mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
09b31dbc52
commit
222c4004ef
106
2015/10xxx/CVE-2015-10032.json
Normal file
106
2015/10xxx/CVE-2015-10032.json
Normal file
@ -0,0 +1,106 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2015-10032",
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability was found in HealthMateWeb. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file createaccount.php. The manipulation of the argument username/password/first_name/last_name/company/phone leads to cross site scripting. The attack can be launched remotely. The name of the patch is 472776c25b1046ecaf962c46fed7c713c72c28e3. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217663."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "In HealthMateWeb wurde eine problematische Schwachstelle ausgemacht. Dabei geht es um eine nicht genauer bekannte Funktion der Datei createaccount.php. Mittels Manipulieren des Arguments username/password/first_name/last_name/company/phone mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Patch wird als 472776c25b1046ecaf962c46fed7c713c72c28e3 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-79 Cross Site Scripting",
|
||||
"cweId": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "HealthMateWeb",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a",
|
||||
"version_affected": "="
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.217663",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.217663"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.217663",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.217663"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/StevenElberger/HealthMateWeb/commit/472776c25b1046ecaf962c46fed7c713c72c28e3",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/StevenElberger/HealthMateWeb/commit/472776c25b1046ecaf962c46fed7c713c72c28e3"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VulDB GitHub Commit Analyzer"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 3.5,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 3.5,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 4,
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
106
2021/4xxx/CVE-2021-4310.json
Normal file
106
2021/4xxx/CVE-2021-4310.json
Normal file
@ -0,0 +1,106 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-4310",
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability was found in 01-Scripts 01-Artikelsystem. It has been classified as problematic. Affected is an unknown function of the file 01article.php. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is ae849b347a58c2cb1be38d04bbe56fc883d5d84a. It is recommended to apply a patch to fix this issue. VDB-217662 is the identifier assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "Es wurde eine problematische Schwachstelle in 01-Scripts 01-Artikelsystem ausgemacht. Es geht dabei um eine nicht klar definierte Funktion der Datei 01article.php. Mittels dem Manipulieren des Arguments $_SERVER['PHP_SELF'] mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Patch wird als ae849b347a58c2cb1be38d04bbe56fc883d5d84a bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-79 Cross Site Scripting",
|
||||
"cweId": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "01-Scripts",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "01-Artikelsystem",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a",
|
||||
"version_affected": "="
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.217662",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.217662"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.217662",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.217662"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/01-Scripts/01-Artikelsystem/commit/ae849b347a58c2cb1be38d04bbe56fc883d5d84a",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/01-Scripts/01-Artikelsystem/commit/ae849b347a58c2cb1be38d04bbe56fc883d5d84a"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VulDB GitHub Commit Analyzer"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 3.5,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 3.5,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 4,
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -1,18 +1,86 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-43974",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2022-43974",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "MatrixSSL 4.0.4 through 4.5.1 has an integer overflow in matrixSslDecodeTls13. A remote attacker might be able to send a crafted TLS Message to cause a buffer overflow and achieve remote code execution. This is fixed in 4.6.0."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://github.com/matrixssl/matrixssl/security/advisories/GHSA-fmwc-gwc5-2g29",
|
||||
"url": "https://github.com/matrixssl/matrixssl/security/advisories/GHSA-fmwc-gwc5-2g29"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://github.com/matrixssl/matrixssl/blob/4-6-0-open/doc/CHANGES_v4.x.md",
|
||||
"url": "https://github.com/matrixssl/matrixssl/blob/4-6-0-open/doc/CHANGES_v4.x.md"
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"attackComplexity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "HIGH",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
|
||||
"version": "3.1"
|
||||
}
|
||||
}
|
||||
}
|
18
2022/44xxx/CVE-2022-44617.json
Normal file
18
2022/44xxx/CVE-2022-44617.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-44617",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/46xxx/CVE-2022-46285.json
Normal file
18
2022/46xxx/CVE-2022-46285.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-46285",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
480
2022/4xxx/CVE-2022-4882.json
Normal file
480
2022/4xxx/CVE-2022-4882.json
Normal file
@ -0,0 +1,480 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-4882",
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability was found in kaltura mwEmbed up to 2.91. It has been rated as problematic. Affected by this issue is some unknown functionality of the file modules/KalturaSupport/components/share/share.js of the component Share Plugin. The manipulation of the argument res leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.92.rc1 is able to address this issue. The name of the patch is 4f11b6f6610acd6d89de5f8be47cf7c610643845. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217664."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "Eine problematische Schwachstelle wurde in kaltura mwEmbed bis 2.91 ausgemacht. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei modules/KalturaSupport/components/share/share.js der Komponente Share Plugin. Durch das Manipulieren des Arguments res mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version 2.92.rc1 vermag dieses Problem zu l\u00f6sen. Der Patch wird als 4f11b6f6610acd6d89de5f8be47cf7c610643845 bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-79 Cross Site Scripting",
|
||||
"cweId": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "kaltura",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "mwEmbed",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "2.0",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.1",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.2",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.3",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.4",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.5",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.6",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.7",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.8",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.9",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.10",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.11",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.12",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.13",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.14",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.15",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.16",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.17",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.18",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.19",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.20",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.21",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.22",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.23",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.24",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.25",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.26",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.27",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.28",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.29",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.30",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.31",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.32",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.33",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.34",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.35",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.36",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.37",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.38",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.39",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.40",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.41",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.42",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.43",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.44",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.45",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.46",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.47",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.48",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.49",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.50",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.51",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.52",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.53",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.54",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.55",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.56",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.57",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.58",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.59",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.60",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.61",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.62",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.63",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.64",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.65",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.66",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.67",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.68",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.69",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.70",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.71",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.72",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.73",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.74",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.75",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.76",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.77",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.78",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.79",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.80",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.81",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.82",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.83",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.84",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.85",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.86",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.87",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.88",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.89",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.90",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "2.91",
|
||||
"version_affected": "="
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.217664",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.217664"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.217664",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.217664"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kaltura/mwEmbed/pull/4255",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/kaltura/mwEmbed/pull/4255"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kaltura/mwEmbed/commit/4f11b6f6610acd6d89de5f8be47cf7c610643845",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/kaltura/mwEmbed/commit/4f11b6f6610acd6d89de5f8be47cf7c610643845"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kaltura/mwEmbed/releases/tag/v2.92.rc1",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/kaltura/mwEmbed/releases/tag/v2.92.rc1"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VulDB GitHub Commit Analyzer"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 2.6,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 2.6,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 2.1,
|
||||
"vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/4xxx/CVE-2022-4883.json
Normal file
18
2022/4xxx/CVE-2022-4883.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-4883",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user