Lucene search

K
cvelist@huntrdevCVELIST:CVE-2022-3023
HistoryNov 04, 2022 - 12:00 a.m.

CVE-2022-3023 Use of Externally-Controlled Format String in pingcap/tidb

2022-11-0400:00:00
CWE-134
@huntrdev
www.cve.org
cve-2022-3023
pingcap/tidb
format string vulnerability

4.2 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N

9.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.7%

Use of Externally-Controlled Format String in GitHub repository pingcap/tidb prior to 6.4.0, 6.1.3.

CNA Affected

[
  {
    "vendor": "pingcap",
    "product": "pingcap/tidb",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "6.4.0, 6.1.3",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

4.2 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N

9.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.7%

Related for CVELIST:CVE-2022-3023