461 lines
22 KiB
JSON
461 lines
22 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20162512",
|
||
"Version": "oval:org.altlinux.errata:def:20162512",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2016-2512: package `phpipam` update to version 1.26.050-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2016-2512",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-2512",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2015-12236",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2015-12236",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03200",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03200",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03201",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03201",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03202",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03202",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03203",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03203",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03204",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03204",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01781",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01781",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2015-8476",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8476",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10033",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10033",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10045",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10045",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-15640",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15640",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-1000860",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000860",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-1000870",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000870",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-1000010",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-1000010",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-16692",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16692",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-16693",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16693",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-16694",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16694",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-16695",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16695",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-16696",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16696",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1223",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1223",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1224",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1224",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1225",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1225",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3845",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3845",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0676",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0676",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0677",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0677",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0678",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0678",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1211",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1211",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1212",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1212",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades phpipam to version 1.26.050-alt1. \nSecurity Fix(es):\n\n * BDU:2015-12236: Уязвимости операционной системы Debian GNU/Linux, позволяющие нарушителю внедрить произвольные SMTP-команды\n\n * BDU:2021-03200: Уязвимость компонента app/admin/custom-fields/edit.php веб-приложения для управления IP-адресами phpipam, позволяющая нарушителю выполнить произвольные SQL-запросы\n\n * BDU:2021-03201: Уязвимость компонента app/admin/custom-fields/filter-result.php веб-приложения для управления IP-адресами phpipam, позволяющая нарушителю выполнить произвольные SQL-запросы\n\n * BDU:2021-03202: Уязвимость компонента app/admin/custom-fields/order.php веб-приложения для управления IP-адресами phpipam, позволяющая нарушителю выполнить произвольные SQL-запросы\n\n * BDU:2021-03203: Уязвимость компонента app/admin/custom-fields/edit-result.php веб-приложения для управления IP-адресами phpipam, позволяющая нарушителю выполнить произвольные SQL-запросы\n\n * BDU:2021-03204: Уязвимость компонента app/admin/custom-fields/filter.php веб-приложения для управления IP-адресами phpipam, позволяющая нарушителю выполнить произвольные SQL-запросы\n\n * BDU:2023-01781: Уязвимость сценария app/admin/custom-fields/edit-result.php веб-приложения для управления IP-адресами phpipam, позволяющая нарушителю выполнить произвольные SQL-команды\n\n * CVE-2015-8476: Multiple CRLF injection vulnerabilities in PHPMailer before 5.2.14 allow attackers to inject arbitrary SMTP commands via CRLF sequences in an (1) email address to the validateAddress function in class.phpmailer.php or (2) SMTP command to the sendCommand function in class.smtp.php, a different vulnerability than CVE-2012-0796.\n\n * CVE-2016-10033: The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \\\" (backslash double quote) in a crafted Sender property.\n\n * CVE-2016-10045: The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.\n\n * CVE-2017-15640: app/sections/user-menu.php in phpIPAM before 1.3.1 has XSS via the ip parameter.\n\n * CVE-2018-1000860: phpipam version 1.3.2 and earlier contains a Cross Site Scripting (XSS) vulnerability in The value of the phpipamredirect cookie is copied into an HTML tag on the login page encapsulated in single quotes. Editing the value of the cookie to r5zkh'\u003e\u003cscript\u003ealert(1)\u003c/script\u003equqtl exploits an XSS vulnerability. that can result in Arbitrary code executes in victims browser.. This attack appear to be exploitable via Needs to be chained with another exploit that allows an attacker to set or modify a cookie for the phpIPAM instance's domain..\n\n * CVE-2018-1000870: PHPipam version 1.3.2 and earlier contains a CWE-79 vulnerability in /app/admin/users/print-user.php that can result in Execute code in the victims browser. This attack appear to be exploitable via Attacker change theme parameter in user settings. Admin(Victim) views user in admin-panel and gets exploited.. This vulnerability appears to have been fixed in 1.4.\n\n * CVE-2019-1000010: phpIPAM version 1.3.2 and earlier contains a Cross Site Scripting (XSS) vulnerability in subnet-scan-telnet.php that can result in executing code in victims browser. This attack appears to be exploitable via victim visits link crafted by an attacker. This vulnerability appears to have been fixed in 1.4.\n\n * CVE-2019-16692: phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/filter-result.php table parameter when action=add is used.