vulnerability/vulnerability--09853221-fb93-40c4-bbd1-5fa35173bb5e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--90082f3a-b552-48d8-92f1-69554f3d4dbf", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--09853221-fb93-40c4-bbd1-5fa35173bb5e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.528676Z", + "modified": "2024-02-19T00:28:08.528676Z", + "name": "CVE-2023-52357", + "description": "Vulnerability of serialization/deserialization mismatch in the vibration framework.Successful exploitation of this vulnerability may affect availability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52357" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0eb842d9-7281-4651-b534-651191e0a40e.json b/objects/vulnerability/vulnerability--0eb842d9-7281-4651-b534-651191e0a40e.json new file mode 100644 index 00000000000..ea05beeb989 --- /dev/null +++ b/objects/vulnerability/vulnerability--0eb842d9-7281-4651-b534-651191e0a40e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--35af184f-e03b-4b71-b696-cf1b36175393", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0eb842d9-7281-4651-b534-651191e0a40e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.54218Z", + "modified": "2024-02-19T00:28:08.54218Z", + "name": "CVE-2023-52368", + "description": "Input verification vulnerability in the account module.Successful exploitation of this vulnerability may cause features to perform abnormally.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52368" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--13ab0ab0-484d-4330-ac3f-55c4b1242571.json b/objects/vulnerability/vulnerability--13ab0ab0-484d-4330-ac3f-55c4b1242571.json new file mode 100644 index 00000000000..1de47adfab3 --- /dev/null +++ b/objects/vulnerability/vulnerability--13ab0ab0-484d-4330-ac3f-55c4b1242571.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--efee557c-11ff-4efe-af12-2d4bf11ba969", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--13ab0ab0-484d-4330-ac3f-55c4b1242571", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:16.295169Z", + "modified": "2024-02-19T00:28:16.295169Z", + "name": "CVE-2022-48621", + "description": "Vulnerability of missing authentication for critical functions in the Wi-Fi module.Successful exploitation of this vulnerability may affect service confidentiality.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2022-48621" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--15d77e36-fe7c-4a2c-93bb-afa48b919975.json b/objects/vulnerability/vulnerability--15d77e36-fe7c-4a2c-93bb-afa48b919975.json new file mode 100644 index 00000000000..9d6b22219eb --- /dev/null +++ b/objects/vulnerability/vulnerability--15d77e36-fe7c-4a2c-93bb-afa48b919975.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0494d3b2-49d0-4863-b939-20cc99842dce", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--15d77e36-fe7c-4a2c-93bb-afa48b919975", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.526832Z", + "modified": "2024-02-19T00:28:08.526832Z", + "name": "CVE-2023-52366", + "description": "Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52366" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--15ee2db4-a5a4-438a-9538-fadfdea1bbec.json b/objects/vulnerability/vulnerability--15ee2db4-a5a4-438a-9538-fadfdea1bbec.json new file mode 100644 index 00000000000..a4b5465a59f --- /dev/null +++ b/objects/vulnerability/vulnerability--15ee2db4-a5a4-438a-9538-fadfdea1bbec.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bed0fbfc-790e-40a6-afc8-cf9fea9149d2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--15ee2db4-a5a4-438a-9538-fadfdea1bbec", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.517699Z", + "modified": "2024-02-19T00:28:08.517699Z", + "name": "CVE-2023-52372", + "description": "Vulnerability of input parameter verification in the motor module.Successful exploitation of this vulnerability may affect availability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52372" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2386907e-bc93-4567-b570-ae08dbf660fe.json b/objects/vulnerability/vulnerability--2386907e-bc93-4567-b570-ae08dbf660fe.json new file mode 100644 index 00000000000..3ef949fd3f3 --- /dev/null +++ b/objects/vulnerability/vulnerability--2386907e-bc93-4567-b570-ae08dbf660fe.