diff --git a/repository/definitions/vulnerability/oval_com.gfi_def_1521.xml b/repository/definitions/vulnerability/oval_com.gfi_def_1521.xml new file mode 100644 index 000000000000..1b72060a473c --- /dev/null +++ b/repository/definitions/vulnerability/oval_com.gfi_def_1521.xml @@ -0,0 +1,43 @@ + + + Multiple vulnerabilities on Adobe Media Encoder + + Microsoft Windows 10 + Microsoft Windows Server 2008 + Microsoft Windows Server 2008 R2 + Microsoft Windows Server 2012 + Microsoft Windows Server 2012 R2 + Microsoft Windows Server 2016 + Microsoft Windows Server 2019 + Adobe Media Encoder + + + + + + Adobe Media Encoder version 13.0.2 has a use-after-free vulnerability (CVE-2019-7842) + and an out-of-bounds read vulnerability (CVE-2019-7844). Successful exploitation could + lead to remote code execution. + + + + + Glenn Lugod + + + INITIAL SUBMISSION + 5.10 + + + + + + + \ No newline at end of file diff --git a/repository/definitions/vulnerability/oval_com.gfi_def_1524.xml b/repository/definitions/vulnerability/oval_com.gfi_def_1524.xml new file mode 100644 index 000000000000..4219769fb8c7 --- /dev/null +++ b/repository/definitions/vulnerability/oval_com.gfi_def_1524.xml @@ -0,0 +1,54 @@ + + + Adobe InDesign versions 14.0.1 and below have an unsafe hyperlink processing + vulnerability. (CVE-2019-7107) + + Microsoft Windows 7 + Microsoft Windows 8 + Microsoft Windows 8.1 + Microsoft Windows 10 + Microsoft Windows Server 2003 + Microsoft Windows Server 2008 + Microsoft Windows Server 2008 R2 + Microsoft Windows Server 2012 + Microsoft Windows Server 2012 R2 + Adobe InDesign + + + + + Adobe InDesign versions 14.0.1 and below have an unsafe hyperlink processing + vulnerability. Successful exploitation could lead to arbitrary code execution. Fixed in + versions 13.1.1 and 14.0.2. (CVE-2019-7107) + + + + + Glenn Lugod + + + INITIAL SUBMISSION + 5.10 + + + + + + + + + + + + + \ No newline at end of file diff --git a/repository/definitions/vulnerability/oval_com.gfi_def_1529.xml b/repository/definitions/vulnerability/oval_com.gfi_def_1529.xml new file mode 100644 index 000000000000..d66aa63f0258 --- /dev/null +++ b/repository/definitions/vulnerability/oval_com.gfi_def_1529.xml @@ -0,0 +1,51 @@ + + + + Adobe Digital Editions versions 4.5.10.185749 and below have a heap overflow + vulnerability. (CVE-2019-7095) + + + Microsoft Windows 2000 + Microsoft Windows XP + Microsoft Windows Server 2003 + Microsoft Windows Vista + Microsoft Windows Server 2008 + Microsoft Windows Server 2008 R2 + Microsoft Windows 7 + Microsoft Windows 8 + Microsoft Windows 8.1 + Microsoft Windows 10 + Microsoft Windows Server 2012 + Microsoft Windows Server 2012 R2 + Microsoft Windows Server 2016 + Microsoft Windows Server 2019 + Adobe Digital Editions + + + + + Adobe Digital Editions versions 4.5.10.185749 and below have a heap overflow + vulnerability. Successful exploitation could lead to arbitrary code execution. + (CVE-2019-7095) + + + + + Glenn Lugod + + + INITIAL SUBMISSION + 5.10 + + + + + + + \ No newline at end of file diff --git a/repository/definitions/vulnerability/oval_com.gfi_def_1532.xml b/repository/definitions/vulnerability/oval_com.gfi_def_1532.xml new file mode 100644 index 000000000000..b42a2d106af6 --- /dev/null +++ b/repository/definitions/vulnerability/oval_com.gfi_def_1532.xml @@ -0,0 +1,82 @@ + + + Multiple vulnerabilities on Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 + (and earlier) + + Microsoft Windows 8 + Microsoft Windows 8.1 + Microsoft Windows 10 + Microsoft Windows 11 + Microsoft Windows Server 2012 + Microsoft Windows Server 2012 R2 + Microsoft Windows Server 2016 + Microsoft Windows Server 2019 + Adobe Bridge + + + + + + + + + + + Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an + out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An + attacker could leverage this vulnerability to bypass mitigations such as ASLR. + Exploitation of this issue requires user interaction in that a victim must open a + malicious file. (CVE-2023-21583) + Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by a + Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution + in the context of the current user. Exploitation of this issue requires user interaction + in that a victim must open a malicious file. (CVE-2023-22226) + Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an + out-of-bounds write vulnerability that could result in arbitrary code execution in the + context of the current user. Exploitation of this issue requires user interaction in + that a victim must open a malicious file. (CVE-2023-22227) + Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an + Improper Input Validation vulnerability that could result in arbitrary code execution in + the context of the current user. Exploitation of this issue requires user interaction in + that a victim must open a malicious file. (CVE-2023-22228) + Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an + out-of-bounds write