Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-48579 (GCVE-0-2022-48579)
Vulnerability from cvelistv5 – Published: 2023-08-07 00:00 – Updated: 2024-10-17 13:57- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T15:17:55.271Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee"
},
{
"name": "[debian-lts-announce] 20230817 [SECURITY] [DLA 3535-1] unrar-nonfree security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00023.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-48579",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-17T13:56:53.717564Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-17T13:57:07.973Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-17T18:07:31.128Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee"
},
{
"name": "[debian-lts-announce] 20230817 [SECURITY] [DLA 3535-1] unrar-nonfree security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00023.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-48579",
"datePublished": "2023-08-07T00:00:00.000Z",
"dateReserved": "2023-08-07T00:00:00.000Z",
"dateUpdated": "2024-10-17T13:57:07.973Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-48579\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-08-07T04:15:12.073\",\"lastModified\":\"2024-11-21T07:33:32.017\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains.\"},{\"lang\":\"es\",\"value\":\"UnRAR en las versiones anteriores a la 6.2.3 permite la extracci\u00f3n de archivos fuera de la carpeta de destino mediante cadenas de enlaces simb\u00f3licos. \"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-59\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rarlab:unrar:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.2.3\",\"matchCriteriaId\":\"057E9885-5E94-4549-945B-33045A3FAAB8\"}]}]}],\"references\":[{\"url\":\"https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/08/msg00023.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/08/msg00023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/08/msg00023.html\", \"name\": \"[debian-lts-announce] 20230817 [SECURITY] [DLA 3535-1] unrar-nonfree security update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T15:17:55.271Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-48579\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-17T13:56:53.717564Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-17T13:56:59.366Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/08/msg00023.html\", \"name\": \"[debian-lts-announce] 20230817 [SECURITY] [DLA 3535-1] unrar-nonfree security update\", \"tags\": [\"mailing-list\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-08-17T18:07:31.128Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-48579\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-17T13:57:07.973Z\", \"dateReserved\": \"2023-08-07T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-08-07T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GSD-2022-48579
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-48579",
"id": "GSD-2022-48579"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-48579"
],
"details": "UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains.",
"id": "GSD-2022-48579",
"modified": "2023-12-13T01:19:26.080902Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-48579",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee",
"refsource": "MISC",
"url": "https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee"
},
{
"name": "[debian-lts-announce] 20230817 [SECURITY] [DLA 3535-1] unrar-nonfree security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00023.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rarlab:unrar:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.2.3",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-48579"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee",
"refsource": "MISC",
"tags": [
"Patch"
],
"url": "https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee"
},
{
"name": "[debian-lts-announce] 20230817 [SECURITY] [DLA 3535-1] unrar-nonfree security update",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00023.html"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-08-17T19:15Z",
"publishedDate": "2023-08-07T04:15Z"
}
}
}
cleanstart-2026-tc95380
Vulnerability from cleanstart
Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "clamav"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-TC95380",
"modified": "2026-02-03T13:35:45Z",
"published": "2026-02-06T01:06:01.062694Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-TC95380.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20328"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20328"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device",
"upstream": [
"CVE-2017-11423",
"CVE-2017-12374",
"CVE-2017-12375",
"CVE-2017-12376",
"CVE-2017-12377",
"CVE-2017-12378",
"CVE-2017-12379",
"CVE-2017-12380",
"CVE-2017-16932",
"CVE-2017-6419",
"CVE-2018-0202",
"CVE-2018-0360",
"CVE-2018-0361",
"CVE-2018-1000085",
"CVE-2018-14680",
"CVE-2018-14681",
"CVE-2018-14682",
"CVE-2019-12625",
"CVE-2019-15961",
"CVE-2019-1787",
"CVE-2019-1788",
"CVE-2019-1789",
"CVE-2020-3123",
"CVE-2020-3327",
"CVE-2020-3341",
"CVE-2020-3350",
"CVE-2020-3481",
"CVE-2021-1252",
"CVE-2021-1404",
"CVE-2021-1405",
"CVE-2022-20698",
"CVE-2022-48579",
"CVE-2023-20052",
"CVE-2023-20197",