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--373b94be-62e9-46b2-aa36-6c05cb8aab58", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2386907e-bc93-4567-b570-ae08dbf660fe", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.510371Z", + "modified": "2024-02-19T00:28:08.510371Z", + "name": "CVE-2023-52097", + "description": "Vulnerability of foreground service restrictions being bypassed in the NMS module.Successful exploitation of this vulnerability may affect service confidentiality.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52097" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--36a836d7-f3c5-4e1a-ba3f-43faa9401843.json b/objects/vulnerability/vulnerability--36a836d7-f3c5-4e1a-ba3f-43faa9401843.json new file mode 100644 index 00000000000..37ff72f3987 --- /dev/null +++ b/objects/vulnerability/vulnerability--36a836d7-f3c5-4e1a-ba3f-43faa9401843.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--865db25f-7571-49a4-ab0f-77562060c15d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--36a836d7-f3c5-4e1a-ba3f-43faa9401843", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.506853Z", + "modified": "2024-02-19T00:28:08.506853Z", + "name": "CVE-2023-52367", + "description": "Vulnerability of improper access control in the media library module.Successful exploitation of this vulnerability may affect service availability and integrity.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52367" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3c732906-da7b-4088-9613-c59d024c3a26.json b/objects/vulnerability/vulnerability--3c732906-da7b-4088-9613-c59d024c3a26.json new file mode 100644 index 00000000000..42297d5d884 --- /dev/null +++ b/objects/vulnerability/vulnerability--3c732906-da7b-4088-9613-c59d024c3a26.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a7a0306d-13d8-4178-a2f6-9f1f60ead031", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3c732906-da7b-4088-9613-c59d024c3a26", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.502086Z", + "modified": "2024-02-19T00:28:08.502086Z", + "name": "CVE-2023-52374", + "description": "Permission control vulnerability in the package management module.Successful exploitation of this vulnerability may affect service confidentiality.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52374" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--415e3ede-9c26-4e77-a032-1aa2e2ff42c6.json b/objects/vulnerability/vulnerability--415e3ede-9c26-4e77-a032-1aa2e2ff42c6.json new file mode 100644 index 00000000000..f2f2e74773a --- /dev/null +++ b/objects/vulnerability/vulnerability--415e3ede-9c26-4e77-a032-1aa2e2ff42c6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--74c29370-72c0-4802-84ca-a52cddcaf2cc", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--415e3ede-9c26-4e77-a032-1aa2e2ff42c6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.531326Z", + "modified": "2024-02-19T00:28:08.531326Z", + "name": "CVE-2023-52381", + "description": "Script injection vulnerability in the email module.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52381" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--55a28130-0e62-458c-8eb1-5bcea579f63c.json b/objects/vulnerability/vulnerability--55a28130-0e62-458c-8eb1-5bcea579f63c.json new file mode 100644 index 00000000000..518fa79c48d --- /dev/null +++ b/objects/vulnerability/vulnerability--55a28130-0e62-458c-8eb1-5bcea579f63c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4182dbe5-142e-4a89-9b93-57a3bf221645", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--55a28130-0e62-458c-8eb1-5bcea579f63c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.543207Z", + "modified": "2024-02-19T00:28:08.543207Z", + "name": "CVE-2023-52377", + "description": "Vulnerability of input data not being verified in the cellular data module.Successful exploitation of this vulnerability may cause out-of-bounds access.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52377" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5a8630bc-5717-4b38-b9c0-1412aeef9788.json b/objects/vulnerability/vulnerability--5a8630bc-5717-4b38-b9c0-1412aeef9788.json new file mode 100644 index 00000000000..86f9aa3dbe7 --- /dev/null +++ b/objects/vulnerability/vulnerability--5a8630bc-5717-4b38-b9c0-1412aeef9788.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d0e8df1a-f6c7-4d99-a42d-494e4809edf9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5a8630bc-5717-4b38-b9c0-1412aeef9788", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.505431Z", + "modified": "2024-02-19T00:28:08.505431Z", + "name": "CVE-2023-52373", + "description": "Vulnerability of permission verification in the content sharing pop-up module.Successful exploitation of this vulnerability may cause unauthorized file sharing.