vulnerability that could result in arbitrary code execution in the + context of the current user. Exploitation of this issue requires user interaction in + that a victim must open a malicious file. (CVE-2023-22229) + Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an + out-of-bounds write vulnerability that could result in arbitrary code execution in the + context of the current user. Exploitation of this issue requires user interaction in + that a victim must open a malicious file. (CVE-2023-22230) + Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an + out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An + attacker could leverage this vulnerability to bypass mitigations such as ASLR. + Exploitation of this issue requires user interaction in that a victim must open a + malicious file. (CVE-2023-22231) + + + + + Glenn Lugod + + + INITIAL SUBMISSION + 5.10 + + + + + + + \ No newline at end of file diff --git a/repository/definitions/vulnerability/oval_com.gfi_def_1535.xml b/repository/definitions/vulnerability/oval_com.gfi_def_1535.xml new file mode 100644 index 000000000000..330fa0bc5a07 --- /dev/null +++ b/repository/definitions/vulnerability/oval_com.gfi_def_1535.xml @@ -0,0 +1,83 @@ + + + Multiple vulnerabilites on Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) + + Microsoft Windows 8 + Microsoft Windows 8.1 + Microsoft Windows 10 + Microsoft Windows 11 + Microsoft Windows Server 2012 + Microsoft Windows Server 2012 R2 + Microsoft Windows Server 2016 + Microsoft Windows Server 2019 + Adobe Photoshop + + + + + + + + + Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an Improper + Input Validation vulnerability that could result in arbitrary code execution in the + context of the current user. Exploitation of this issue requires user interaction in + that a victim must open a malicious file. (CVE-2023-21574) + Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an + out-of-bounds write vulnerability that could result in arbitrary code execution in the + context of the current user. Exploitation of this issue requires user interaction in + that a victim must open a malicious file. (CVE-2023-21575) + Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an + out-of-bounds write vulnerability that could result in arbitrary code execution in the + context of the current user. Exploitation of this issue requires user interaction in + that a victim must open a malicious file. (CVE-2023-21576) + Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an + out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An + attacker could leverage this vulnerability to bypass mitigations such as ASLR. + Exploitation of this issue requires user interaction in that a victim must open a + malicious file. (CVE-2023-21577) + Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an + out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An + attacker could leverage this vulnerability to bypass mitigations such as ASLR. + Exploitation of this issue requires user interaction in that a victim must open a + malicious file. (CVE-2023-21578) + + + + + Glenn Lugod + + + INITIAL SUBMISSION + 5.10 + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/repository/definitions/vulnerability/oval_com.gfi_def_1544.xml b/repository/definitions/vulnerability/oval_com.gfi_def_1544.xml new file mode 100644 index 000000000000..b5982c5f098b --- /dev/null +++ b/repository/definitions/vulnerability/oval_com.gfi_def_1544.xml @@ -0,0 +1,58 @@ + + + Adobe InDesign versions ID18.1 (and earlier) and ID17.4 (and earlier) are affected by + a NULL Pointer Dereference vulnerability. (CVE-2023-21593) + + Microsoft Windows 7 + Microsoft Windows 8 + Microsoft Windows 8.1 + Microsoft Windows 10 + Microsoft Windows 11 + Microsoft Windows Server 2003 + Microsoft Windows Server 2008 + Microsoft Windows Server 2008 R2 + Microsoft Windows Server 2012 + Microsoft Windows Server 2012 R2 + Adobe InDesign + + + + + Adobe InDesign versions ID18.1 (and earlier) and ID17.4 (and earlier) are affected by a + NULL Pointer Dereference vulnerability. + An unauthenticated attacker could leverage this vulnerability to achieve an application + denial-of-service in the context of the current user. + Exploitation of this issue requires user interaction in that a victim must open a + malicious file. (CVE-2023-21593) + + + + + Glenn Lugod + + + INITIAL SUBMISSION + 5.10 + + + + + + + + + + + + + \ No newline at end of file diff --git a/repository/definitions/vulnerability/oval_com.gfi_def_1549.xml b/repository/definitions/vulnerability/oval_com.gfi_def_1549.xml new file mode 100644 index 000000000000..19a70cdfa66a --- /dev/null +++ b/repository/definitions/vulnerability/oval_com.gfi_def_1549.xml @@ -0,0 +1,64 @@ + + + Multiple vulnerabilities on Adobe Animate 2022, Adobe Animate 2023 + + Microsoft Windows 10 + Microsoft Windows 11 + Microsoft Windows Server 2008 + Microsoft Windows Server 2008 R2 + Microsoft Windows Server 2012 + Microsoft Windows Server 