Skip to content

Commit

Permalink
Publish Advisories
Browse files Browse the repository at this point in the history
  • Loading branch information
advisory-database[bot] committed Feb 23, 2023
1 parent a4d017d commit 6e5f741
Show file tree
Hide file tree
Showing 2 changed files with 70 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"schema_version": "1.3.0",
"id": "GHSA-gp5r-64rh-wjrv",
"modified": "2023-02-23T09:30:17Z",
"published": "2023-02-23T09:30:17Z",
"aliases": [
"CVE-2023-0939"
],
"details": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NTN Information Technologies Online Services Software allows SQL Injection.This issue affects Online Services Software: before 1.17.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0939"
},
{
"type": "WEB",
"url": "https://www.usom.gov.tr/bildirim/tr-23-0103"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-02-23T08:15:00Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"schema_version": "1.3.0",
"id": "GHSA-mrpv-5pmr-p92h",
"modified": "2023-02-23T09:30:17Z",
"published": "2023-02-23T09:30:17Z",
"aliases": [
"CVE-2023-25621"
],
"details": "Privilege Escalation vulnerability in Apache Software Foundation Apache Sling. Any content author is able to create i18n dictionaries in the repository in a location the author has write access to. As these translations are used across the whole product, it allows an author to change any text or dialog in the product. For example an attacker might fool someone by changing the text on a delete button to \"Info\". This issue affects the i18n module of Apache Sling up to version 2.5.18. Version 2.6.2 and higher limit by default i18m dictionaries to certain paths in the repository (/libs and /apps). Users of the module are advised to update to version 2.6.2 or higher, check the configuration for resource loading and then adjust the access permissions for the configured path accordingly.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25621"
},
{
"type": "WEB",
"url": "https://sling.apache.org/news.html"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-02-23T09:15:00Z"
}
}

0 comments on commit 6e5f741

Please sign in to comment.