fkie_cve-2023-41705
Vulnerability from fkie_nvd
Published
2024-02-12 09:15
Modified
2024-11-21 08:21
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Processing of user-defined DAV user-agent strings is not limited. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing time of DAV user-agents now gets monitored, and the related request is terminated if a resource threshold is reached. No publicly available exploits are known.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*", "matchCriteriaId": "7804FF21-94F6-4160-9628-B91ED4CDDCB6", "versionEndExcluding": "7.6.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*", "matchCriteriaId": "3159C504-0462-4AA9-9137-F25961B67ED6", "versionEndExcluding": "7.10.6", "versionStartExcluding": "7.6.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*", "matchCriteriaId": "F37B7CC3-A4D2-4CA5-8159-FE1A9016F9A0", "versionEndExcluding": "8.20", "versionStartExcluding": "7.10.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:-:*:*:*:*:*:*", "matchCriteriaId": "7AB04398-3973-4503-959E-FA8EE511DA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3464:*:*:*:*:*:*", "matchCriteriaId": "161CD641-C9EC-4FBE-BFFD-48C96FE71085", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3519:*:*:*:*:*:*", "matchCriteriaId": "73F1F959-F82B-4E00-91AE-C39037A93DDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3569:*:*:*:*:*:*", "matchCriteriaId": "E151E1EA-DA35-47CB-80C2-359518C213FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3627:*:*:*:*:*:*", "matchCriteriaId": "156910B8-F553-4F4C-B990-131F04001AB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3728:*:*:*:*:*:*", "matchCriteriaId": "13248A9A-D131-4596-A511-A18A83F9D4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3875:*:*:*:*:*:*", "matchCriteriaId": "54936294-45A6-410B-B6F6-CC2CEFCE937E", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3922:*:*:*:*:*:*", "matchCriteriaId": "8EDB7577-5763-41A1-90A7-7D7F225F8C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3949:*:*:*:*:*:*", "matchCriteriaId": "39B4BD56-3236-4AE0-93F6-F0E0190C77AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3991:*:*:*:*:*:*", "matchCriteriaId": "6F20C5D9-6DCA-4F3F-A9A8-FACAE5C4AB18", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4047:*:*:*:*:*:*", "matchCriteriaId": "F94B78AE-45FE-4BA7-BFD6-55767F8C3A0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4133:*:*:*:*:*:*", "matchCriteriaId": "B103D02E-C443-446B-A358-A052866BC624", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4423:*:*:*:*:*:*", "matchCriteriaId": "4D578FCB-EE90-4BB9-9E28-DC1FA139787C", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4470:*:*:*:*:*:*", "matchCriteriaId": "71380C28-6A25-425B-BE7F-6D06E0CE5C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4552:*:*:*:*:*:*", "matchCriteriaId": "DDBF0D2F-2C22-448E-A0D2-E66527188928", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4667:*:*:*:*:*:*", "matchCriteriaId": "50EC169C-73B6-40F5-8C7A-6DD71DC19893", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4750:*:*:*:*:*:*", "matchCriteriaId": "4B2CA948-280B-4EB8-9309-B016C9557A64", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4789:*:*:*:*:*:*", "matchCriteriaId": "36511A48-EBD8-40C2-A1FB-10F33264CF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4839:*:*:*:*:*:*", "matchCriteriaId": "EBE8374F-0D7D-422F-83AC-ADF9B9E6E511", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4860:*:*:*:*:*:*", "matchCriteriaId": "285B9A4B-6F4F-4899-AD2A-57E22BF9F7BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4895:*:*:*:*:*:*", "matchCriteriaId": "5BAD0604-90FC-4647-854A-E10330579B89", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5104:*:*:*:*:*:*", "matchCriteriaId": "7F26505E-0F61-40A2-B6BA-17C7E30D375C", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5165:*:*:*:*:*:*", "matchCriteriaId": "FD3E0ABC-2DAC-4441-96DB-BD84DD8B8E81", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5231:*:*:*:*:*:*", "matchCriteriaId": "347700F5-3BDA-4DA3-AA81-4D593E131AB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5537:*:*:*:*:*:*", "matchCriteriaId": "5EF075DE-44C7-4FC0