\n\n * CVE-2019-16693: phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/order.php table parameter when action=add is used.\n\n * CVE-2019-16694: phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/edit-result.php table parameter when action=add is used.\n\n * CVE-2019-16695: phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/filter.php table parameter when action=add is used.\n\n * CVE-2019-16696: phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/edit.php table parameter when action=add is used.\n\n * CVE-2022-1223: Incorrect Authorization in GitHub repository phpipam/phpipam prior to 1.4.6.\n\n\n\n * CVE-2022-1224: Improper Authorization in GitHub repository phpipam/phpipam prior to 1.4.6.\n\n * CVE-2022-1225: Incorrect Privilege Assignment in GitHub repository phpipam/phpipam prior to 1.4.6.\n\n * CVE-2022-3845: A vulnerability has been found in phpipam and classified as problematic. Affected by this vulnerability is an unknown functionality of the file app/admin/import-export/import-load-data.php of the component Import Preview Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 22c797c3583001211fe7d31bccd3f1d4aeeb3bbc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-212863.\n\n * CVE-2023-0676: Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to 1.5.1.\n\n * CVE-2023-0677: Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to v1.5.1.\n\n * CVE-2023-0678: Missing Authorization in GitHub repository phpipam/phpipam prior to v1.5.1.\n\n * CVE-2023-1211: SQL Injection in GitHub repository phpipam/phpipam prior to v1.5.2.\n\n * CVE-2023-1212: Cross-site Scripting (XSS) - Stored in GitHub repository phpipam/phpipam prior to v1.5.2.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2016-12-29"
|
||
},
|
||
"Updated": {
|
||
"Date": "2016-12-29"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2015-12236",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-93",
|
||
"Href": "https://bdu.fstec.ru/vul/2015-12236",
|
||
"Impact": "Low",
|
||
"Public": "20151213"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03200",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03200",
|
||
"Impact": "Critical",
|
||
"Public": "20190922"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03201",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03201",
|
||
"Impact": "Critical",
|
||
"Public": "20190922"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03202",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03202",
|
||
"Impact": "Critical",
|
||
"Public": "20190922"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03203",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03203",
|
||
"Impact": "Critical",
|
||
"Public": "20190922"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03204",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03204",
|
||
"Impact": "Critical",
|
||
"Public": "20190922"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01781",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01781",
|
||
"Impact": "High",
|
||
"Public": "20230210"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2015-8476",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8476",
|
||
"Impact": "Low",
|
||
"Public": "20151216"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10033",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-88",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10033",
|
||
"Impact": "Critical",
|
||
"Public": "20161230"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10045",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-77",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10045",
|
||
"Impact": "Critical",
|
||
"Public": "20161230"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-15640",
|
||
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15640",
|
||
"Impact": "Low",
|
||
"Public": "20180421"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-1000860",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000860",
|
||
"Impact": "Low",
|
||
"Public": "20181220"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-1000870",
|
||
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000870",
|
||
"Impact": "Low",
|
||
"Public": "20181220"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-1000010",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-1000010",
|
||
"Impact": "Low",
|
||
"Public": "20190204"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-16692",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16692",
|
||
"Impact": "Critical",
|
||
"Public": "20190922"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-16693",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16693",
|
||
"Impact": "Critical",
|
||
"Public": "20190922"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-16694",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16694",
|
||
"Impact": "Critical",
|
||
"Public": "20190922"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-16695",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16695",
|
||
"Impact": "Critical",
|
||
"Public": "20190922"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-16696",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16696",
|
||
"Impact": "Critical",
|
||
"Public": "20190922"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1223",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1223",
|
||
"Impact": "Low",
|
||
"Public": "20220404"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1224",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1224",
|
||
"Impact": "Low",
|
||
"Public": "20220404"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1225",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-266",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1225",
|
||
"Impact": "Low",
|
||
"Public": "20220404"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3845",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3845",
|
||
"Impact": "Low",
|
||
"Public": "20221102"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0676",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0676",
|
||
"Impact": "Low",
|
||
"Public": "20230204"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0677",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0677",
|
||
"Impact": "Low",
|
||
"Public": "20230204"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0678",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-862",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0678",
|
||
"Impact": "Low",
|
||
"Public": "20230204"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1211",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1211",
|
||
"Impact": "High",
|
||
"Public": "20230307"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1212",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1212",
|
||
"Impact": "Low",
|
||
"Public": "20230307"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20162512001",
|
||
"Comment": "phpipam is earlier than 0:1.26.050-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20162512002",
|
||
"Comment": "phpipam-apache2 is earlier than 0:1.26.050-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |