diff --git a/advisories/unreviewed/2024/08/GHSA-gcq8-j4vp-vgvp/GHSA-gcq8-j4vp-vgvp.json b/advisories/unreviewed/2024/08/GHSA-gcq8-j4vp-vgvp/GHSA-gcq8-j4vp-vgvp.json index fd24beb2831f3..951bc463edcd9 100644 --- a/advisories/unreviewed/2024/08/GHSA-gcq8-j4vp-vgvp/GHSA-gcq8-j4vp-vgvp.json +++ b/advisories/unreviewed/2024/08/GHSA-gcq8-j4vp-vgvp/GHSA-gcq8-j4vp-vgvp.json @@ -1,23 +1,53 @@ { "schema_version": "1.4.0", "id": "GHSA-gcq8-j4vp-vgvp", - "modified": "2024-08-14T15:31:12Z", + "modified": "2024-08-14T15:31:18Z", "published": "2024-08-14T15:31:12Z", "aliases": [ "CVE-2023-35123" ], + "summary": "Infotech(R).svc", "details": "Uncaught exception in OpenBMC Firmware for some Intel(R) Server Platforms before versions egs-1.14-0, bhs-0.27 may allow an authenticated user to potentially enable denial of service via network access.", "severity": [ { "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "crates.io", + "name": "" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ] }, { - "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + "package": { + "ecosystem": "Maven", + "name": "" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", @@ -26,13 +56,18 @@ { "type": "WEB", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01078.html" + }, + { + "type": "PACKAGE", + "url": "related_website_sets.JSON" } ], "database_specific": { "cwe_ids": [ - "CWE-600" + "CWE-600", + "CWE-9" ], - "severity": "MODERATE", + "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-08-14T14:15:13Z"