Skip to content

Commit 429b016

Browse files
Advisory Database Sync
1 parent 55b2653 commit 429b016

File tree

73 files changed

+823
-148
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

73 files changed

+823
-148
lines changed

advisories/unreviewed/2022/09/GHSA-2xm8-8q96-qxhc/GHSA-2xm8-8q96-qxhc.json

+9-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2xm8-8q96-qxhc",
4-
"modified": "2022-09-18T00:00:30Z",
4+
"modified": "2025-01-07T21:30:53Z",
55
"published": "2022-09-16T00:00:38Z",
66
"aliases": [
77
"CVE-2022-40660"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40660"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/index.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/pdf/Vulnerabilities_on_NIS-Elements_Freeware_and_L_en_240917_02.pdf"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1216"

advisories/unreviewed/2022/09/GHSA-5jhv-q32v-v4q2/GHSA-5jhv-q32v-v4q2.json

+9-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5jhv-q32v-v4q2",
4-
"modified": "2022-09-18T00:00:30Z",
4+
"modified": "2025-01-07T21:30:53Z",
55
"published": "2022-09-16T00:00:38Z",
66
"aliases": [
77
"CVE-2022-40659"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40659"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/index.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/pdf/Vulnerabilities_on_NIS-Elements_Freeware_and_L_en_240917_02.pdf"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1215"

advisories/unreviewed/2022/09/GHSA-c2gj-fphg-qv3q/GHSA-c2gj-fphg-qv3q.json

+9-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c2gj-fphg-qv3q",
4-
"modified": "2022-09-18T00:00:31Z",
4+
"modified": "2025-01-07T21:30:53Z",
55
"published": "2022-09-16T00:00:38Z",
66
"aliases": [
77
"CVE-2022-40658"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40658"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/index.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/pdf/Vulnerabilities_on_NIS-Elements_Freeware_and_L_en_240917_02.pdf"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1214"

advisories/unreviewed/2022/09/GHSA-g2pv-jwfp-hm99/GHSA-g2pv-jwfp-hm99.json

+9-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g2pv-jwfp-hm99",
4-
"modified": "2022-09-18T00:00:31Z",
4+
"modified": "2025-01-07T21:30:53Z",
55
"published": "2022-09-16T00:00:38Z",
66
"aliases": [
77
"CVE-2022-40657"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40657"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/index.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/pdf/Vulnerabilities_on_NIS-Elements_Freeware_and_L_en_240917_02.pdf"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1213"

advisories/unreviewed/2022/09/GHSA-jj96-j367-3jx7/GHSA-jj96-j367-3jx7.json

+9-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jj96-j367-3jx7",
4-
"modified": "2022-09-18T00:00:31Z",
4+
"modified": "2025-01-07T21:30:53Z",
55
"published": "2022-09-16T00:00:38Z",
66
"aliases": [
77
"CVE-2022-40661"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40661"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/index.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/pdf/Vulnerabilities_on_NIS-Elements_Freeware_and_L_en_240917_02.pdf"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1217"

advisories/unreviewed/2022/09/GHSA-ppmm-vg73-p2w2/GHSA-ppmm-vg73-p2w2.json

+10-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-ppmm-vg73-p2w2",
4-
"modified": "2022-09-18T00:00:31Z",
4+
"modified": "2025-01-07T21:30:52Z",
55
"published": "2022-09-16T00:00:38Z",
66
"aliases": [
77
"CVE-2022-40655"
@@ -19,13 +19,22 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40655"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/index.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/pdf/Vulnerabilities_on_NIS-Elements_Freeware_and_L_en_240917_02.pdf"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1211"
2533
}
2634
],
2735
"database_specific": {
2836
"cwe_ids": [
37+
"CWE-122",
2938
"CWE-787"
3039
],
3140
"severity": "HIGH",

