diff --git a/data/cve/CVE-2023-46047.json b/data/cve/CVE-2023-46047.json new file mode 100644 index 0000000000000000000000000000000000000000..abbb8f46de57d5b62d86789074da976934f7f8f4 --- /dev/null +++ b/data/cve/CVE-2023-46047.json @@ -0,0 +1,57 @@ +{ + "id": 24376, + "cve_id": "CVE-2023-46047", + "creator": null, + "publisher": "cve-center", + "publish_third_party_token": "cve-center", + "publish_date": "2024-03-27 13:15:47", + "cvss": { + "nvd_cvss": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "openanolis_cvss": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + }, + "product": [ + { + "product_id": 5, + "name_version": "Anolis OS 8", + "product_package_info": { + "src": [ + { + "rpm_name": "sane-backends", + "rpm_status": "unaffected" + } + ] + } + }, + { + "product_id": 7, + "name_version": "Anolis OS 23", + "product_package_info": { + "src": [ + { + "rpm_name": "sane-backends", + "rpm_status": "affected" + } + ] + } + } + ], + "affected_packages": [ + "sane-backends" + ], + "score": 7.3, + "severity": "Important", + "status": 1, + "source": "Mitre", + "cve_source_link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46047", + "abstract": "An issue in Sane 1.2.1 allows a local attacker to execute arbitrary code via a crafted file to the sanei_configure_attach() function. NOTE: this is disputed because there is no expectation that the product should be starting with an attacker-controlled configuration file.", + "description": null, + "issue": null, + "acknowledgements": null, + "acknowledgements_en": null, + "reference": null, + "diagnose": null, + "statement": null, + "mitigation": null, + "update_user": null, + "errata": [] +} \ No newline at end of file