"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-10-17 18:00:35 +00:00
parent 1f266af93a
commit 50e1c52fdd
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
26 changed files with 461 additions and 28 deletions

View File

@ -91,6 +91,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=26224", "name": "https://sourceware.org/bugzilla/show_bug.cgi?id=26224",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26224"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
} }
] ]
} }

View File

@ -71,6 +71,11 @@
"refsource": "UBUNTU", "refsource": "UBUNTU",
"name": "USN-4416-1", "name": "USN-4416-1",
"url": "https://usn.ubuntu.com/4416-1/" "url": "https://usn.ubuntu.com/4416-1/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
} }
] ]
} }

View File

@ -131,6 +131,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0004/", "name": "https://security.netapp.com/advisory/ntap-20210205-0004/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0004/" "url": "https://security.netapp.com/advisory/ntap-20210205-0004/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
} }
] ]
} }

View File

@ -96,6 +96,11 @@
"refsource": "UBUNTU", "refsource": "UBUNTU",
"name": "USN-4416-1", "name": "USN-4416-1",
"url": "https://usn.ubuntu.com/4416-1/" "url": "https://usn.ubuntu.com/4416-1/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
} }
] ]
} }

View File

@ -86,6 +86,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8",
"url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
} }
] ]
}, },

View File

@ -81,6 +81,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html" "name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
} }
] ]
} }

View File

@ -73,6 +73,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019", "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019",
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019" "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
} }
] ]
}, },

View File

@ -71,6 +71,11 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"name": "GLSA-202107-07", "name": "GLSA-202107-07",
"url": "https://security.gentoo.org/glsa/202107-07" "url": "https://security.gentoo.org/glsa/202107-07"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
} }
] ]
} }

View File

@ -81,6 +81,11 @@
"refsource": "FEDORA", "refsource": "FEDORA",
"name": "FEDORA-2021-f29b4643c7", "name": "FEDORA-2021-f29b4643c7",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/" "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
} }
] ]
} }

View File

@ -76,6 +76,11 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"name": "GLSA-202208-24", "name": "GLSA-202208-24",
"url": "https://security.gentoo.org/glsa/202208-24" "url": "https://security.gentoo.org/glsa/202208-24"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
} }
] ]
} }

View File

@ -86,6 +86,11 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html" "name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
} }
] ]
} }

View File

@ -73,6 +73,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2021-3999", "name": "https://security-tracker.debian.org/tracker/CVE-2021-3999",
"url": "https://security-tracker.debian.org/tracker/CVE-2021-3999" "url": "https://security-tracker.debian.org/tracker/CVE-2021-3999"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
} }
] ]
}, },

View File

@ -66,6 +66,11 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"name": "GLSA-202208-24", "name": "GLSA-202208-24",
"url": "https://security.gentoo.org/glsa/202208-24" "url": "https://security.gentoo.org/glsa/202208-24"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
} }
] ]
} }

View File

@ -66,6 +66,11 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"name": "GLSA-202208-24", "name": "GLSA-202208-24",
"url": "https://security.gentoo.org/glsa/202208-24" "url": "https://security.gentoo.org/glsa/202208-24"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
} }
] ]
} }

View File

@ -1,18 +1,99 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "audit@patchstack.com",
"DATE_PUBLIC": "2022-10-12T16:31:00.000Z",
"ID": "CVE-2022-26375", "ID": "CVE-2022-26375",
"ASSIGNER": "cve@mitre.org", "STATE": "PUBLIC",
"STATE": "RESERVED" "TITLE": "WordPress AB Press Optimizer plugin <= 1.1.1 - Auth. Stored Cross-Site Scripting (XSS) vulnerability"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AB Press Optimizer (WordPress plugin)",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "<= 1.1.1",
"version_value": "1.1.1"
}
]
}
}
]
},
"vendor_name": "Mammothology"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Vulnerability discovered by ptsfence (Patchstack Alliance)"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Mammothology AB Press Optimizer plugin <= 1.1.1 on WordPress."
} }
] ]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-site Scripting (XSS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://patchstack.com/database/vulnerability/ab-press-optimizer-lite/wordpress-ab-press-optimizer-plugin-1-1-1-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"refsource": "CONFIRM",
"url": "https://patchstack.com/database/vulnerability/ab-press-optimizer-lite/wordpress-ab-press-optimizer-plugin-1-1-1-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve"
},
{
"name": "https://wordpress.org/plugins/ab-press-optimizer-lite/",
"refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/ab-press-optimizer-lite/"
}
]
},
"source": {
"discovery": "EXTERNAL"
} }
} }

View File

@ -22,7 +22,7 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "n\/a" "version_value": "n/a"
} }
] ]
} }
@ -57,16 +57,20 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "5.5", "baseScore": "5.5",
"vectorString": "CVSS:3.1\/AV:A\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L" "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/git.exim.org\/exim.git\/commit\/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2" "url": "https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2",
"refsource": "MISC",
"name": "https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2"
}, },
{ {
"url": "https:\/\/vuldb.com\/?id.211073" "url": "https://vuldb.com/?id.211073",
"refsource": "MISC",
"name": "https://vuldb.com/?id.211073"
} }
] ]
} }

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3561",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3562",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3563",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3564",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3565",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3566",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3567",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -1,17 +1,71 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-40055",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2022-40055",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "An issue in GX Group GPON ONT Titanium 2122A T2122-V1.26EXL allows attackers to escalate privileges via a brute force attack at the login page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://gpon.com",
"refsource": "MISC",
"name": "http://gpon.com"
},
{
"url": "http://gx.com",
"refsource": "MISC",
"name": "http://gx.com"
},
{
"refsource": "MISC",
"name": "https://blog.alphathreat.in/index.php?post/2022/10/01/Achieving-CVE-2022-40055",
"url": "https://blog.alphathreat.in/index.php?post/2022/10/01/Achieving-CVE-2022-40055"
} }
] ]
} }

View File

@ -1,17 +1,71 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-41751",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2022-41751",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Jhead 3.06.0.1 allows attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50 option."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/Matthias-Wandel/jhead",
"refsource": "MISC",
"name": "https://github.com/Matthias-Wandel/jhead"
},
{
"url": "https://github.com/Matthias-Wandel/jhead/blob/63ce118c6a59ea64ac357236a11a47aaf569d622/jhead.c#L788",
"refsource": "MISC",
"name": "https://github.com/Matthias-Wandel/jhead/blob/63ce118c6a59ea64ac357236a11a47aaf569d622/jhead.c#L788"
},
{
"refsource": "MISC",
"name": "https://github.com/Matthias-Wandel/jhead/pull/57",
"url": "https://github.com/Matthias-Wandel/jhead/pull/57"
} }
] ]
} }

View File

@ -1,17 +1,61 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-42029",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2022-42029",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Chamilo 1.11.16 is affected by an authenticated local file inclusion vulnerability which allows authenticated users with access to 'big file uploads' to copy/move files from anywhere in the file system into the web directory."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-95-2022-09-14-High-impact-Moderate-risk-Authenticated-Local-file-inclusion",
"refsource": "MISC",
"name": "https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-95-2022-09-14-High-impact-Moderate-risk-Authenticated-Local-file-inclusion"
} }
] ]
} }