2012 R2 + Microsoft Windows Server 2016 + Microsoft Windows Server 2019 + Adobe Animate + + + + + + + Adobe Animate versions 22.0.8 (and earlier) and 23.0.0 (and earlier) are affected by a + Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution + in the context of the current user. Exploitation of this issue requires user interaction + in that a victim must open a malicious file. (CVE-2023-22236) + Adobe Animate versions 22.0.8 (and earlier) and 23.0.0 (and earlier) are affected by a + Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution + in the context of the current user. Exploitation of this issue requires user interaction + in that a victim must open a malicious file. (CVE-2023-22243) + Adobe Animate versions 22.0.8 (and earlier) and 23.0.0 (and earlier) are affected by a + Use After Free vulnerability that could result in arbitrary code execution in the + context of the current user. Exploitation of this issue requires user interaction in + that a victim must open a malicious file. (CVE-2023-22246) + + + + + Glenn Lugod + + + INITIAL SUBMISSION + 5.10 + + + + + + + + + + + + + \ No newline at end of file diff --git a/repository/states/windows/file_state/1000/oval_com.gfi_ste_1526.xml b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1526.xml new file mode 100644 index 000000000000..b7681ac446e9 --- /dev/null +++ b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1526.xml @@ -0,0 +1,4 @@ + + 14.0.2 + \ No newline at end of file diff --git a/repository/states/windows/file_state/1000/oval_com.gfi_ste_1528.xml b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1528.xml new file mode 100644 index 000000000000..1d00f31d8a1e --- /dev/null +++ b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1528.xml @@ -0,0 +1,4 @@ + + 13.1.1 + \ No newline at end of file diff --git a/repository/states/windows/file_state/1000/oval_com.gfi_ste_1534.xml b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1534.xml new file mode 100644 index 000000000000..95de2564f62b --- /dev/null +++ b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1534.xml @@ -0,0 +1,4 @@ + + 12.0.4 + \ No newline at end of file diff --git a/repository/states/windows/file_state/1000/oval_com.gfi_ste_1537.xml b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1537.xml new file mode 100644 index 000000000000..ea06ade6b4a4 --- /dev/null +++ b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1537.xml @@ -0,0 +1,4 @@ + + 23.5 + \ No newline at end of file diff --git a/repository/states/windows/file_state/1000/oval_com.gfi_ste_1539.xml b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1539.xml new file mode 100644 index 000000000000..13a45a8935c0 --- /dev/null +++ b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1539.xml @@ -0,0 +1,4 @@ + + 23.5.4 + \ No newline at end of file diff --git a/repository/states/windows/file_state/1000/oval_com.gfi_ste_1541.xml b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1541.xml new file mode 100644 index 000000000000..03c77a471958 --- /dev/null +++ b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1541.xml @@ -0,0 +1,4 @@ + + 24.1 + \ No newline at end of file diff --git a/repository/states/windows/file_state/1000/oval_com.gfi_ste_1543.xml b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1543.xml new file mode 100644 index 000000000000..f13436ae6dff --- /dev/null +++ b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1543.xml @@ -0,0 +1,4 @@ + + 24.1.1 + \ No newline at end of file diff --git a/repository/states/windows/file_state/1000/oval_com.gfi_ste_1546.xml b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1546.xml new file mode 100644 index 000000000000..c6d896364202 --- /dev/null +++ b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1546.xml @@ -0,0 +1,4 @@ + + ID18.2 + \ No newline at end of file diff --git a/repository/states/windows/file_state/1000/oval_com.gfi_ste_1548.xml b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1548.xml new file mode 100644 index 000000000000..1d638177c8a0 --- /dev/null +++ b/repository/states/windows/file_state/1000/oval_com.gfi_ste_1548.xml @@ -0,0 +1,4 @@ + + ID17.4.1 + \ No newline at end of file diff --git a/repository/states/windows/registry_state/1000/oval_com.gfi_ste_1523.xml b/repository/states/windows/registry_state/1000/oval_com.gfi_ste_1523.xml new file mode 100644 index 000000000000..3d11cf1179a1 --- /dev/null +++ b/repository/states/windows/registry_state/1000/oval_com.gfi_ste_1523.xml @@ -0,0 +1,4 @@ + + 13.1 + \ No newline at end of file diff --git a/repository/states/windows/registry_state/1000/oval_com.gfi_ste_1531.xml b/repository/states/windows/registry_state/1000/oval_com.gfi_ste_1531.xml new file mode 100644 index 000000000000..1c0063ab46a8 --- /dev/null +++ b/repository/states/windows/registry_state/1000/oval_com.gfi_ste_1531.xml @@ -0,0 +1,4 @@ + + 4.5.10.186048 + \ No newline at end of file diff --git a/repository/states/windows/registry_state/1000/oval_com.gfi_ste_1551.xml