From 43fe59f9a23b09978496937a99e551e854ebb4ad Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 8 Oct 2022 12:00:31 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/3xxx/CVE-2022-3434.json | 14 +++++++++----- 2022/3xxx/CVE-2022-3435.json | 14 +++++++++----- 2 files changed, 18 insertions(+), 10 deletions(-) diff --git a/2022/3xxx/CVE-2022-3434.json b/2022/3xxx/CVE-2022-3434.json index 8658844f4b6..a538b28d452 100644 --- a/2022/3xxx/CVE-2022-3434.json +++ b/2022/3xxx/CVE-2022-3434.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in SourceCodester Web-Based Student Clearance System. It has been rated as problematic. Affected by this issue is the function prepare of the file \/Admin\/add-student.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-210356." + "value": "A vulnerability was found in SourceCodester Web-Based Student Clearance System. It has been rated as problematic. Affected by this issue is the function prepare of the file /Admin/add-student.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-210356." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "3.5", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "https:\/\/www.jianshu.com\/p\/489bca847079" + "url": "https://www.jianshu.com/p/489bca847079", + "refsource": "MISC", + "name": "https://www.jianshu.com/p/489bca847079" }, { - "url": "https:\/\/vuldb.com\/?id.210356" + "url": "https://vuldb.com/?id.210356", + "refsource": "MISC", + "name": "https://vuldb.com/?id.210356" } ] } diff --git a/2022/3xxx/CVE-2022-3435.json b/2022/3xxx/CVE-2022-3435.json index a85cf7d52a3..34841169d95 100644 --- a/2022/3xxx/CVE-2022-3435.json +++ b/2022/3xxx/CVE-2022-3435.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net\/ipv4\/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability." + "value": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "4.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } }, "references": { "reference_data": [ { - "url": "https:\/\/lore.kernel.org\/netdev\/20221005181257.8897-1-dsahern@kernel.org\/T\/#u" + "url": "https://lore.kernel.org/netdev/20221005181257.8897-1-dsahern@kernel.org/T/#u", + "refsource": "MISC", + "name": "https://lore.kernel.org/netdev/20221005181257.8897-1-dsahern@kernel.org/T/#u" }, { - "url": "https:\/\/vuldb.com\/?id.210357" + "url": "https://vuldb.com/?id.210357", + "refsource": "MISC", + "name": "https://vuldb.com/?id.210357" } ] }