advisories/unreviewed/2022/09/GHSA-pq38-mrwr-77j3/GHSA-pq38-mrwr-77j3.json

+9-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pq38-mrwr-77j3",
4-
"modified": "2022-09-18T00:00:31Z",
4+
"modified": "2025-01-07T21:30:52Z",
55
"published": "2022-09-16T00:00:37Z",
66
"aliases": [
77
"CVE-2022-40656"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40656"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/index.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/pdf/Vulnerabilities_on_NIS-Elements_Freeware_and_L_en_240917_02.pdf"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1212"

advisories/unreviewed/2022/09/GHSA-q3jf-w4ph-7r73/GHSA-q3jf-w4ph-7r73.json

+9-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q3jf-w4ph-7r73",
4-
"modified": "2022-09-18T00:00:31Z",
4+
"modified": "2025-01-07T21:30:53Z",
55
"published": "2022-09-16T00:00:38Z",
66
"aliases": [
77
"CVE-2022-40662"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40662"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/index.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/pdf/Vulnerabilities_on_NIS-Elements_Freeware_and_L_en_240917_02.pdf"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1218"

advisories/unreviewed/2022/09/GHSA-wjh5-2jj8-8xpj/GHSA-wjh5-2jj8-8xpj.json

+9-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wjh5-2jj8-8xpj",
4-
"modified": "2022-09-18T00:00:31Z",
4+
"modified": "2025-01-07T21:30:53Z",
55
"published": "2022-09-16T00:00:38Z",
66
"aliases": [
77
"CVE-2022-40663"
@@ -19,6 +19,14 @@
1919
"type": "ADVISORY",
2020
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40663"
2121
},
22+
{
23+
"type": "WEB",
24+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/index.html"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.software-dl.microscope.healthcare.nikon.com/vuln/pdf/Vulnerabilities_on_NIS-Elements_Freeware_and_L_en_240917_02.pdf"
29+
},
2230
{
2331
"type": "WEB",
2432
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1219"

advisories/unreviewed/2023/06/GHSA-5gqw-x43v-hg43/GHSA-5gqw-x43v-hg43.json

+1
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29+
"CWE-770",
2930
"CWE-862"
3031
],
3132
"severity": "MODERATE",

advisories/unreviewed/2023/06/GHSA-6pxx-9rr9-j7h4/GHSA-6pxx-9rr9-j7h4.json

+1
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29+
"CWE-476",
2930
"CWE-862"
3031
],
3132
"severity": "MODERATE",

advisories/unreviewed/2023/06/GHSA-77vj-9qxr-p2qf/GHSA-77vj-9qxr-p2qf.json

+1
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29+
"CWE-476",
2930
"CWE-862"
3031
],
3132
"severity": "MODERATE",

advisories/unreviewed/2023/06/GHSA-g23p-v3rc-vq74/GHSA-g23p-v3rc-vq74.json

+1
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29+
"CWE-120",
2930
"CWE-787"
3031
],
3132
"severity": "MODERATE",

advisories/unreviewed/2023/06/GHSA-hr98-7gw3-84v4/GHSA-hr98-7gw3-84v4.json

+1
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29+
"CWE-476",
2930
"CWE-862"
3031
],
3132
"severity": "MODERATE",

advisories/unreviewed/2023/06/GHSA-m786-rxff-x32m/GHSA-m786-rxff-x32m.json

+1
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29+
"CWE-476",
2930
"CWE-862"
3031
],
3132
"severity": "MODERATE",

advisories/unreviewed/2023/06/GHSA-pg3q-6wmp-whpx/GHSA-pg3q-6wmp-whpx.json

+1
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@
2626
],
2727
"database_specific": {
2828
"cwe_ids": [
29+
"CWE-770",
2930
"CWE-862"
3031
],
3132
"severity": "MODERATE",

advisories/unreviewed/2023/11/GHSA-g78x-643m-9qmf/GHSA-g78x-643m-9qmf.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@
2525
}
2626
],
2727
"database_specific": {
28-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-276"
30+
],
2931
"severity": "HIGH",
3032
"github_reviewed": false,
3133
"github_reviewed_at": null,

