"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-11-01 20:00:38 +00:00
parent 5de4c17631
commit 295d84fa91
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
12 changed files with 372 additions and 71 deletions

View File

@ -127,6 +127,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2022-2a5de7cb8b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT213496",
"url": "https://support.apple.com/kb/HT213496"
}
]
},

View File

@ -78,6 +78,11 @@
"refsource": "MISC",
"url": "https://lists.apache.org/thread/60mgbswq2lsmrxykfxpqq13ztkm2ht6q",
"name": "https://lists.apache.org/thread/60mgbswq2lsmrxykfxpqq13ztkm2ht6q"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20221101 CVE-2022-31777: Apache Spark XSS vulnerability in log viewer UI Javascript",
"url": "http://www.openwall.com/lists/oss-security/2022/11/01/14"
}
]
},

View File

@ -73,6 +73,11 @@
"refsource": "MISC",
"url": "https://lists.apache.org/thread/pbdzqf9ntxyvs4cr0x2dgk9zlf43btz8",
"name": "https://lists.apache.org/thread/pbdzqf9ntxyvs4cr0x2dgk9zlf43btz8"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20221101 CVE-2022-34662: Apache DolphinScheduler prior to 3.0.0 allows path traversal",
"url": "http://www.openwall.com/lists/oss-security/2022/11/01/13"
}
]
},

View File

@ -81,6 +81,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221101 [SECURITY] [DLA 3175-1] python3.7 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00000.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-f2a5082860",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMIEXLMTW5GO36HTFFWIPB3OHZXCT3G4/"
}
]
}

View File

@ -104,6 +104,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2022-8b58806840",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKFHE4KVD7EKS5J3KTDFVBEKU3CLXGVV/"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT213496",
"url": "https://support.apple.com/kb/HT213496"
}
]
},

View File

@ -107,6 +107,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2022-8b58806840",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKFHE4KVD7EKS5J3KTDFVBEKU3CLXGVV/"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT213496",
"url": "https://support.apple.com/kb/HT213496"
}
]
},

View File

@ -1,35 +1,19 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3201",
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_value": "105.0.5195.125",
"version_affected": "<"
}
]
}
}
]
}
}
]
}
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient validation of untrusted input in Developer tools in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via UI interaction. (Chrome security severity: High)"
}
]
},
"problemtype": {
"problemtype_data": [
@ -43,45 +27,41 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_value": "Chrome-Release-0-M106",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
},
{
"url": "https://crbug.com/1343104",
"refsource": "MISC",
"name": "https://crbug.com/1343104"
},
{
"refsource": "GENTOO",
"name": "GLSA-202209-23",
"url": "https://security.gentoo.org/glsa/202209-23"
},
{
"refsource": "DEBIAN",
"name": "DSA-5244",
"url": "https://www.debian.org/security/2022/dsa-5244"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-3f28aa88cf",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202210-16",
"url": "https://security.gentoo.org/glsa/202210-16"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient validation of untrusted input in DevTools in Google Chrome on Chrome OS prior to 105.0.5195.125 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page."
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3305",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Use after free in survey in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chrome security severity: High)"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use after free"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_value": "Chrome-Release-0-M106",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html"
},
{
"url": "https://crbug.com/1319229",
"refsource": "MISC",
"name": "https://crbug.com/1319229"
}
]
}

View File

@ -4,14 +4,78 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3796",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "Events Calendar Plugin Event post.php cross site scripting",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "",
"product": {
"product_data": [
{
"product_name": "Events Calendar Plugin",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in Events Calendar Plugin. It has been declared as problematic. This vulnerability affects unknown code of the file post.php of the component Event Handler. The manipulation of the argument title/body leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212632."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "2.4",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N"
}
},
"references": {
"reference_data": [
{
"url": "https://drive.google.com/file/d/1NMcJYb9HyenkaSK-PxwsS5fOeY6FgrtV/edit",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1NMcJYb9HyenkaSK-PxwsS5fOeY6FgrtV/edit"
},
{
"url": "https://drive.google.com/file/d/1vineiIgIn7xyo3C0V-7__neZHcbP8pgq/view",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1vineiIgIn7xyo3C0V-7__neZHcbP8pgq/view"
},
{
"url": "https://vuldb.com/?id.212632",
"refsource": "MISC",
"name": "https://vuldb.com/?id.212632"
}
]
}

View File

@ -4,14 +4,73 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3797",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "eolinker apinto-dashboard login redirect",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "eolinker",
"product": {
"product_data": [
{
"product_name": "apinto-dashboard",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-601 Open Redirect"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in eolinker apinto-dashboard. It has been rated as problematic. This issue affects some unknown processing of the file /login. The manipulation of the argument callback leads to open redirect. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212633 was assigned to this vulnerability."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https://c2.im5i.com/2022/11/01/Xrny6.png",
"refsource": "MISC",
"name": "https://c2.im5i.com/2022/11/01/Xrny6.png"
},
{
"url": "https://vuldb.com/?id.212633",
"refsource": "MISC",
"name": "https://vuldb.com/?id.212633"
}
]
}

View File

@ -4,14 +4,73 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3798",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "IBAX go-ibax tablesInfo sql injection",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBAX",
"product": {
"product_data": [
{
"product_name": "go-ibax",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-89 SQL Injection"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as critical has been found in IBAX go-ibax. Affected is an unknown function of the file /api/v2/open/tablesInfo. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-212634 is the identifier assigned to this vulnerability."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/IBAX-io/go-ibax/issues/2060",
"refsource": "MISC",
"name": "https://github.com/IBAX-io/go-ibax/issues/2060"
},
{
"url": "https://vuldb.com/?id.212634",
"refsource": "MISC",
"name": "https://vuldb.com/?id.212634"
}
]
}

View File

@ -4,14 +4,73 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3799",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "IBAX go-ibax tablesInfo sql injection",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBAX",
"product": {
"product_data": [
{
"product_name": "go-ibax",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-89 SQL Injection"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as critical was found in IBAX go-ibax. Affected by this vulnerability is an unknown functionality of the file /api/v2/open/tablesInfo. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212635."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/IBAX-io/go-ibax/issues/2060",
"refsource": "MISC",
"name": "https://github.com/IBAX-io/go-ibax/issues/2060"
},
{
"url": "https://vuldb.com/?id.212635",
"refsource": "MISC",
"name": "https://vuldb.com/?id.212635"
}
]
}