added checkpoint captured data potential from advisory example
This commit is contained in:
parent
e5cea3869f
commit
70985c7511
1 changed files with 22 additions and 0 deletions
|
@ -491,6 +491,28 @@ https://cert.vde.com/en/advisories/
|
|||
### Advisory
|
||||
https://www.checkpoint.com/advisories/
|
||||
#### Captured Data Potential From Advisory
|
||||
```
|
||||
{
|
||||
:bulletin_id => 'CPAI-2022-0251',
|
||||
:date_published => 'May 19, 2022',
|
||||
:severity => 'Critical',
|
||||
:last_updated => 'Thursday 19 May, 2022',
|
||||
:source => '',
|
||||
:cve_id => 'CVE-2022-30525',
|
||||
:protection_provided_by => 'Security Gateway R81, R80, R77, R75',
|
||||
:who_is_vulnerable => [
|
||||
'Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1',
|
||||
'Zyxel USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1',
|
||||
'Zyxel USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1',
|
||||
'Zyxel USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1',
|
||||
'Zyxel USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1',
|
||||
'Zyxel USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1',
|
||||
'Zyxel ATP series firmware versions 5.10 through 5.21 Patch 1',
|
||||
'Zyxel VPN series firmware versions 4.60 through 5.21 Patch 1'
|
||||
],
|
||||
:vulnerability_description => 'A command injection vulnerability exists in Zyxel USG. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary commands on the affected system.'
|
||||
}
|
||||
```
|
||||
|
||||
## Chrome
|
||||
### Advisory
|
||||
|
|
Loading…
Add table
Reference in a new issue