advisories/unreviewed/2023/11/GHSA-hrgc-qp5r-xq3p/GHSA-hrgc-qp5r-xq3p.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,9 @@
2929
}
3030
],
3131
"database_specific": {
32-
"cwe_ids": [],
32+
"cwe_ids": [
33+
"CWE-770"
34+
],
3335
"severity": "HIGH",
3436
"github_reviewed": false,
3537
"github_reviewed_at": null,

advisories/unreviewed/2023/11/GHSA-jc2w-6rjp-h443/GHSA-jc2w-6rjp-h443.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@
2525
}
2626
],
2727
"database_specific": {
28-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-276"
30+
],
2931
"severity": "HIGH",
3032
"github_reviewed": false,
3133
"github_reviewed_at": null,

advisories/unreviewed/2024/03/GHSA-48ww-vppq-9c8v/GHSA-48ww-vppq-9c8v.json

+11-4
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-48ww-vppq-9c8v",
4-
"modified": "2024-03-04T21:31:11Z",
4+
"modified": "2025-01-07T21:30:54Z",
55
"published": "2024-03-04T21:31:11Z",
66
"aliases": [
77
"CVE-2021-47108"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf\n\nIn commit 41ca9caaae0b\n(\"drm/mediatek: hdmi: Add check for CEA modes only\") a check\nfor CEA modes was added to function mtk_hdmi_bridge_mode_valid()\nin order to address possible issues on MT8167;\nmoreover, with commit c91026a938c2\n(\"drm/mediatek: hdmi: Add optional limit on maximal HDMI mode clock\")\nanother similar check was introduced.\n\nUnfortunately though, at the time of writing, MT8173 does not provide\nany mtk_hdmi_conf structure and this is crashing the kernel with NULL\npointer upon entering mtk_hdmi_bridge_mode_valid(), which happens as\nsoon as a HDMI cable gets plugged in.\n\nTo fix this regression, add a NULL pointer check for hdmi->conf in the\nsaid function, restoring HDMI functionality and avoiding NULL pointer\nkernel panics.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -24,8 +29,10 @@
2429
}
2530
],
2631
"database_specific": {
27-
"cwe_ids": [],
28-
"severity": null,
32+
"cwe_ids": [
33+
"CWE-476"
34+
],
35+
"severity": "MODERATE",
2936
"github_reviewed": false,
3037
"github_reviewed_at": null,
3138
"nvd_published_at": "2024-03-04T19:15:18Z"

