From 357862a10f17b7395ef00a4457152178ee36f2ab Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Aug 2022 12:00:53 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/2xxx/CVE-2022-2671.json | 8 +++++--- 2022/2xxx/CVE-2022-2672.json | 10 ++++++---- 2022/2xxx/CVE-2022-2673.json | 8 +++++--- 2022/2xxx/CVE-2022-2674.json | 8 +++++--- 4 files changed, 21 insertions(+), 13 deletions(-) diff --git a/2022/2xxx/CVE-2022-2671.json b/2022/2xxx/CVE-2022-2671.json index cf8969ea2e4..346c0e2bd64 100644 --- a/2022/2xxx/CVE-2022-2671.json +++ b/2022/2xxx/CVE-2022-2671.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -57,13 +57,15 @@ "cvss": { "version": "3.1", "baseScore": "6.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/vuldb.com\/?id.205655" + "url": "https://vuldb.com/?id.205655", + "refsource": "MISC", + "name": "https://vuldb.com/?id.205655" } ] } diff --git a/2022/2xxx/CVE-2022-2672.json b/2022/2xxx/CVE-2022-2672.json index 9a1958b893b..025cff95feb 100644 --- a/2022/2xxx/CVE-2022-2672.json +++ b/2022/2xxx/CVE-2022-2672.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in SourceCodester Garage Management System. It has been classified as critical. Affected is an unknown function of the file createUser.php. The manipulation of the argument userName\/uemail leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205656." + "value": "A vulnerability was found in SourceCodester Garage Management System. It has been classified as critical. Affected is an unknown function of the file createUser.php. The manipulation of the argument userName/uemail leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205656." } ] }, @@ -57,13 +57,15 @@ "cvss": { "version": "3.1", "baseScore": "6.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/vuldb.com\/?id.205656" + "url": "https://vuldb.com/?id.205656", + "refsource": "MISC", + "name": "https://vuldb.com/?id.205656" } ] } diff --git a/2022/2xxx/CVE-2022-2673.json b/2022/2xxx/CVE-2022-2673.json index 49627f94f53..c3de6fb0c69 100644 --- a/2022/2xxx/CVE-2022-2673.json +++ b/2022/2xxx/CVE-2022-2673.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in Rigatur Online Booking and Hotel Management System aff6409. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file login.php of the component POST Request Handler. The manipulation of the argument email\/pass leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205657 was assigned to this vulnerability." + "value": "A vulnerability was found in Rigatur Online Booking and Hotel Management System aff6409. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file login.php of the component POST Request Handler. The manipulation of the argument email/pass leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205657 was assigned to this vulnerability." } ] }, @@ -57,13 +57,15 @@ "cvss": { "version": "3.1", "baseScore": "6.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/vuldb.com\/?id.205657" + "url": "https://vuldb.com/?id.205657", + "refsource": "MISC", + "name": "https://vuldb.com/?id.205657" } ] } diff --git a/2022/2xxx/CVE-2022-2674.json b/2022/2xxx/CVE-2022-2674.json index 44ee4318d5b..c9632155f71 100644 --- a/2022/2xxx/CVE-2022-2674.json +++ b/2022/2xxx/CVE-2022-2674.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -57,13 +57,15 @@ "cvss": { "version": "3.1", "baseScore": "7.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/vuldb.com\/?id.205658" + "url": "https://vuldb.com/?id.205658", + "refsource": "MISC", + "name": "https://vuldb.com/?id.205658" } ] }