[
    {
        "Modified": "2023-11-29T18:00:00",
        "Published": "2023-11-20T23:15:00",
        "access": {
            "authentication": "",
            "complexity": "",
            "vector": ""
        },
        "assigner": "security-advisories@github.com",
        "cvss": 0,
        "cvss-time": "",
        "cvss-vector": "",
        "cwe": "Unknown",
        "id": "CVE-2023-48310",
        "impact": {
            "availability": "",
            "confidentiality": "",
            "integrity": ""
        },
        "last-modified": "2023-11-29T18:00:00",
        "products": [],
        "references": [
            "https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-9fhc-f3mr-w6h6",
            "https://github.com/NC3-LU/TestingPlatform/commit/7b3e7ca869a4845aa7445f874c22c5929315c3a7",
            "https://github.com/NC3-LU/TestingPlatform/releases/tag/v2.1.1",
            "https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-mmpf-rw6c-67mm"
        ],
        "summary": "TestingPlatform is a testing platform for Internet Security Standards. Prior to version 2.1.1, user input is not filtered correctly. Nmap options are accepted. In this particular case, the option to create log files is accepted in addition to a host name (and even without). A log file is created at the location specified. These files are created as root. If the file exists, the existing file is being rendered useless. This can result in denial of service. Additionally, input for scanning can be any CIDR blocks passed to nmap. An attacker can scan 0.0.0.0/0 or even local networks. Version 2.1.1 contains a patch for this issue.",
        "vendors": [],
        "vulnerable_configuration": [
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:0.0.1:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:0.0.1:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:0.1.0:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:0.1.0:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:0.1.1:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:0.1.1:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:0.1.2:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:0.1.2:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:1.0.0:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:1.0.0:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:1.0.1:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:1.0.1:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:1.0.2:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:1.0.2:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:1.0.3:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:1.0.3:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:1.0.4:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:1.0.4:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:1.0.5:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:1.0.5:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:1.0.6:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:1.0.6:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:1.0.7:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:1.0.7:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:1.0.7-1:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:1.0.7-1:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:1.0.8:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:1.0.8:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:a:nc3:testing_platform:2.1.0:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:a:nc3:testing_platform:2.1.0:*:*:*:*:*:*:*\"}"
        ],
        "vulnerable_configuration_cpe_2_2": [],
        "vulnerable_configuration_stems": [],
        "vulnerable_product": [
            "cpe:2.3:a:nc3:testing_platform:0.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:nc3:testing_platform:0.1.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:nc3:testing_platform:0.1.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:nc3:testing_platform:0.1.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:nc3:testing_platform:1.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:nc3:testing_platform:1.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:nc3:testing_platform:1.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:nc3:testing_platform:1.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:nc3:testing_platform:1.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:nc3:testing_platform:1.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:nc3:testing_platform:1.0.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:nc3:testing_platform:1.0.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:nc3:testing_platform:1.0.7-1:*:*:*:*:*:*:*",
            "cpe:2.3:a:nc3:testing_platform:1.0.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:nc3:testing_platform:2.1.0:*:*:*:*:*:*:*"
        ],
        "vulnerable_product_stems": []
    },
    {
        "Modified": "2021-07-14T18:15:00",
        "Published": "2021-07-02T22:15:00",
        "access": {
            "authentication": "SINGLE",
            "complexity": "LOW",
            "vector": "NETWORK"
        },
        "assigner": "secure@microsoft.com",
        "cvss": 9,
        "cvss-time": "2021-07-14T18:15:00",
        "cvss-vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
        "cwe": "CWE-269",
        "id": "CVE-2021-34527",
        "impact": {
            "availability": "COMPLETE",
            "confidentiality": "COMPLETE",
            "integrity": "COMPLETE"
        },
        "last-modified": "2021-07-14T18:15:00",
        "products": [],
        "references": [
            "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34527",
            "https://www.kb.cert.org/vuls/id/383432"
        ],
        "summary": "Windows Print Spooler Remote Code Execution Vulnerability",
        "vendors": [],
        "vulnerable_configuration": [
            "{\"id\":\"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*\"}",
            "{\"id\":\"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*\"}"
        ],
        "vulnerable_configuration_cpe_2_2": [],
        "vulnerable_configuration_stems": [],
        "vulnerable_product": [
            "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
            "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
            "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*"
        ],
        "vulnerable_product_stems": []
    }
]