diff --git a/2022/32xxx/CVE-2022-32199.json b/2022/32xxx/CVE-2022-32199.json index 7369220a56d..9df1f331fc5 100644 --- a/2022/32xxx/CVE-2022-32199.json +++ b/2022/32xxx/CVE-2022-32199.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-32199", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-32199", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "db_convert.php in ScriptCase through 9.9.008 is vulnerable to Arbitrary File Deletion by an admin via a directory traversal sequence in the file parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.scriptcase.net/download/", + "refsource": "MISC", + "name": "https://www.scriptcase.net/download/" + }, + { + "refsource": "MISC", + "name": "https://github.com/Toxich4/CVE-2022-32199", + "url": "https://github.com/Toxich4/CVE-2022-32199" } ] } diff --git a/2023/1xxx/CVE-2023-1458.json b/2023/1xxx/CVE-2023-1458.json index 38a2e9bd395..87a8d0ef906 100644 --- a/2023/1xxx/CVE-2023-1458.json +++ b/2023/1xxx/CVE-2023-1458.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been found in Ubiquiti EdgeRouter X 2.0.9-hotfix.6 and classified as critical. Affected by this vulnerability is an unknown functionality of the component OSPF Handler. The manipulation of the argument area leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-223303. NOTE: The vendor position is that post-authentication issues are not accepted as vulnerabilities." + "value": "** DISPUTED ** A vulnerability has been found in Ubiquiti EdgeRouter X 2.0.9-hotfix.6 and classified as critical. Affected by this vulnerability is an unknown functionality of the component OSPF Handler. The manipulation of the argument area leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-223303. NOTE: The vendor position is that post-authentication issues are not accepted as vulnerabilities." } ] }, diff --git a/2023/1xxx/CVE-2023-1638.json b/2023/1xxx/CVE-2023-1638.json index 55472aacc82..aef7ce75550 100644 --- a/2023/1xxx/CVE-2023-1638.json +++ b/2023/1xxx/CVE-2023-1638.json @@ -68,15 +68,15 @@ "refsource": "MISC", "name": "https://vuldb.com/?ctiid.224018" }, - { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned32", - "refsource": "MISC", - "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned32" - }, { "url": "https://drive.google.com/file/d/1_jYlCkQMNaUwGV5QJtyz4zhdTqaGCv6Z/view", "refsource": "MISC", "name": "https://drive.google.com/file/d/1_jYlCkQMNaUwGV5QJtyz4zhdTqaGCv6Z/view" + }, + { + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1638", + "refsource": "MISC", + "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1638" } ] }, diff --git a/2023/1xxx/CVE-2023-1639.json b/2023/1xxx/CVE-2023-1639.json index 5938b4626f9..1aedbb4e993 100644 --- a/2023/1xxx/CVE-2023-1639.json +++ b/2023/1xxx/CVE-2023-1639.json @@ -68,15 +68,15 @@ "refsource": "MISC", "name": "https://vuldb.com/?ctiid.224019" }, - { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned33", - "refsource": "MISC", - "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned33" - }, { "url": "https://drive.google.com/file/d/1hWgHhboaekq4hGIj2kNgEI54rM-u_rvV/view", "refsource": "MISC", "name": "https://drive.google.com/file/d/1hWgHhboaekq4hGIj2kNgEI54rM-u_rvV/view" + }, + { + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1639", + "refsource": "MISC", + "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1639" } ] }, diff --git a/2023/1xxx/CVE-2023-1640.json b/2023/1xxx/CVE-2023-1640.json index 29f3c71974d..7b1c675ae63 100644 --- a/2023/1xxx/CVE-2023-1640.json +++ b/2023/1xxx/CVE-2023-1640.json @@ -68,15 +68,15 @@ "refsource": "MISC", "name": "https://vuldb.com/?ctiid.224020" }, - { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned34", - "refsource": "MISC", - "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned34" - }, { "url": "https://drive.google.com/file/d/1AcwSxTA0_zh7mmxU5J8WphRqg_mQsO-g/view", "refsource": "MISC", "name": "https://drive.google.com/file/d/1AcwSxTA0_zh7mmxU5J8WphRqg_mQsO-g/view" + }, + { + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1640", + "refsource": "MISC", + "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1640" } ] }, diff --git a/2023/1xxx/CVE-2023-1641.json b/2023/1xxx/CVE-2023-1641.json index ad23a4d9e1a..22e0c9164d2 100644 --- a/2023/1xxx/CVE-2023-1641.json +++ b/2023/1xxx/CVE-2023-1641.json @@ -68,15 +68,15 @@ "refsource": "MISC", "name": "https://vuldb.com/?ctiid.224021" }, - { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned35", - "refsource": "MISC", - "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned35" - }, { "url": "https://drive.google.com/file/d/1ncqfaxSdeu-mGVAOnYxqxYtyyFZClHBF/view", "refsource": "MISC", "name": "https://drive.google.com/file/d/1ncqfaxSdeu-mGVAOnYxqxYtyyFZClHBF/view" + }, + { + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641", + "refsource": "MISC", + "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641" } ] }, diff --git a/2023/1xxx/CVE-2023-1642.json b/2023/1xxx/CVE-2023-1642.json index cf1cffa84a8..db3c57a7897 100644 --- a/2023/1xxx/CVE-2023-1642.json +++ b/2023/1xxx/CVE-2023-1642.json @@ -68,15 +68,15 @@ "refsource": "MISC", "name": "https://vuldb.com/?ctiid.224022" }, - { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned36", - "refsource": "MISC", - "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned36" - }, { "url": "https://drive.google.com/file/d/1iWdqJ9PsBp1W5xINpUdQ28xbx_tB9xxf/view", "refsource": "MISC", "name": "https://drive.google.com/file/d/1iWdqJ9PsBp1W5xINpUdQ28xbx_tB9xxf/view" + }, + { + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1642", + "refsource": "MISC", + "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1642" } ] }, diff --git a/2023/1xxx/CVE-2023-1643.json b/2023/1xxx/CVE-2023-1643.json index ae10e06644a..c761c935a0a 100644 --- a/2023/1xxx/CVE-2023-1643.json +++ b/2023/1xxx/CVE-2023-1643.json @@ -68,15 +68,15 @@ "refsource": "MISC", "name": "https://vuldb.com/?ctiid.224023" }, - { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned37", - "refsource": "MISC", - "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned37" - }, { "url": "https://drive.google.com/file/d/1dHdltwenfMdwAPeb3JPex0fHxfK_iLYh/view", "refsource": "MISC", "name": "https://drive.google.com/file/d/1dHdltwenfMdwAPeb3JPex0fHxfK_iLYh/view" + }, + { + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643", + "refsource": "MISC", + "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643" } ] }, diff --git a/2023/1xxx/CVE-2023-1644.json b/2023/1xxx/CVE-2023-1644.json index e5cb4f1296a..974f38b4800 100644 --- a/2023/1xxx/CVE-2023-1644.json +++ b/2023/1xxx/CVE-2023-1644.json @@ -68,15 +68,15 @@ "refsource": "MISC", "name": "https://vuldb.com/?ctiid.224024" }, - { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned40", - "refsource": "MISC", - "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned40" - }, { "url": "https://drive.google.com/file/d/1TVezyDiS9Kyw7ttNlLBCstpEUqxozha0/view", "refsource": "MISC", "name": "https://drive.google.com/file/d/1TVezyDiS9Kyw7ttNlLBCstpEUqxozha0/view" + }, + { + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1644", + "refsource": "MISC", + "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1644" } ] }, diff --git a/2023/1xxx/CVE-2023-1645.json b/2023/1xxx/CVE-2023-1645.json index a7058f67ad3..91870ad8af9 100644 --- a/2023/1xxx/CVE-2023-1645.json +++ b/2023/1xxx/CVE-2023-1645.json @@ -68,15 +68,15 @@ "refsource": "MISC", "name": "https://vuldb.com/?ctiid.224025" }, - { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned41", - "refsource": "MISC", - "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned41" - }, { "url": "https://drive.google.com/file/d/1RmFSm1sQWwQXPXjkeZtgf8q51hGD8tTf/view", "refsource": "MISC", "name": "https://drive.google.com/file/d/1RmFSm1sQWwQXPXjkeZtgf8q51hGD8tTf/view" + }, + { + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1645", + "refsource": "MISC", + "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1645" } ] }, diff --git a/2023/1xxx/CVE-2023-1646.json b/2023/1xxx/CVE-2023-1646.json index eac76841755..daa4c707766 100644 --- a/2023/1xxx/CVE-2023-1646.json +++ b/2023/1xxx/CVE-2023-1646.json @@ -68,15 +68,15 @@ "refsource": "MISC", "name": "https://vuldb.com/?ctiid.224026" }, - { - "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned42", - "refsource": "MISC", - "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned42" - }, { "url": "https://drive.google.com/file/d/1GITWzh29cRcycVqVJgMJuX6emE_f1KPV/view", "refsource": "MISC", "name": "https://drive.google.com/file/d/1GITWzh29cRcycVqVJgMJuX6emE_f1KPV/view" + }, + { + "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1646", + "refsource": "MISC", + "name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1646" } ] },