b/repository/states/windows/registry_state/1000/oval_com.gfi_ste_1551.xml new file mode 100644 index 000000000000..42219e471b82 --- /dev/null +++ b/repository/states/windows/registry_state/1000/oval_com.gfi_ste_1551.xml @@ -0,0 +1,4 @@ + + 22.0.9 + \ No newline at end of file diff --git a/repository/states/windows/registry_state/1000/oval_com.gfi_ste_1553.xml b/repository/states/windows/registry_state/1000/oval_com.gfi_ste_1553.xml new file mode 100644 index 000000000000..5c276aa2588b --- /dev/null +++ b/repository/states/windows/registry_state/1000/oval_com.gfi_ste_1553.xml @@ -0,0 +1,4 @@ + + 23.0.1 + \ No newline at end of file diff --git a/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1525.xml b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1525.xml new file mode 100644 index 000000000000..7a670b4ccbac --- /dev/null +++ b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1525.xml @@ -0,0 +1,6 @@ + + + + \ No newline at end of file diff --git a/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1527.xml b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1527.xml new file mode 100644 index 000000000000..ca6b6edae1ce --- /dev/null +++ b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1527.xml @@ -0,0 +1,6 @@ + + + + \ No newline at end of file diff --git a/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1533.xml b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1533.xml new file mode 100644 index 000000000000..8479c4f22be2 --- /dev/null +++ b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1533.xml @@ -0,0 +1,7 @@ + + + + \ No newline at end of file diff --git a/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1536.xml b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1536.xml new file mode 100644 index 000000000000..4224f230b803 --- /dev/null +++ b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1536.xml @@ -0,0 +1,7 @@ + + + + \ No newline at end of file diff --git a/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1538.xml b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1538.xml new file mode 100644 index 000000000000..b4e879b2a234 --- /dev/null +++ b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1538.xml @@ -0,0 +1,7 @@ + + + + \ No newline at end of file diff --git a/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1540.xml b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1540.xml new file mode 100644 index 000000000000..c4431f3c4e2c --- /dev/null +++ b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1540.xml @@ -0,0 +1,7 @@ + + + + \ No newline at end of file diff --git a/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1542.xml b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1542.xml new file mode 100644 index 000000000000..6f912013b5a9 --- /dev/null +++ b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1542.xml @@ -0,0 +1,7 @@ + + + + \ No newline at end of file diff --git a/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1545.xml b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1545.xml new file mode 100644 index 000000000000..de45b62583c2 --- /dev/null +++ b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1545.xml @@ -0,0 +1,6 @@ + + + + \ No newline at end of file diff --git a/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1547.xml b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1547.xml new file mode 100644 index 000000000000..9da04368e25f --- /dev/null +++ b/repository/tests/windows/file_test/1000/oval_com.gfi_tst_1547.xml @@ -0,0 +1,7 @@ + + + + \ No newline at end of file diff --git a/repository/tests/windows/registry_test/1000/oval_com.gfi_tst_1522.xml b/repository/tests/windows/registry_test/1000/oval_com.gfi_tst_1522.xml new file mode 100644 index 000000000000..dd851a1f0e58 --- /dev/null +++ b/repository/tests/windows/registry_test/1000/oval_com.gfi_tst_1522.xml @@ -0,0 +1,7 @@ + + + + \ No newline at end of file diff --git a/repository/tests/windows/registry_test/1000/oval_com.gfi_tst_1530.xml b/repository/tests/windows/registry_test/1000/oval_com.gfi_tst_1530.xml new file mode 100644 index 000000000000..828e09a30fc4 --- /dev/null +++ b/repository/tests/windows/registry_test/1000/oval_com.gfi_tst_1530.xml @@ -0,0 +1,7 @@ + + + + \ No newline at end of file diff --git a/repository/tests/windows/registry_test/1000/oval_com.gfi_tst_1550.xml b/repository/tests/windows/registry_test/1000/oval_com.gfi_tst_1550.xml new file mode 100644 index 000000000000..ac68bc3202a9 --- /dev/null +++ b/repository/tests/windows/registry_test/1000/oval_com.gfi_tst_1550.xml @@ -0,0 +1,7 @@ + + + + \ No newline at end of file diff --git a/repository/tests/windows/registry_test/1000/oval_com.gfi_tst_1552.xml b/repository/tests/windows/registry_test/1000/oval_com.gfi_tst_1552.xml new file mode 100644 index 000000000000..cbb17277d0b8 --- /dev/null +++ b/repository/tests/windows/registry_test/1000/oval_com.gfi_tst_1552.xml @@ -0,0 +1,7 @@ + + + + \ No newline at end of file