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52373" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6d39de89-4d8d-4d38-8ee8-1c228c51f0ce.json b/objects/vulnerability/vulnerability--6d39de89-4d8d-4d38-8ee8-1c228c51f0ce.json new file mode 100644 index 00000000000..cbc388405c7 --- /dev/null +++ b/objects/vulnerability/vulnerability--6d39de89-4d8d-4d38-8ee8-1c228c51f0ce.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9634f2ba-a70e-49ab-95ea-9a41f5504532", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6d39de89-4d8d-4d38-8ee8-1c228c51f0ce", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.539024Z", + "modified": "2024-02-19T00:28:08.539024Z", + "name": "CVE-2023-52371", + "description": "Vulnerability of null references in the motor module.Successful exploitation of this vulnerability may affect availability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52371" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--706953d7-8fbb-45bc-b4e2-074ff387e6c0.json b/objects/vulnerability/vulnerability--706953d7-8fbb-45bc-b4e2-074ff387e6c0.json new file mode 100644 index 00000000000..2ca83e4bd66 --- /dev/null +++ b/objects/vulnerability/vulnerability--706953d7-8fbb-45bc-b4e2-074ff387e6c0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6d11461b-040f-4967-b4b7-0a1e4595ecaf", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--706953d7-8fbb-45bc-b4e2-074ff387e6c0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.521214Z", + "modified": "2024-02-19T00:28:08.521214Z", + "name": "CVE-2023-52365", + "description": "Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52365" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--750f96d4-0a12-4d03-b9d3-1dfee4856360.json b/objects/vulnerability/vulnerability--750f96d4-0a12-4d03-b9d3-1dfee4856360.json new file mode 100644 index 00000000000..f45df98febc --- /dev/null +++ b/objects/vulnerability/vulnerability--750f96d4-0a12-4d03-b9d3-1dfee4856360.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--74a2315d-c6d2-4c12-85f6-762c8e2b8b8d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--750f96d4-0a12-4d03-b9d3-1dfee4856360", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.535029Z", + "modified": "2024-02-19T00:28:08.535029Z", + "name": "CVE-2023-52376", + "description": "Information management vulnerability in the Gallery module.Successful exploitation of this vulnerability may affect service confidentiality.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52376" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--75888c38-38e5-42f7-a4b1-30e55bafcc2b.json b/objects/vulnerability/vulnerability--75888c38-38e5-42f7-a4b1-30e55bafcc2b.json new file mode 100644 index 00000000000..1fbe3ce3300 --- /dev/null +++ b/objects/vulnerability/vulnerability--75888c38-38e5-42f7-a4b1-30e55bafcc2b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c406f8b3-b2b7-452a-ac1a-abca7b44bffa", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--75888c38-38e5-42f7-a4b1-30e55bafcc2b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.515614Z", + "modified": "2024-02-19T00:28:08.515614Z", + "name": "CVE-2023-52363", + "description": "Vulnerability of defects introduced in the design process in the Control Panel module.Successful exploitation of this vulnerability may cause app processes to be started by mistake.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52363" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--79ce79ef-1d36-4bbb-b4ea-f3d7408097da.json b/objects/vulnerability/vulnerability--79ce79ef-1d36-4bbb-b4ea-f3d7408097da.json new file mode 100644 index 00000000000..4bb6af85b8f --- /dev/null +++ b/objects/vulnerability/vulnerability--79ce79ef-1d36-4bbb-b4ea-f3d7408097da.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5df1b9cd-ae59-4e15-9fba-eedbc91f4f44", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--79ce79ef-1d36-4bbb-b4ea-f3d7408097da", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.53402Z", + "modified": "2024-02-19T00:28:08.53402Z", + "name": "CVE-2023-52369", + "description": "Stack overflow vulnerability in the NFC module.Successful exploitation of this vulnerability may affect service availability and integrity.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52369" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8715c8bc-1f79-494e-8a65-1aca8a6c8315.json b/objects/vulnerability/vulnerability--8715c8bc-1f79-494e-8a65-1aca8a6c8315.json new file mode 100644 index 00000000000..92cf8710165 --- /dev/null +++ b/objects/vulnerability/vulnerability--8715c8bc-1f79-494e-8a65-1aca8a6c8315.