mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
1b65e9c05c
commit
0b9ee0f395
@ -104,6 +104,11 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202208-32",
|
||||
"url": "https://security.gentoo.org/glsa/202208-32"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221124-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221124-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -109,6 +109,11 @@
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/43"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -109,6 +109,11 @@
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/43"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -104,6 +104,16 @@
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -94,6 +94,16 @@
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -119,6 +119,16 @@
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -104,6 +104,16 @@
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -84,6 +84,11 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202208-32",
|
||||
"url": "https://security.gentoo.org/glsa/202208-32"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -109,6 +109,16 @@
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -99,6 +99,16 @@
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -37,7 +37,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "When using tasks to read config files, there is a risk of database password disclosure. We recommend you upgrade to version 2.0.6 or higher."
|
||||
"value": "When using tasks to read config files, there is a risk of database password disclosure. We recommend you upgrade to version 2.0.6 or higher."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -64,12 +64,13 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://lists.apache.org/thread/z7084r9cs2r26cszkkgjqpb5bhnxqssp"
|
||||
"refsource": "MISC",
|
||||
"url": "https://lists.apache.org/thread/z7084r9cs2r26cszkkgjqpb5bhnxqssp",
|
||||
"name": "https://lists.apache.org/thread/z7084r9cs2r26cszkkgjqpb5bhnxqssp"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
||||
}
|
@ -124,6 +124,11 @@
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/45"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -94,6 +94,11 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202208-32",
|
||||
"url": "https://security.gentoo.org/glsa/202208-32"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -81,6 +81,11 @@
|
||||
"name": "https://github.com/grafana/grafana/releases/tag/v9.1.8",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/grafana/grafana/releases/tag/v9.1.8"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221124-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221124-0002/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In libarchive 3.6.1, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference or, in some cases, even arbitrary code execution."
|
||||
"value": "In libarchive 3.6.1, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: \"In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution.\""
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +56,11 @@
|
||||
"url": "https://github.com/libarchive/libarchive/issues/1754",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/libarchive/libarchive/issues/1754"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugs.gentoo.org/882521",
|
||||
"url": "https://bugs.gentoo.org/882521"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -94,6 +94,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2022-4bc60c32a2",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -94,6 +94,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2022-4bc60c32a2",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -94,6 +94,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2022-4bc60c32a2",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -71,6 +71,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924",
|
||||
"url": "https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221124-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221124-0001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5283",
|
||||
"url": "https://www.debian.org/security/2022/dsa-5283"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20221124-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221124-0004/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A logical issue in O_getOwnPropertyDescriptor() in Artifex MuJS 1.0.0 through 1.3.1 allows an attacker to achieve Remote Code Execution through memory corruption, via the loading of a crafted JavaScript file."
|
||||
"value": "A logical issue in O_getOwnPropertyDescriptor() in Artifex MuJS 1.0.0 through 1.3.x before 1.3.2 allows an attacker to achieve Remote Code Execution through memory corruption, via the loading of a crafted JavaScript file."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -52,10 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/ccxvii/mujs/commit/edb50ad66f7601ca9a3544a0e9045e8a8c60561f",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/ccxvii/mujs/commit/edb50ad66f7601ca9a3544a0e9045e8a8c60561f"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/alalng/CVE-2022-44789/blob/main/PublicReferenceURL.txt",
|
||||
"url": "https://github.com/alalng/CVE-2022-44789/blob/main/PublicReferenceURL.txt"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://github.com/ccxvii/mujs/releases/tag/1.3.2",
|
||||
"url": "https://github.com/ccxvii/mujs/releases/tag/1.3.2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user