"CVE-2024-20290",
"CVE-2024-20328"
]
}
cleanstart-2026-la13761
Vulnerability from cleanstart
Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "clamav"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-LA13761",
"modified": "2026-01-29T18:58:54Z",
"published": "2026-01-30T14:05:50.594365Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-LA13761.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20328"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20328"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device",
"upstream": [
"CVE-2017-11423",
"CVE-2017-12374",
"CVE-2017-12375",
"CVE-2017-12376",
"CVE-2017-12377",
"CVE-2017-12378",
"CVE-2017-12379",
"CVE-2017-12380",
"CVE-2017-16932",
"CVE-2017-6419",
"CVE-2018-0202",
"CVE-2018-0360",
"CVE-2018-0361",
"CVE-2018-1000085",
"CVE-2018-14680",
"CVE-2018-14681",
"CVE-2018-14682",
"CVE-2019-12625",
"CVE-2019-15961",
"CVE-2019-1787",
"CVE-2019-1788",
"CVE-2019-1789",
"CVE-2020-3123",
"CVE-2020-3327",
"CVE-2020-3341",
"CVE-2020-3350",
"CVE-2020-3481",
"CVE-2021-1252",
"CVE-2021-1404",
"CVE-2021-1405",
"CVE-2022-20698",
"CVE-2022-48579",
"CVE-2023-20052",
"CVE-2023-20197",
"CVE-2024-20290",
"CVE-2024-20328"
]
}
cleanstart-2026-nj87139
Vulnerability from cleanstart
Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "clamav"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-NJ87139",
"modified": "2026-01-29T18:58:54Z",
"published": "2026-01-30T14:17:21.473350Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-NJ87139.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20328"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20328"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device",
"upstream": [
"CVE-2017-11423",
"CVE-2017-12374",
"CVE-2017-12375",
"CVE-2017-12376",
"CVE-2017-12377",
"CVE-2017-12378",
"CVE-2017-12379",
"CVE-2017-12380",
"CVE-2017-16932",
"CVE-2017-6419",
"CVE-2018-0202",
"CVE-2018-0360",
"CVE-2018-0361",
"CVE-2018-1000085",
"CVE-2018-14680",
"CVE-2018-14681",
"CVE-2018-14682",
"CVE-2019-12625",
"CVE-2019-15961",
"CVE-2019-1787",
"CVE-2019-1788",
"CVE-2019-1789",
"CVE-2020-3123",
"CVE-2020-3327",
"CVE-2020-3341",
"CVE-2020-3350",
"CVE-2020-3481",
"CVE-2021-1252",
"CVE-2021-1404",
"CVE-2021-1405",
"CVE-2022-20698",
"CVE-2022-48579",
"CVE-2023-20052",
"CVE-2023-20197",
"CVE-2024-20290",
"CVE-2024-20328"
]
}
cleanstart-2026-wx01708
Vulnerability from cleanstart
Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "clamav"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-WX01708",
"modified": "2026-02-03T13:35:45Z",
"published": "2026-02-06T01:10:02.024980Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-WX01708.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20328"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20328"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device",
"upstream": [
"CVE-2017-11423",
"CVE-2017-12374",
"CVE-2017-12375",
"CVE-2017-12376",
"CVE-2017-12377",
"CVE-2017-12378",
"CVE-2017-12379",
"CVE-2017-12380",
"CVE-2017-16932",
"CVE-2017-6419",
"CVE-2018-0202",
"CVE-2018-0360",
"CVE-2018-0361",
"CVE-2018-1000085",
"CVE-2018-14680",
"CVE-2018-14681",
"CVE-2018-14682",
"CVE-2019-12625",
"CVE-2019-15961",
"CVE-2019-1787",
"CVE-2019-1788",
"CVE-2019-1789",
"CVE-2020-3123",
"CVE-2020-3327",
"CVE-2020-3341",
"CVE-2020-3350",
"CVE-2020-3481",
"CVE-2021-1252",
"CVE-2021-1404",
"CVE-2021-1405",
"CVE-2022-20698",
"CVE-2022-48579",
"CVE-2023-20052",
"CVE-2023-20197",
"CVE-2024-20290",
"CVE-2024-20328"
]
}
MSRC_CVE-2022-48579
Vulnerability from csaf_microsoft - Published: 2023-08-01 00:00 - Updated: 2024-06-30 07:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48579 UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2022-48579.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains.",
"tracking": {
"current_release_date": "2024-06-30T07:00:00.000Z",
"generator": {
"date": "2025-12-27T16:47:54.946Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2022-48579",
"initial_release_date": "2023-08-01T00:00:00.000Z",
"revision_history": [
{
"date": "2023-08-14T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-06-30T07:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 clamav 0.105.2-4",
"product": {
"name": "\u003cazl3 clamav 0.105.2-4",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 clamav 0.105.2-4",
"product": {
"name": "azl3 clamav 0.105.2-4",
"product_id": "18845"
}
}
],
"category": "product_name",
"name": "clamav"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 clamav 0.105.2-4 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 clamav 0.105.2-4 as a component of Azure Linux 3.0",
"product_id": "18845-17084"
},
"product_reference": "18845",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-48579",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"18845-17084"
],
"known_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48579 UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2022-48579.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2023-08-14T00:00:00.000Z",
"details": "0.105.2-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"17084-1"
]
}
],
"title": "UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains."
}
]
}
GHSA-PG3X-QPQ9-P4V6
Vulnerability from github – Published: 2023-08-07 06:30 – Updated: 2024-04-04 06:34UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains.
