mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
fbe4eb15cb
commit
210f615cbc
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.maxpatrol.com/mp_advisory.asp",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.maxpatrol.com/mp_advisory.asp"
|
||||
},
|
||||
{
|
||||
"name": "11434",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11434"
|
||||
},
|
||||
{
|
||||
"name": "http://www.maxpatrol.com/mp_advisory.asp",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.maxpatrol.com/mp_advisory.asp"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "11418",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11418"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mailenable.com/professionalhistory.asp",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://www.mailenable.com/enterprisehistory.asp",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mailenable.com/enterprisehistory.asp"
|
||||
},
|
||||
{
|
||||
"name": "11418",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11418"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "11424",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11424"
|
||||
},
|
||||
{
|
||||
"name": "http://www.maxpatrol.com/mp_advisory.asp",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://www.maxpatrol.com/advdetails.asp?id=14",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.maxpatrol.com/advdetails.asp?id=14"
|
||||
},
|
||||
{
|
||||
"name": "11424",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11424"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "14716",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14716"
|
||||
},
|
||||
{
|
||||
"name": "http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=195",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=316038",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=316038"
|
||||
},
|
||||
{
|
||||
"name": "14716",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14716"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.gulftech.org/?node=research&article_id=00065-03292005",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.gulftech.org/?node=research&article_id=00065-03292005"
|
||||
},
|
||||
{
|
||||
"name": "12917",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/12917"
|
||||
},
|
||||
{
|
||||
"name": "http://www.gulftech.org/?node=research&article_id=00065-03292005",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.gulftech.org/?node=research&article_id=00065-03292005"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Multiple SQL injection vulnerabilities in ProductCart 2.7 allow remote attackers to execute arbitrary SQL commands via (1) the Category or resultCnt parameters to advSearch_h.asp, and possibly (2) the offset parameter to tarinasworld_butterflyjournal.asp. NOTE: it is possible that item (2) is the result of a typo or editing error from the original research report."
|
||||
"value": "Multiple SQL injection vulnerabilities in ProductCart 2.7 allow remote attackers to execute arbitrary SQL commands via (1) the Category or resultCnt parameters to advSearch_h.asp, and possibly (2) the offset parameter to tarinasworld_butterflyjournal.asp. NOTE: it is possible that item (2) is the result of a typo or editing error from the original research report."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=313436",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=313436"
|
||||
},
|
||||
{
|
||||
"name": "14571",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14571"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=313436",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=313436"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY68825&apar=only"
|
||||
},
|
||||
{
|
||||
"name": "http://www.niscc.gov.uk/niscc/docs/br-20050405-00278.html?lang=en",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.niscc.gov.uk/niscc/docs/br-20050405-00278.html?lang=en"
|
||||
},
|
||||
{
|
||||
"name": "14856",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14856"
|
||||
},
|
||||
{
|
||||
"name": "http://www.niscc.gov.uk/niscc/docs/br-20050405-00278.html?lang=en",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.niscc.gov.uk/niscc/docs/br-20050405-00278.html?lang=en"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.xerox.com/downloads/usa/en/c/cert_XRX05_006.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX05_006.pdf"
|
||||
},
|
||||
{
|
||||
"name": "15970",
|
||||
"refsource": "SECUNIA",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1014429",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1014429"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xerox.com/downloads/usa/en/c/cert_XRX05_006.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX05_006.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.ihsteam.com/download/ihsexpl/dlm.c",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.ihsteam.com/download/ihsexpl/dlm.c"
|
||||
},
|
||||
{
|
||||
"name": "1014404",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1014404"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ihsteam.com/download/ihsexpl/dlm.c",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.ihsteam.com/download/ihsexpl/dlm.c"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft MSN Messenger allows remote attackers to cause a denial of service via a plaintext message containing the \".pif\" string, which is interpreted as a malicious file extension and causes users to be kicked from a group conversation. NOTE: it has been reported that Gaim is also affected, so this may be an issue in the protocol or MSN servers."
|
||||
"value": "Microsoft MSN Messenger allows remote attackers to cause a denial of service via a plaintext message containing the \".pif\" string, which is interpreted as a malicious file extension and causes users to be kicked from a group conversation. NOTE: it has been reported that Gaim is also affected, so this may be an issue in the protocol or MSN servers."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1014444",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1014444"
|
||||
},
|
||||
{
|
||||
"name": "http://www.digitalparadox.org/viewadvisories.ah?view=45",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://www.messenger-blog.com/?p=146",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.messenger-blog.com/?p=146"
|
||||
},
|
||||
{
|
||||
"name": "1014444",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1014444"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,25 +57,25 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15636"
|
||||
},
|
||||
{
|
||||
"name": "http://www.caughq.org/advisories/CAU-2005-0004.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.caughq.org/advisories/CAU-2005-0004.txt"
|
||||
},
|
||||
{
|
||||
"name": "13912",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/13912"
|
||||
},
|
||||
{
|
||||
"name": "http://www.security-focus.com/advisories/8819",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.security-focus.com/advisories/8819"
|
||||
},
|
||||
{
|
||||
"name": "1014132",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1014132"
|
||||
},
|
||||
{
|
||||
"name": "http://www.caughq.org/advisories/CAU-2005-0004.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.caughq.org/advisories/CAU-2005-0004.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://www.security-focus.com/advisories/8819",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.security-focus.com/advisories/8819"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,61 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-29214",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2020-29214",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "SQL injection vulnerability in SourceCodester Alumni Management System 1.0 allows the user to inject SQL payload to bypass the authentication via admin/login.php."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"name": "48883",
|
||||
"url": "https://www.exploit-db.com/exploits/48883"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,61 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-29215",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2020-29215",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A Cross Site Scripting in SourceCodester Employee Management System 1.0 allows the user to execute alert messages via /Employee Management System/addemp.php on admin account."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"name": "48881",
|
||||
"url": "https://www.exploit-db.com/exploits/48881"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -48,8 +48,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-NEDB-1305279"
|
||||
"refsource": "MISC",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-NEDB-1305279",
|
||||
"name": "https://snyk.io/vuln/SNYK-JS-NEDB-1305279"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -57,7 +58,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "This affects all versions of package nedb.\n The library could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor.prototype payload.\r\n\r\n"
|
||||
"value": "This affects all versions of package nedb. The library could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor.prototype payload."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,14 +4,58 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-27388",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "productcert@siemens.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SINAMICS Medium Voltage Products, Remote Access",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "SINAMICS SL150: All versions, SINAMICS SM150: All versions, SINAMICS SM150i: All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "IMPROPER INPUT VALIDATION CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-04",
|
||||
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-04"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "SINAMICS medium voltage routable products are affected by a vulnerability in the Sm@rtServer component for remote access that could allow an unauthenticated attacker to cause a denial-of-service condition, and/or execution of limited configuration modifications and/or execution of limited control commands on the SINAMICS Medium Voltage Products, Remote Access (SINAMICS SL150: All versions, SINAMICS SM150: All versions, SINAMICS SM150i: All versions)."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user