From 1570380068aee1ba69313c150c30ecf77469d3cc Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 24 Feb 2023 09:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/1xxx/CVE-2023-1005.json | 96 +++++++++++++++++++++++++++++-- 2023/1xxx/CVE-2023-1006.json | 101 +++++++++++++++++++++++++++++++++ 2023/26xxx/CVE-2023-26512.json | 18 ++++++ 3 files changed, 211 insertions(+), 4 deletions(-) create mode 100644 2023/1xxx/CVE-2023-1006.json create mode 100644 2023/26xxx/CVE-2023-26512.json diff --git a/2023/1xxx/CVE-2023-1005.json b/2023/1xxx/CVE-2023-1005.json index 6a69df730f3..102cfd21bc5 100644 --- a/2023/1xxx/CVE-2023-1005.json +++ b/2023/1xxx/CVE-2023-1005.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-1005", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in JP1016 Markdown-Electron and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to code injection. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. VDB-221738 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in JP1016 Markdown-Electron gefunden. Sie wurde als kritisch eingestuft. Betroffen davon ist ein unbekannter Prozess. Dank der Manipulation mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Dieses Produkt verzichtet auf eine Versionierung und verwendet stattdessen Rolling Releases. Deshalb sind keine Details zu betroffenen oder zu aktualisierende Versionen vorhanden." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-94 Code Injection", + "cweId": "CWE-94" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "JP1016", + "product": { + "product_data": [ + { + "product_name": "Markdown-Electron", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "n/a" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.221738", + "refsource": "MISC", + "name": "https://vuldb.com/?id.221738" + }, + { + "url": "https://vuldb.com/?ctiid.221738", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.221738" + }, + { + "url": "https://github.com/JP1016/Markdown-Electron/issues/3", + "refsource": "MISC", + "name": "https://github.com/JP1016/Markdown-Electron/issues/3" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Tom23 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.3, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.3, + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4.3, + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/1xxx/CVE-2023-1006.json b/2023/1xxx/CVE-2023-1006.json new file mode 100644 index 00000000000..099a205be11 --- /dev/null +++ b/2023/1xxx/CVE-2023-1006.json @@ -0,0 +1,101 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2023-1006", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability was found in SourceCodester Medical Certificate Generator App 1.0. It has been classified as problematic. This affects an unknown part of the component New Record Handler. The manipulation of the argument lastname with the input \"> leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-221739." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in SourceCodester Medical Certificate Generator App 1.0 ausgemacht. Sie wurde als problematisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Komponente New Record Handler. Dank Manipulation des Arguments lastname mit der Eingabe \"> mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross Site Scripting", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Medical Certificate Generator App", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.221739", + "refsource": "MISC", + "name": "https://vuldb.com/?id.221739" + }, + { + "url": "https://vuldb.com/?ctiid.221739", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.221739" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "sk3l10x1ng (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.5, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseSeverity": "MEDIUM" + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26512.json b/2023/26xxx/CVE-2023-26512.json new file mode 100644 index 00000000000..874134c647f --- /dev/null +++ b/2023/26xxx/CVE-2023-26512.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-26512", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file