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7e6389ff-7562-422c-9ceb-cebfd827990b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8715c8bc-1f79-494e-8a65-1aca8a6c8315", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.537261Z", + "modified": "2024-02-19T00:28:08.537261Z", + "name": "CVE-2023-52378", + "description": "Vulnerability of incorrect service logic in the WindowManagerServices module.Successful exploitation of this vulnerability may cause features to perform abnormally.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52378" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8c073f4f-44c1-46c0-aec0-04cfb835cf60.json b/objects/vulnerability/vulnerability--8c073f4f-44c1-46c0-aec0-04cfb835cf60.json new file mode 100644 index 00000000000..9f4a145a0f1 --- /dev/null +++ b/objects/vulnerability/vulnerability--8c073f4f-44c1-46c0-aec0-04cfb835cf60.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fe18636a-f6b4-452e-b282-0d6883a38594", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8c073f4f-44c1-46c0-aec0-04cfb835cf60", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.504107Z", + "modified": "2024-02-19T00:28:08.504107Z", + "name": "CVE-2023-52375", + "description": "Permission control vulnerability in the WindowManagerServices module.Successful exploitation of this vulnerability may affect availability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52375" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8c803fde-2fae-4777-b97e-7a7d774cb676.json b/objects/vulnerability/vulnerability--8c803fde-2fae-4777-b97e-7a7d774cb676.json new file mode 100644 index 00000000000..abc28d9d789 --- /dev/null +++ b/objects/vulnerability/vulnerability--8c803fde-2fae-4777-b97e-7a7d774cb676.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1aa30293-42be-4aec-9651-48cd0b63ad3d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8c803fde-2fae-4777-b97e-7a7d774cb676", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.508384Z", + "modified": "2024-02-19T00:28:08.508384Z", + "name": "CVE-2023-52379", + "description": "Permission control vulnerability in the calendarProvider module.Successful exploitation of this vulnerability may affect service confidentiality.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52379" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8f1f5eb0-c099-4697-aa90-6bba2caeb0e6.json b/objects/vulnerability/vulnerability--8f1f5eb0-c099-4697-aa90-6bba2caeb0e6.json new file mode 100644 index 00000000000..b4b1f9bd34c --- /dev/null +++ b/objects/vulnerability/vulnerability--8f1f5eb0-c099-4697-aa90-6bba2caeb0e6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--af1d43c8-d5f5-4f66-b207-fd8a54d7a6d4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8f1f5eb0-c099-4697-aa90-6bba2caeb0e6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.602193Z", + "modified": "2024-02-19T00:28:08.602193Z", + "name": "CVE-2023-5779", + "description": "can: out of bounds in remove_rx_filter function", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-5779" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a3098fd8-d656-4397-9678-f124e4a61b7e.json b/objects/vulnerability/vulnerability--a3098fd8-d656-4397-9678-f124e4a61b7e.json new file mode 100644 index 00000000000..efae8b5365d --- /dev/null +++ b/objects/vulnerability/vulnerability--a3098fd8-d656-4397-9678-f124e4a61b7e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c9303214-ff21-47cf-b150-4d4070256af5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a3098fd8-d656-4397-9678-f124e4a61b7e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.524116Z", + "modified": "2024-02-19T00:28:08.524116Z", + "name": "CVE-2023-52361", + "description": "The VerifiedBoot module has a vulnerability that may cause authentication errors.Successful exploitation of this vulnerability may affect integrity.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52361" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ab8dc0ad-000f-44fb-ade0-25e8310f8c56.json b/objects/vulnerability/vulnerability--ab8dc0ad-000f-44fb-ade0-25e8310f8c56.json new file mode 100644 index 00000000000..7bf42e06372 --- /dev/null +++ b/objects/vulnerability/vulnerability--ab8dc0ad-000f-44fb-ade0-25e8310f8c56.