"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-11-13 11:00:33 +00:00
parent 9a5ea94898
commit 2f8a6531b4
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
5 changed files with 55 additions and 27 deletions

View File

@ -52,7 +52,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in matrix-appservice-irc up to 0.35.1. It has been declared as critical. This vulnerability affects unknown code of the file src\/datastore\/postgres\/PgDataStore.ts. The manipulation of the argument roomIds leads to sql injection. Upgrading to version 0.36.0 is able to address this issue. The name of the patch is 179313a37f06b298150edba3e2b0e5a73c1415e7. It is recommended to upgrade the affected component. VDB-213550 is the identifier assigned to this vulnerability."
"value": "A vulnerability was found in matrix-appservice-irc up to 0.35.1. It has been declared as critical. This vulnerability affects unknown code of the file src/datastore/postgres/PgDataStore.ts. The manipulation of the argument roomIds leads to sql injection. Upgrading to version 0.36.0 is able to address this issue. The name of the patch is 179313a37f06b298150edba3e2b0e5a73c1415e7. It is recommended to upgrade the affected component. VDB-213550 is the identifier assigned to this vulnerability."
}
]
},
@ -60,22 +60,30 @@
"cvss": {
"version": "3.1",
"baseScore": "4.6",
"vectorString": "CVSS:3.1\/AV:A\/AC:H\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/matrix-org\/matrix-appservice-irc\/pull\/1619"
"url": "https://github.com/matrix-org/matrix-appservice-irc/pull/1619",
"refsource": "MISC",
"name": "https://github.com/matrix-org/matrix-appservice-irc/pull/1619"
},
{
"url": "https:\/\/github.com\/matrix-org\/matrix-appservice-irc\/releases\/tag\/0.36.0"
"url": "https://github.com/matrix-org/matrix-appservice-irc/releases/tag/0.36.0",
"refsource": "MISC",
"name": "https://github.com/matrix-org/matrix-appservice-irc/releases/tag/0.36.0"
},
{
"url": "https:\/\/github.com\/matrix-org\/matrix-appservice-irc\/commit\/179313a37f06b298150edba3e2b0e5a73c1415e7"
"url": "https://github.com/matrix-org/matrix-appservice-irc/commit/179313a37f06b298150edba3e2b0e5a73c1415e7",
"refsource": "MISC",
"name": "https://github.com/matrix-org/matrix-appservice-irc/commit/179313a37f06b298150edba3e2b0e5a73c1415e7"
},
{
"url": "https:\/\/vuldb.com\/?id.213550"
"url": "https://vuldb.com/?id.213550",
"refsource": "MISC",
"name": "https://vuldb.com/?id.213550"
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -49,7 +49,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in Pingkon HMS-PHP. It has been rated as critical. This issue affects some unknown processing of the file admin\/adminlogin.php. The manipulation of the argument uname\/pass leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213551."
"value": "A vulnerability was found in Pingkon HMS-PHP. It has been rated as critical. This issue affects some unknown processing of the file admin/adminlogin.php. The manipulation of the argument uname/pass leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213551."
}
]
},
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "7.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/Pingkon\/HMS-PHP\/issues\/1"
"url": "https://github.com/Pingkon/HMS-PHP/issues/1",
"refsource": "MISC",
"name": "https://github.com/Pingkon/HMS-PHP/issues/1"
},
{
"url": "https:\/\/vuldb.com\/?id.213551"
"url": "https://vuldb.com/?id.213551",
"refsource": "MISC",
"name": "https://vuldb.com/?id.213551"
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -49,7 +49,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as critical has been found in Pingkon HMS-PHP. Affected is an unknown function of the file \/admin\/admin.php of the component Data Pump Metadata. The manipulation of the argument uname\/pass leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213552."
"value": "A vulnerability classified as critical has been found in Pingkon HMS-PHP. Affected is an unknown function of the file /admin/admin.php of the component Data Pump Metadata. The manipulation of the argument uname/pass leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213552."
}
]
},
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "7.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/Pingkon\/HMS-PHP\/issues\/1"
"url": "https://github.com/Pingkon/HMS-PHP/issues/1",
"refsource": "MISC",
"name": "https://github.com/Pingkon/HMS-PHP/issues/1"
},
{
"url": "https:\/\/vuldb.com\/?id.213552"
"url": "https://vuldb.com/?id.213552",
"refsource": "MISC",
"name": "https://vuldb.com/?id.213552"
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -57,19 +57,25 @@
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/issues\/812"
"url": "https://github.com/axiomatic-systems/Bento4/issues/812",
"refsource": "MISC",
"name": "https://github.com/axiomatic-systems/Bento4/issues/812"
},
{
"url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/files\/9987970\/mp4info_overflow_ReadPartial341.zip"
"url": "https://github.com/axiomatic-systems/Bento4/files/9987970/mp4info_overflow_ReadPartial341.zip",
"refsource": "MISC",
"name": "https://github.com/axiomatic-systems/Bento4/files/9987970/mp4info_overflow_ReadPartial341.zip"
},
{
"url": "https:\/\/vuldb.com\/?id.213553"
"url": "https://vuldb.com/?id.213553",
"refsource": "MISC",
"name": "https://vuldb.com/?id.213553"
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -49,7 +49,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability, which was classified as problematic, has been found in NukeView CMS. Affected by this issue is the function filterAttr of the file vendor\/vinades\/nukeviet\/Core\/Request.php of the component Data URL Handler. The manipulation of the argument attrSubSet leads to cross site scripting. The attack may be launched remotely. Upgrading to version 4.5 is able to address this issue. The name of the patch is 0b3197fad950bb3383e83039a8ee4c9509b3ce02. It is recommended to upgrade the affected component. VDB-213554 is the identifier assigned to this vulnerability."
"value": "A vulnerability, which was classified as problematic, has been found in NukeView CMS. Affected by this issue is the function filterAttr of the file vendor/vinades/nukeviet/Core/Request.php of the component Data URL Handler. The manipulation of the argument attrSubSet leads to cross site scripting. The attack may be launched remotely. Upgrading to version 4.5 is able to address this issue. The name of the patch is 0b3197fad950bb3383e83039a8ee4c9509b3ce02. It is recommended to upgrade the affected component. VDB-213554 is the identifier assigned to this vulnerability."
}
]
},
@ -57,19 +57,25 @@
"cvss": {
"version": "3.1",
"baseScore": "3.5",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/nukeviet\/nukeviet\/commit\/0b3197fad950bb3383e83039a8ee4c9509b3ce02"
"url": "https://github.com/nukeviet/nukeviet",
"refsource": "MISC",
"name": "https://github.com/nukeviet/nukeviet"
},
{
"url": "https:\/\/github.com\/nukeviet\/nukeviet"
"url": "https://github.com/nukeviet/nukeviet/commit/0b3197fad950bb3383e83039a8ee4c9509b3ce02",
"refsource": "MISC",
"name": "https://github.com/nukeviet/nukeviet/commit/0b3197fad950bb3383e83039a8ee4c9509b3ce02"
},
{
"url": "https:\/\/vuldb.com\/?id.213554"
"url": "https://vuldb.com/?id.213554",
"refsource": "MISC",
"name": "https://vuldb.com/?id.213554"
}
]
}