advisories/unreviewed/2024/03/GHSA-9rrq-f95g-4wmq/GHSA-9rrq-f95g-4wmq.json

+11-4
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9rrq-f95g-4wmq",
4-
"modified": "2024-06-27T15:30:38Z",
4+
"modified": "2025-01-07T21:30:54Z",
55
"published": "2024-03-06T09:30:29Z",
66
"aliases": [
77
"CVE-2024-26625"
88
],
99
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: call sock_orphan() at release time\n\nsyzbot reported an interesting trace [1] caused by a stale sk->sk_wq\npointer in a closed llc socket.\n\nIn commit ff7b11aa481f (\"net: socket: set sock->sk to NULL after\ncalling proto_ops::release()\") Eric Biggers hinted that some protocols\nare missing a sock_orphan(), we need to perform a full audit.\n\nIn net-next, I plan to clear sock->sk from sock_orphan() and\namend Eric patch to add a warning.\n\n[1]\n BUG: KASAN: slab-use-after-free in list_empty include/linux/list.h:373 [inline]\n BUG: KASAN: slab-use-after-free in waitqueue_active include/linux/wait.h:127 [inline]\n BUG: KASAN: slab-use-after-free in sock_def_write_space_wfree net/core/sock.c:3384 [inline]\n BUG: KASAN: slab-use-after-free in sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468\nRead of size 8 at addr ffff88802f4fc880 by task ksoftirqd/1/27\n\nCPU: 1 PID: 27 Comm: ksoftirqd/1 Not tainted 6.8.0-rc1-syzkaller-00049-g6098d87eaf31 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0xc4/0x620 mm/kasan/report.c:488\n kasan_report+0xda/0x110 mm/kasan/report.c:601\n list_empty include/linux/list.h:373 [inline]\n waitqueue_active include/linux/wait.h:127 [inline]\n sock_def_write_space_wfree net/core/sock.c:3384 [inline]\n sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468\n skb_release_head_state+0xa3/0x2b0 net/core/skbuff.c:1080\n skb_release_all net/core/skbuff.c:1092 [inline]\n napi_consume_skb+0x119/0x2b0 net/core/skbuff.c:1404\n e1000_unmap_and_free_tx_resource+0x144/0x200 drivers/net/ethernet/intel/e1000/e1000_main.c:1970\n e1000_clean_tx_irq drivers/net/ethernet/intel/e1000/e1000_main.c:3860 [inline]\n e1000_clean+0x4a1/0x26e0 drivers/net/ethernet/intel/e1000/e1000_main.c:3801\n __napi_poll.constprop.0+0xb4/0x540 net/core/dev.c:6576\n napi_poll net/core/dev.c:6645 [inline]\n net_rx_action+0x956/0xe90 net/core/dev.c:6778\n __do_softirq+0x21a/0x8de kernel/softirq.c:553\n run_ksoftirqd kernel/softirq.c:921 [inline]\n run_ksoftirqd+0x31/0x60 kernel/softirq.c:913\n smpboot_thread_fn+0x660/0xa10 kernel/smpboot.c:164\n kthread+0x2c6/0x3a0 kernel/kthread.c:388\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242\n </TASK>\n\nAllocated by task 5167:\n kasan_save_stack+0x33/0x50 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n unpoison_slab_object mm/kasan/common.c:314 [inline]\n __kasan_slab_alloc+0x81/0x90 mm/kasan/common.c:340\n kasan_slab_alloc include/linux/kasan.h:201 [inline]\n slab_post_alloc_hook mm/slub.c:3813 [inline]\n slab_alloc_node mm/slub.c:3860 [inline]\n kmem_cache_alloc_lru+0x142/0x6f0 mm/slub.c:3879\n alloc_inode_sb include/linux/fs.h:3019 [inline]\n sock_alloc_inode+0x25/0x1c0 net/socket.c:308\n alloc_inode+0x5d/0x220 fs/inode.c:260\n new_inode_pseudo+0x16/0x80 fs/inode.c:1005\n sock_alloc+0x40/0x270 net/socket.c:634\n __sock_create+0xbc/0x800 net/socket.c:1535\n sock_create net/socket.c:1622 [inline]\n __sys_socket_create net/socket.c:1659 [inline]\n __sys_socket+0x14c/0x260 net/socket.c:1706\n __do_sys_socket net/socket.c:1720 [inline]\n __se_sys_socket net/socket.c:1718 [inline]\n __x64_sys_socket+0x72/0xb0 net/socket.c:1718\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd3/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFreed by task 0:\n kasan_save_stack+0x33/0x50 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640\n poison_slab_object mm/kasan/common.c:241 [inline]\n __kasan_slab_free+0x121/0x1b0 mm/kasan/common.c:257\n kasan_slab_free include/linux/kasan.h:184 [inline]\n slab_free_hook mm/slub.c:2121 [inlin\n---truncated---",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -56,8 +61,10 @@
5661
}
5762
],
5863
"database_specific": {
59-
"cwe_ids": [],
60-
"severity": null,
64+
"cwe_ids": [
65+
"CWE-416"
66+
],
67+
"severity": "HIGH",
6168
"github_reviewed": false,
6269
"github_reviewed_at": null,
6370
"nvd_published_at": "2024-03-06T07:15:12Z"

0 commit comments

Comments
 (0)