{
"affected": [],
"aliases": [
"CVE-2022-48579"
],
"database_specific": {
"cwe_ids": [
"CWE-59"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-08-07T04:15:12Z",
"severity": "HIGH"
},
"details": "UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains.",
"id": "GHSA-pg3x-qpq9-p4v6",
"modified": "2024-04-04T06:34:40Z",
"published": "2023-08-07T06:30:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00023.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2024-0899
Vulnerability from csaf_certbund - Published: 2024-04-16 22:00 - Updated: 2025-06-09 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Oracle Fusion Middleware b\u00fcndelt mehrere Produkte zur Erstellung, Betrieb und Management von intelligenten Business Anwendungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Fusion Middleware ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0899 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0899.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0899 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0899"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - April 2024 - Appendix Oracle Fusion Middleware vom 2024-04-16",
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html#AppendixFMW"
},
{
"category": "external",
"summary": "PoC CVE-2024-21006 vom 2025-06-09",
"url": "https://github.com/d3fudd/CVE-2024-21006_POC"
}
],
"source_lang": "en-US",
"title": "Oracle Fusion Middleware: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-09T22:00:00.000+00:00",
"generator": {
"date": "2025-06-10T06:12:15.168+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2024-0899",
"initial_release_date": "2024-04-16T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-16T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "2",
"summary": "PoC f\u00fcr CVE-2024-21006 aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "12.2.1.3.0",
"product": {
"name": "Oracle Fusion Middleware 12.2.1.3.0",
"product_id": "618028",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:fusion_middleware:12.2.1.3.0"
}
}
},
{
"category": "product_version",
"name": "12.2.1.4.0",
"product": {
"name": "Oracle Fusion Middleware 12.2.1.4.0",
"product_id": "751674",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:fusion_middleware:12.2.1.4.0"
}
}
},
{
"category": "product_version",
"name": "14.1.1.0.0",
"product": {
"name": "Oracle Fusion Middleware 14.1.1.0.0",
"product_id": "829576",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:fusion_middleware:14.1.1.0.0"
}
}
},
{
"category": "product_version",
"name": "8.5.6",
"product": {
"name": "Oracle Fusion Middleware 8.5.6",
"product_id": "T024993",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:fusion_middleware:8.5.6"
}
}
},
{
"category": "product_version",
"name": "8.5.7",
"product": {
"name": "Oracle Fusion Middleware 8.5.7",
"product_id": "T034057",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:fusion_middleware:8.5.7"
}
}
}
],
"category": "product_name",
"name": "Fusion Middleware"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-0231",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2019-0231"
},
{
"cve": "CVE-2019-10172",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2019-10172"
},
{
"cve": "CVE-2019-13990",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2019-13990"
},
{
"cve": "CVE-2021-23369",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2021-23369"
},
{
"cve": "CVE-2022-1471",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-24329",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2022-24329"
},
{
"cve": "CVE-2022-25147",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-34169",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-34381",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2022-34381"
},
{
"cve": "CVE-2022-42003",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2022-42003"
},
{
"cve": "CVE-2022-45378",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2022-45378"
},
{
"cve": "CVE-2022-46337",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2022-46337"
},
{
"cve": "CVE-2022-48579",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2022-48579"
},
{
"cve": "CVE-2023-24021",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2023-24021"
},
{
"cve": "CVE-2023-2976",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-31122",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2023-31122"
},
{
"cve": "CVE-2023-33201",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2023-33201"
},
{
"cve": "CVE-2023-35116",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2023-35116"
},
{
"cve": "CVE-2023-35887",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2023-35887"
},
{
"cve": "CVE-2023-3635",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2023-3635"
},
{
"cve": "CVE-2023-37536",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2023-37536"
},
{
"cve": "CVE-2023-44487",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-46218",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46589",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2023-46589"
},
{
"cve": "CVE-2023-48795",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-5072",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2023-5072"
},
{
"cve": "CVE-2023-52428",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2023-52428"
},
{
"cve": "CVE-2024-1597",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2024-1597"
},
{
"cve": "CVE-2024-20991",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2024-20991"
},
{
"cve": "CVE-2024-20992",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2024-20992"
},
{
"cve": "CVE-2024-21006",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2024-21006"
},
{
"cve": "CVE-2024-21007",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2024-21007"
},
{
"cve": "CVE-2024-21117",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2024-21117"
},
{
"cve": "CVE-2024-21118",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2024-21118"
},
{
"cve": "CVE-2024-21119",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2024-21119"
},
{
"cve": "CVE-2024-21120",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2024-21120"
},
{
"cve": "CVE-2024-23635",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2024-23635"
},
{
"cve": "CVE-2024-26308",
"product_status": {
"known_affected": [
"T024993",
"618028",
"751674",
"T034057",
"829576"
]
},
"release_date": "2024-04-16T22:00:00.000+00:00",
"title": "CVE-2024-26308"
}
]
}
FKIE_CVE-2022-48579
Vulnerability from fkie_nvd - Published: 2023-08-07 04:15 - Updated: 2024-11-21 07:33{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rarlab:unrar:*:*:*:*:*:*:*:*",
"matchCriteriaId": "057E9885-5E94-4549-945B-33045A3FAAB8",
"versionEndExcluding": "6.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains."
},
{
"lang": "es",
"value": "UnRAR en las versiones anteriores a la 6.2.3 permite la extracci\u00f3n de archivos fuera de la carpeta de destino mediante cadenas de enlaces simb\u00f3licos. "
}
],
"id": "CVE-2022-48579",
"lastModified": "2024-11-21T07:33:32.017",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-07T04:15:12.073",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee"
},
{
"source": "cve@mitre.org",
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00023.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00023.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-59"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.