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--25e1419d-3304-4288-90e5-0633a00fe999", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ab8dc0ad-000f-44fb-ade0-25e8310f8c56", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.513562Z", + "modified": "2024-02-19T00:28:08.513562Z", + "name": "CVE-2023-52362", + "description": "Permission management vulnerability in the lock screen module.Successful exploitation of this vulnerability may affect availability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52362" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--cbdcd2de-94b6-4824-951d-3e7aea2bd205.json b/objects/vulnerability/vulnerability--cbdcd2de-94b6-4824-951d-3e7aea2bd205.json new file mode 100644 index 00000000000..281f119b6e0 --- /dev/null +++ b/objects/vulnerability/vulnerability--cbdcd2de-94b6-4824-951d-3e7aea2bd205.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a6dc40f1-35a5-42ca-92a8-429edb11b139", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--cbdcd2de-94b6-4824-951d-3e7aea2bd205", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:09.14155Z", + "modified": "2024-02-19T00:28:09.14155Z", + "name": "CVE-2023-6749", + "description": "Unchecked length coming from user input in settings shell", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-6749" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d078d0d6-a6f2-410a-aced-b65cbc2c13dd.json b/objects/vulnerability/vulnerability--d078d0d6-a6f2-410a-aced-b65cbc2c13dd.json new file mode 100644 index 00000000000..3c5238eaa7a --- /dev/null +++ b/objects/vulnerability/vulnerability--d078d0d6-a6f2-410a-aced-b65cbc2c13dd.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c6f49486-31cf-4cde-9645-96962d67b9d8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d078d0d6-a6f2-410a-aced-b65cbc2c13dd", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.5476Z", + "modified": "2024-02-19T00:28:08.5476Z", + "name": "CVE-2023-52370", + "description": "Stack overflow vulnerability in the network acceleration module.Successful exploitation of this vulnerability may cause unauthorized file access.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52370" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--db8592ad-72ab-480a-b631-9385a577c8b3.json b/objects/vulnerability/vulnerability--db8592ad-72ab-480a-b631-9385a577c8b3.json new file mode 100644 index 00000000000..34a15f7071b --- /dev/null +++ b/objects/vulnerability/vulnerability--db8592ad-72ab-480a-b631-9385a577c8b3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9de9f5b3-3c22-4e66-8d2a-e42695927925", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--db8592ad-72ab-480a-b631-9385a577c8b3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.514564Z", + "modified": "2024-02-19T00:28:08.514564Z", + "name": "CVE-2023-52380", + "description": "Vulnerability of improper access control in the email module.Successful exploitation of this vulnerability may affect service confidentiality.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52380" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f14b65e1-c25c-4e3c-b0ef-48903a5b9921.json b/objects/vulnerability/vulnerability--f14b65e1-c25c-4e3c-b0ef-48903a5b9921.json new file mode 100644 index 00000000000..1e34188e25b --- /dev/null +++ b/objects/vulnerability/vulnerability--f14b65e1-c25c-4e3c-b0ef-48903a5b9921.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--058930e6-275e-4119-a6fe-8d4b342c4d33", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f14b65e1-c25c-4e3c-b0ef-48903a5b9921", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.511552Z", + "modified": "2024-02-19T00:28:08.511552Z", + "name": "CVE-2023-52360", + "description": "Logic vulnerabilities in the baseband.Successful exploitation of this vulnerability may affect service integrity.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52360" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fa9786c6-0c18-4a8b-96cb-16edb2636cfb.json b/objects/vulnerability/vulnerability--fa9786c6-0c18-4a8b-96cb-16edb2636cfb.json new file mode 100644 index 00000000000..484cabd9810 --- /dev/null +++ b/objects/vulnerability/vulnerability--fa9786c6-0c18-4a8b-96cb-16edb2636cfb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c164a5aa-3edd-4d5e-a6c1-ddb097166fa7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fa9786c6-0c18-4a8b-96cb-16edb2636cfb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-02-19T00:28:08.540595Z", + "modified": "2024-02-19T00:28:08.540595Z", + "name": "CVE-2023-52387", + "description": "Resource reuse vulnerability in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52387" + } + ] + } + ] +} \ No newline at end of file