diff --git a/2022/3xxx/CVE-2022-3971.json b/2022/3xxx/CVE-2022-3971.json index 9e97f8c327b..a4db6ef40ae 100644 --- a/2022/3xxx/CVE-2022-3971.json +++ b/2022/3xxx/CVE-2022-3971.json @@ -52,7 +52,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in matrix-appservice-irc up to 0.35.1. It has been declared as critical. This vulnerability affects unknown code of the file src\/datastore\/postgres\/PgDataStore.ts. The manipulation of the argument roomIds leads to sql injection. Upgrading to version 0.36.0 is able to address this issue. The name of the patch is 179313a37f06b298150edba3e2b0e5a73c1415e7. It is recommended to upgrade the affected component. VDB-213550 is the identifier assigned to this vulnerability." + "value": "A vulnerability was found in matrix-appservice-irc up to 0.35.1. It has been declared as critical. This vulnerability affects unknown code of the file src/datastore/postgres/PgDataStore.ts. The manipulation of the argument roomIds leads to sql injection. Upgrading to version 0.36.0 is able to address this issue. The name of the patch is 179313a37f06b298150edba3e2b0e5a73c1415e7. It is recommended to upgrade the affected component. VDB-213550 is the identifier assigned to this vulnerability." } ] }, @@ -60,22 +60,30 @@ "cvss": { "version": "3.1", "baseScore": "4.6", - "vectorString": "CVSS:3.1\/AV:A\/AC:H\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/matrix-org\/matrix-appservice-irc\/pull\/1619" + "url": "https://github.com/matrix-org/matrix-appservice-irc/pull/1619", + "refsource": "MISC", + "name": "https://github.com/matrix-org/matrix-appservice-irc/pull/1619" }, { - "url": "https:\/\/github.com\/matrix-org\/matrix-appservice-irc\/releases\/tag\/0.36.0" + "url": "https://github.com/matrix-org/matrix-appservice-irc/releases/tag/0.36.0", + "refsource": "MISC", + "name": "https://github.com/matrix-org/matrix-appservice-irc/releases/tag/0.36.0" }, { - "url": "https:\/\/github.com\/matrix-org\/matrix-appservice-irc\/commit\/179313a37f06b298150edba3e2b0e5a73c1415e7" + "url": "https://github.com/matrix-org/matrix-appservice-irc/commit/179313a37f06b298150edba3e2b0e5a73c1415e7", + "refsource": "MISC", + "name": "https://github.com/matrix-org/matrix-appservice-irc/commit/179313a37f06b298150edba3e2b0e5a73c1415e7" }, { - "url": "https:\/\/vuldb.com\/?id.213550" + "url": "https://vuldb.com/?id.213550", + "refsource": "MISC", + "name": "https://vuldb.com/?id.213550" } ] } diff --git a/2022/3xxx/CVE-2022-3972.json b/2022/3xxx/CVE-2022-3972.json index 8681c7bd28a..adc106de529 100644 --- a/2022/3xxx/CVE-2022-3972.json +++ b/2022/3xxx/CVE-2022-3972.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in Pingkon HMS-PHP. It has been rated as critical. This issue affects some unknown processing of the file admin\/adminlogin.php. The manipulation of the argument uname\/pass leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213551." + "value": "A vulnerability was found in Pingkon HMS-PHP. It has been rated as critical. This issue affects some unknown processing of the file admin/adminlogin.php. The manipulation of the argument uname/pass leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213551." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "7.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/Pingkon\/HMS-PHP\/issues\/1" + "url": "https://github.com/Pingkon/HMS-PHP/issues/1", + "refsource": "MISC", + "name": "https://github.com/Pingkon/HMS-PHP/issues/1" }, { - "url": "https:\/\/vuldb.com\/?id.213551" + "url": "https://vuldb.com/?id.213551", + "refsource": "MISC", + "name": "https://vuldb.com/?id.213551" } ] } diff --git a/2022/3xxx/CVE-2022-3973.json b/2022/3xxx/CVE-2022-3973.json index 04197395d57..a71c79cc1dc 100644 --- a/2022/3xxx/CVE-2022-3973.json +++ b/2022/3xxx/CVE-2022-3973.