"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-03-27 06:01:32 +00:00
parent 3d94e3e0f5
commit 12d7400a38
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
11 changed files with 101 additions and 52 deletions

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-32199",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-32199",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "db_convert.php in ScriptCase through 9.9.008 is vulnerable to Arbitrary File Deletion by an admin via a directory traversal sequence in the file parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.scriptcase.net/download/",
"refsource": "MISC",
"name": "https://www.scriptcase.net/download/"
},
{
"refsource": "MISC",
"name": "https://github.com/Toxich4/CVE-2022-32199",
"url": "https://github.com/Toxich4/CVE-2022-32199"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been found in Ubiquiti EdgeRouter X 2.0.9-hotfix.6 and classified as critical. Affected by this vulnerability is an unknown functionality of the component OSPF Handler. The manipulation of the argument area leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-223303. NOTE: The vendor position is that post-authentication issues are not accepted as vulnerabilities."
"value": "** DISPUTED ** A vulnerability has been found in Ubiquiti EdgeRouter X 2.0.9-hotfix.6 and classified as critical. Affected by this vulnerability is an unknown functionality of the component OSPF Handler. The manipulation of the argument area leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-223303. NOTE: The vendor position is that post-authentication issues are not accepted as vulnerabilities."
}
]
},

View File

@ -68,15 +68,15 @@
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.224018"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned32",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned32"
},
{
"url": "https://drive.google.com/file/d/1_jYlCkQMNaUwGV5QJtyz4zhdTqaGCv6Z/view",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1_jYlCkQMNaUwGV5QJtyz4zhdTqaGCv6Z/view"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1638",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1638"
}
]
},

View File

@ -68,15 +68,15 @@
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.224019"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned33",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned33"
},
{
"url": "https://drive.google.com/file/d/1hWgHhboaekq4hGIj2kNgEI54rM-u_rvV/view",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1hWgHhboaekq4hGIj2kNgEI54rM-u_rvV/view"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1639",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1639"
}
]
},

View File

@ -68,15 +68,15 @@
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.224020"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned34",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned34"
},
{
"url": "https://drive.google.com/file/d/1AcwSxTA0_zh7mmxU5J8WphRqg_mQsO-g/view",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1AcwSxTA0_zh7mmxU5J8WphRqg_mQsO-g/view"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1640",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1640"
}
]
},

View File

@ -68,15 +68,15 @@
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.224021"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned35",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned35"
},
{
"url": "https://drive.google.com/file/d/1ncqfaxSdeu-mGVAOnYxqxYtyyFZClHBF/view",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1ncqfaxSdeu-mGVAOnYxqxYtyyFZClHBF/view"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641"
}
]
},

View File

@ -68,15 +68,15 @@
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.224022"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned36",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned36"
},
{
"url": "https://drive.google.com/file/d/1iWdqJ9PsBp1W5xINpUdQ28xbx_tB9xxf/view",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1iWdqJ9PsBp1W5xINpUdQ28xbx_tB9xxf/view"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1642",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1642"
}
]
},

View File

@ -68,15 +68,15 @@
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.224023"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned37",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned37"
},
{
"url": "https://drive.google.com/file/d/1dHdltwenfMdwAPeb3JPex0fHxfK_iLYh/view",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1dHdltwenfMdwAPeb3JPex0fHxfK_iLYh/view"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643"
}
]
},

View File

@ -68,15 +68,15 @@
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.224024"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned40",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned40"
},
{
"url": "https://drive.google.com/file/d/1TVezyDiS9Kyw7ttNlLBCstpEUqxozha0/view",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1TVezyDiS9Kyw7ttNlLBCstpEUqxozha0/view"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1644",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1644"
}
]
},

View File

@ -68,15 +68,15 @@
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.224025"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned41",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned41"
},
{
"url": "https://drive.google.com/file/d/1RmFSm1sQWwQXPXjkeZtgf8q51hGD8tTf/view",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1RmFSm1sQWwQXPXjkeZtgf8q51hGD8tTf/view"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1645",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1645"
}
]
},

View File

@ -68,15 +68,15 @@
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.224026"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned42",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned42"
},
{
"url": "https://drive.google.com/file/d/1GITWzh29cRcycVqVJgMJuX6emE_f1KPV/view",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1GITWzh29cRcycVqVJgMJuX6emE_f1KPV/view"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1646",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1646"
}
]
},