-9BD7-E7A2C95651D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5637:*:*:*:*:*:*", "matchCriteriaId": "5CB6B4D0-E2B8-44F3-877B-293325EF44A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5910:*:*:*:*:*:*", "matchCriteriaId": "716CC742-9F23-4734-9CFF-338A231476D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:-:*:*:*:*:*:*", "matchCriteriaId": "A144D75D-60A8-4EE0-813C-F658C626B2AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6069:*:*:*:*:*:*", "matchCriteriaId": "2DA66230-DE02-4881-A893-E9E78286B157", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6073:*:*:*:*:*:*", "matchCriteriaId": "955F3DFB-6479-4867-B62A-82730DBEB498", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6080:*:*:*:*:*:*", "matchCriteriaId": "327D1B56-0D05-4D99-91D4-CC1F0AC32972", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6085:*:*:*:*:*:*", "matchCriteriaId": "D0CD0684-C431-47F8-A2F4-1936D5C5A72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6093:*:*:*:*:*:*", "matchCriteriaId": "EAA6A4A7-C1EE-4716-9F4D-2FF4C4D5FEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6102:*:*:*:*:*:*", "matchCriteriaId": "D0968764-CCEE-47A7-9111-E106D887DA43", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6112:*:*:*:*:*:*", "matchCriteriaId": "16589FBB-F0CD-4041-8141-5C89FCCA72AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6121:*:*:*:*:*:*", "matchCriteriaId": "3CB877EE-A5FE-4FF7-9D21-5C1CFA7343D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6133:*:*:*:*:*:*", "matchCriteriaId": "0DF5FB90-8D6D-4F99-B454-411B1DFFA630", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6138:*:*:*:*:*:*", "matchCriteriaId": "F58876B9-6C2E-4048-A793-B441A84E86F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6141:*:*:*:*:*:*", "matchCriteriaId": "D5F177CB-CC45-45A0-9D02-C14A13ECC7A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6146:*:*:*:*:*:*", "matchCriteriaId": "A89A4192-54E9-4899-8C7B-6C7F7E650D5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6147:*:*:*:*:*:*", "matchCriteriaId": "F2DC1357-9CD5-415F-A190-2F3F4498EF96", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6148:*:*:*:*:*:*", "matchCriteriaId": "D78ACF64-2802-44DD-AF7A-1BD5EA7F9908", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6150:*:*:*:*:*:*", "matchCriteriaId": "E8F675FA-1684-413A-B1BE-1C5434AC2862", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6156:*:*:*:*:*:*", "matchCriteriaId": "F3F1FDC3-35B2-4BDB-A685-75BC72588179", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6161:*:*:*:*:*:*", "matchCriteriaId": "5B1E509D-2F41-4296-86D2-6BD71783060F", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6166:*:*:*:*:*:*", "matchCriteriaId": "AC93EA37-F341-45EC-B651-4F326FB8C613", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6173:*:*:*:*:*:*", "matchCriteriaId": "1A4DB8A6-1702-462C-BFCB-39F91D2EFCE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6176:*:*:*:*:*:*", "matchCriteriaId": "FC0AEFDB-D033-47FC-93FC-8652F922BB8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6178:*:*:*:*:*:*", "matchCriteriaId": "B5354768-6527-43C2-B492-A8C14AB4E784", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6189:*:*:*:*:*:*", "matchCriteriaId": "D83F26D1-B8C6-4114-81EC-810DD5412DC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6194:*:*:*:*:*:*", "matchCriteriaId": "E9EBC010-9963-4636-96F7-A121FCF755A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6199:*:*:*:*:*:*", "matchCriteriaId": "F626D64B-C301-4CD8-94B4-48689BD3F29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6204:*:*:*:*:*:*", "matchCriteriaId": "5E32810C-7B35-42F1-BCA5-E10C02BE2215", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6205:*:*:*:*:*:*", "matchCriteriaId": "6539D059-8614-4C26-93C4-C2DDCC5D35E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6209:*:*:*:*:*:*", "matchCriteriaId": "E359EE75-A2F9-479B-B757-CAE1064AB8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6210:*:*:*:*:*:*", "matchCriteriaId": "0BCABDEF-D292-406E-B53C-AFF22484E916", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6214:*:*:*:*:*:*", "matchCriteriaId": "ABE8872C-B1DD-4A45-8EF8-E8C355CA6C54", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6215:*:*:*:*:*:*", "matchCriteriaId": "44B20B83-833A-4C68-8693-365BD046C157", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6216:*:*:*:*:*:*", "matchCriteriaId": "E254E6D1-D18E-4A2A-A2FF-7D03F39E65DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6218:*:*:*:*:*:*", "matchCriteriaId": "5F0C5E53-4D15-425A-B4CF-5869353724BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6219:*:*:*:*:*:*", "matchCriteriaId": "2F4BF5F1-F316-4BAC-83E0-DEAC8C50754E", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6220:*:*:*:*:*:*", "matchCriteriaId": "5CDD03A8-5B86-4B87-9C29-6C967261C5C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6227:*:*:*:*:*:*", "matchCriteriaId": "6071E15F-4D59-41DC-A4D4-7D1AA392A1F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6230:*:*:*:*:*:*", "matchCriteriaId": "C72C1CEB-7BF7-4A5F-B2E9-397F86CCBF4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6233:*:*:*:*:*:*", "matchCriteriaId": "5B0F0218-4224-4084-B38D-9719D3782C03", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6235:*:*:*:*:*:*", "matchCriteriaId": "BFC41329-1AD6-4575-A22D-977EC5539DA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6236:*:*:*:*:*:*", "matchCriteriaId": "217A06B7-0823-4508-BC0C-AD792BA88F7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6239:*:*:*:*:*:*", "matchCriteriaId": "246E98B2-A6C8-4410-AA6A-7E81EE8C5E76", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6241:*:*:*:*:*:*", "matchCriteriaId": "74D1EC02-D009-45DA-B1EC-2219E0F0183C", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6243:*:*:*:*:*:*", "matchCriteriaId": "0F56A261-EC62-423C-B487-35EA9D4A83FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6245:*:*:*:*:*:*", "matchCriteriaId": "D295E160-C87A-498D-AB0E-BA1E50825249", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6248:*:*:*:*:*:*", "matchCriteriaId": "A30BE138-D745-4F0E-AAE4-202A1C769C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6249:*:*:*:*:*:*", "matchCriteriaId": "7CF4FCB9-7360-4ABB-95FB-0239CDC8D3AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6250:*:*:*:*:*:*", "matchCriteriaId": "465DD666-3499-4911-A1DF-6BAAFCCFA006", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6251:*:*:*:*:*:*", "matchCriteriaId": "6F18CEDC-5D7A-4496-8B5E-59EBEA4362BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6255:*:*:*:*:*:*", "matchCriteriaId": "8C1DE547-F217-4518-AD90-3607AE21F6ED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Processing of user-defined DAV user-agent strings is not limited. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing time of DAV user-agents now gets monitored, and the related request is terminated if a resource threshold is reached. No publicly available exploits are known." }, { "lang": "es", "value": "El procesamiento de cadenas de agente de usuario DAV definidas por el usuario no est\u00e1 limitado. La disponibilidad de OX App Suite podr\u00eda verse reducida debido a la alta carga de procesamiento. Implemente las actualizaciones y lanzamientos de parches proporcionados. Ahora se monitorea el tiempo de procesamiento de los agentes de usuario de DAV y la solicitud relacionada finaliza si se alcanza un umbral de recursos. No se conocen exploits disponibles p\u00fablicamente." } ], "id": "CVE-2023-41705", "lastModified": "2024-11-21T08:21:30.620", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security@open-xchange.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-12T09:15:10.880", "references": [ { "source": "security@open-xchange.com", "tags": [ "Vendor Advisory" ], "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0007.json" }, { "source": "security@open-xchange.com", "tags": [ "Release Notes" ], "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6259_7.10.6_2023-12-11.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0007.json" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6259_7.10.6_2023-12-11.pdf" } ], "sourceIdentifier": "security@open-xchange.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "security@open-xchange.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.