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability classified as critical has been found in Pingkon HMS-PHP. Affected is an unknown function of the file \/admin\/admin.php of the component Data Pump Metadata. The manipulation of the argument uname\/pass leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213552." + "value": "A vulnerability classified as critical has been found in Pingkon HMS-PHP. Affected is an unknown function of the file /admin/admin.php of the component Data Pump Metadata. The manipulation of the argument uname/pass leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213552." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "7.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/Pingkon\/HMS-PHP\/issues\/1" + "url": "https://github.com/Pingkon/HMS-PHP/issues/1", + "refsource": "MISC", + "name": "https://github.com/Pingkon/HMS-PHP/issues/1" }, { - "url": "https:\/\/vuldb.com\/?id.213552" + "url": "https://vuldb.com/?id.213552", + "refsource": "MISC", + "name": "https://vuldb.com/?id.213552" } ] } diff --git a/2022/3xxx/CVE-2022-3974.json b/2022/3xxx/CVE-2022-3974.json index 4cd2e62cfd6..0bc229d62f6 100644 --- a/2022/3xxx/CVE-2022-3974.json +++ b/2022/3xxx/CVE-2022-3974.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -57,19 +57,25 @@ "cvss": { "version": "3.1", "baseScore": "6.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/issues\/812" + "url": "https://github.com/axiomatic-systems/Bento4/issues/812", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/812" }, { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/files\/9987970\/mp4info_overflow_ReadPartial341.zip" + "url": "https://github.com/axiomatic-systems/Bento4/files/9987970/mp4info_overflow_ReadPartial341.zip", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/files/9987970/mp4info_overflow_ReadPartial341.zip" }, { - "url": "https:\/\/vuldb.com\/?id.213553" + "url": "https://vuldb.com/?id.213553", + "refsource": "MISC", + "name": "https://vuldb.com/?id.213553" } ] } diff --git a/2022/3xxx/CVE-2022-3975.json b/2022/3xxx/CVE-2022-3975.json index d4cb2638f64..044e1db7e8a 100644 --- a/2022/3xxx/CVE-2022-3975.json +++ b/2022/3xxx/CVE-2022-3975.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability, which was classified as problematic, has been found in NukeView CMS. Affected by this issue is the function filterAttr of the file vendor\/vinades\/nukeviet\/Core\/Request.php of the component Data URL Handler. The manipulation of the argument attrSubSet leads to cross site scripting. The attack may be launched remotely. Upgrading to version 4.5 is able to address this issue. The name of the patch is 0b3197fad950bb3383e83039a8ee4c9509b3ce02. It is recommended to upgrade the affected component. VDB-213554 is the identifier assigned to this vulnerability." + "value": "A vulnerability, which was classified as problematic, has been found in NukeView CMS. Affected by this issue is the function filterAttr of the file vendor/vinades/nukeviet/Core/Request.php of the component Data URL Handler. The manipulation of the argument attrSubSet leads to cross site scripting. The attack may be launched remotely. Upgrading to version 4.5 is able to address this issue. The name of the patch is 0b3197fad950bb3383e83039a8ee4c9509b3ce02. It is recommended to upgrade the affected component. VDB-213554 is the identifier assigned to this vulnerability." } ] }, @@ -57,19 +57,25 @@ "cvss": { "version": "3.1", "baseScore": "3.5", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/nukeviet\/nukeviet\/commit\/0b3197fad950bb3383e83039a8ee4c9509b3ce02" + "url": "https://github.com/nukeviet/nukeviet", + "refsource": "MISC", + "name": "https://github.com/nukeviet/nukeviet" }, { - "url": "https:\/\/github.com\/nukeviet\/nukeviet" + "url": "https://github.com/nukeviet/nukeviet/commit/0b3197fad950bb3383e83039a8ee4c9509b3ce02", + "refsource": "MISC", + "name": "https://github.com/nukeviet/nukeviet/commit/0b3197fad950bb3383e83039a8ee4c9509b3ce02" }, { - "url": "https:\/\/vuldb.com\/?id.213554" + "url": "https://vuldb.com/?id.213554", + "refsource": "MISC", + "name": "https://vuldb.com/?id.213554" } ] }