"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-04-21 17:01:36 +00:00
parent bb55574608
commit 3bb04c7855
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
8 changed files with 153 additions and 89 deletions

View File

@ -35,7 +35,7 @@
"description_data": [
{
"lang": "eng",
"value": "Combodo iTop is a web based IT Service Management tool. In versions prior to 3.0.0-beta6 the export CSV page don't properly escape the user supplied parameters, allowing for javascript injection into rendered csv files. Users are advised to upgrade. There are no known workarounds for this issue.\n"
"value": "Combodo iTop is a web based IT Service Management tool. In versions prior to 3.0.0-beta6 the export CSV page don't properly escape the user supplied parameters, allowing for javascript injection into rendered csv files. Users are advised to upgrade. There are no known workarounds for this issue."
}
]
},

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-46784",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -58,6 +58,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/166770/Linux-watch_queue-Filter-Out-Of-Bounds-Write.html",
"url": "http://packetstormsecurity.com/files/166770/Linux-watch_queue-Filter-Out-Of-Bounds-Write.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/166815/Watch-Queue-Out-Of-Bounds-Write.html",
"url": "http://packetstormsecurity.com/files/166815/Watch-Queue-Out-Of-Bounds-Write.html"
}
]
},

View File

@ -1,37 +1,37 @@
{
"impact" : {
"cvssv3" : {
"TM" : {
"E" : "H",
"RC" : "C",
"RL" : "O"
"impact": {
"cvssv3": {
"TM": {
"E": "H",
"RC": "C",
"RL": "O"
},
"BM" : {
"AC" : "L",
"I" : "L",
"S" : "C",
"UI" : "R",
"SCORE" : "5.400",
"C" : "L",
"PR" : "L",
"AV" : "N",
"A" : "N"
"BM": {
"AC": "L",
"I": "L",
"S": "C",
"UI": "R",
"SCORE": "5.400",
"C": "L",
"PR": "L",
"AV": "N",
"A": "N"
}
}
},
"affects" : {
"vendor" : {
"vendor_data" : [
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name" : "IBM",
"product" : {
"product_data" : [
"vendor_name": "IBM",
"product": {
"product_data": [
{
"product_name" : "Maximo Asset Management",
"version" : {
"version_data" : [
"product_name": "Maximo Asset Management",
"version": {
"version_data": [
{
"version_value" : "7.6.1.2"
"version_value": "7.6.1.2"
}
]
}
@ -42,49 +42,49 @@
]
}
},
"data_type" : "CVE",
"CVE_data_meta" : {
"ID" : "CVE-2022-22436",
"STATE" : "PUBLIC",
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2022-04-20T00:00:00"
"data_type": "CVE",
"CVE_data_meta": {
"ID": "CVE-2022-22436",
"STATE": "PUBLIC",
"ASSIGNER": "psirt@us.ibm.com",
"DATE_PUBLIC": "2022-04-20T00:00:00"
},
"references" : {
"reference_data" : [
"references": {
"reference_data": [
{
"title" : "IBM Security Bulletin 6573667 (Maximo Asset Management)",
"url" : "https://www.ibm.com/support/pages/node/6573667",
"refsource" : "CONFIRM",
"name" : "https://www.ibm.com/support/pages/node/6573667"
"title": "IBM Security Bulletin 6573667 (Maximo Asset Management)",
"url": "https://www.ibm.com/support/pages/node/6573667",
"refsource": "CONFIRM",
"name": "https://www.ibm.com/support/pages/node/6573667"
},
{
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/224164",
"name" : "ibm-maximo-cve202222436-xss (224164)",
"title" : "X-Force Vulnerability Report"
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/224164",
"name": "ibm-maximo-cve202222436-xss (224164)",
"title": "X-Force Vulnerability Report"
}
]
},
"description" : {
"description_data" : [
"description": {
"description_data": [
{
"lang" : "eng",
"value" : "IBM Maximo Asset Management 7.6.1.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 224164."
"lang": "eng",
"value": "IBM Maximo Asset Management 7.6.1.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 224164."
}
]
},
"problemtype" : {
"problemtype_data" : [
"problemtype": {
"problemtype_data": [
{
"description" : [
"description": [
{
"value" : "Cross-Site Scripting",
"lang" : "eng"
"value": "Cross-Site Scripting",
"lang": "eng"
}
]
}
]
},
"data_format" : "MITRE",
"data_version" : "4.0"
"data_format": "MITRE",
"data_version": "4.0"
}

View File

@ -35,7 +35,7 @@
"description_data": [
{
"lang": "eng",
"value": "Combodo iTop is a web based IT Service Management tool. In 3.0.0 beta releases prior to 3.0.0 beta3 a malicious script can be injected in tooltips using iTop customization mechanism. This provides a stored cross site scripting attack vector to authorized users of the system. Users are advised to upgrade. There are no known workarounds for this issue.\n"
"value": "Combodo iTop is a web based IT Service Management tool. In 3.0.0 beta releases prior to 3.0.0 beta3 a malicious script can be injected in tooltips using iTop customization mechanism. This provides a stored cross site scripting attack vector to authorized users of the system. Users are advised to upgrade. There are no known workarounds for this issue."
}
]
},

View File

@ -56,6 +56,11 @@
"refsource": "MISC",
"name": "https://www.manageengine.com/products/self-service-password/kb/cve-2022-28810.html",
"url": "https://www.manageengine.com/products/self-service-password/kb/cve-2022-28810.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/166816/ManageEngine-ADSelfService-Plus-Custom-Script-Execution.html",
"url": "http://packetstormsecurity.com/files/166816/ManageEngine-ADSelfService-Plus-Custom-Script-Execution.html"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-29563",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-29564",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}