"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-09-07 20:00:34 +00:00
parent 244152e383
commit 4e407d3ce3
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
3 changed files with 32 additions and 90 deletions

View File

@ -4,75 +4,22 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-20049",
"TITLE": "AXIS P1204/P3225/P3367/M3045/M3005/M3007 CGI Script privileges management",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "product-security@axis.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "AXIS",
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "P1204",
"product_name": "AXIS OS",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
},
{
"product_name": "P3225",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
},
{
"product_name": "P3367",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
},
{
"product_name": "M3045",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
},
{
"product_name": "M3005",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
},
{
"product_name": "M3007",
"version": {
"version_data": [
{
"version_value": "n/a"
"version_value": "All firmware versions prior to 5.65"
}
]
}
@ -89,39 +36,26 @@
"description": [
{
"lang": "eng",
"value": "CWE-269 Improper Privilege Management"
"value": "Boa web server runs as root in legacy devices"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.axis.com/dam/public/df/f3/dd/cve-2017-20049-en-US-376956.pdf",
"url": "https://www.axis.com/dam/public/df/f3/dd/cve-2017-20049-en-US-376956.pdf"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability, which was classified as critical, was found in AXIS P1204, P3225, P3367, M3045, M3005 and M3007. This affects an unknown part of the component CGI Script. The manipulation leads to improper privilege management. It is possible to initiate the attack remotely. It is recommended to upgrade the affected component."
}
]
},
"credit": "David Wearing",
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "8.8",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
},
"references": {
"reference_data": [
{
"url": "http://seclists.org/fulldisclosure/2017/Mar/41",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2017/Mar/41"
},
{
"url": "https://vuldb.com/?id.98913",
"refsource": "MISC",
"name": "https://vuldb.com/?id.98913"
"value": "A vulnerability, was found in legacy Axis devices such as P3225 and M3005. This affects an unknown part of the component CGI Script. The manipulation leads to improper privilege management. It is possible to initiate the attack remotely."
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -49,7 +49,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in codeprojects Online Driving School. It has been rated as critical. Affected by this issue is some unknown functionality of the file \/registration.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-207872."
"value": "A vulnerability was found in codeprojects Online Driving School. It has been rated as critical. Affected by this issue is some unknown functionality of the file /registration.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-207872."
}
]
},
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/KingBridgeSS\/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities\/blob\/main\/arbitrary_file_upload.md"
"url": "https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/arbitrary_file_upload.md",
"refsource": "MISC",
"name": "https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/arbitrary_file_upload.md"
},
{
"url": "https:\/\/vuldb.com\/?id.207872"
"url": "https://vuldb.com/?id.207872",
"refsource": "MISC",
"name": "https://vuldb.com/?id.207872"
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -49,7 +49,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as critical has been found in codeprojects Online Driving School. This affects an unknown part of the file \/login.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-207873 was assigned to this vulnerability."
"value": "A vulnerability classified as critical has been found in codeprojects Online Driving School. This affects an unknown part of the file /login.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-207873 was assigned to this vulnerability."
}
]
},
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "7.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/KingBridgeSS\/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities\/blob\/main\/sql_injection.md"
"url": "https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/sql_injection.md",
"refsource": "MISC",
"name": "https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/sql_injection.md"
},
{
"url": "https:\/\/vuldb.com\/?id.207873"
"url": "https://vuldb.com/?id.207873",
"refsource": "MISC",
"name": "https://vuldb.com/?id.207873"
}
]
}