"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-01-05 19:01:09 +00:00
parent df7d3eac4f
commit 5a08d48f1c
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
10 changed files with 135 additions and 72 deletions

View File

@ -76,6 +76,11 @@
"refsource": "MISC",
"name": "https://www.crn.com/slide-shows/managed-services/connectwise-control-attack-chain-exploit-20-questions-for-security-researcher-bishop-fox",
"url": "https://www.crn.com/slide-shows/managed-services/connectwise-control-attack-chain-exploit-20-questions-for-security-researcher-bishop-fox"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/165432/ConnectWise-Control-19.2.24707-Username-Enumeration.html",
"url": "http://packetstormsecurity.com/files/165432/ConnectWise-Control-19.2.24707-Username-Enumeration.html"
}
]
}

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://www.vmware.com/security/advisories/VMSA-2022-0001.html",
"url": "https://www.vmware.com/security/advisories/VMSA-2022-0001.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html",
"url": "http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html"
}
]
},

View File

@ -1,80 +1,85 @@
{
"CVE_data_meta": {
"ID": "CVE-2021-24750",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "WP Visitor Statistics (Real Time Traffic) < 4.8 - Subscriber+ SQL Injection"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "WP Visitor Statistics (Real Time Traffic)",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "4.8",
"version_value": "4.8"
"CVE_data_meta": {
"ID": "CVE-2021-24750",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "WP Visitor Statistics (Real Time Traffic) < 4.8 - Subscriber+ SQL Injection"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "WP Visitor Statistics (Real Time Traffic)",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "4.8",
"version_value": "4.8"
}
]
}
}
]
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de",
"name": "https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de"
},
{
"refsource": "CONFIRM",
"url": "https://plugins.trac.wordpress.org/changeset/2622268",
"name": "https://plugins.trac.wordpress.org/changeset/2622268"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-89 SQL Injection",
"lang": "eng"
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks"
}
]
}
]
},
"credit": [
{
"lang": "eng",
"value": "Krzysztof Zając"
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de",
"name": "https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de"
},
{
"refsource": "CONFIRM",
"url": "https://plugins.trac.wordpress.org/changeset/2622268",
"name": "https://plugins.trac.wordpress.org/changeset/2622268"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/165433/WordPress-WP-Visitor-Statistics-4.7-SQL-Injection.html",
"url": "http://packetstormsecurity.com/files/165433/WordPress-WP-Visitor-Statistics-4.7-SQL-Injection.html"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-89 SQL Injection",
"lang": "eng"
}
]
}
]
},
"credit": [
{
"lang": "eng",
"value": "Krzysztof Zaj\u0105c"
}
],
"source": {
"discovery": "EXTERNAL"
}
],
"source": {
"discovery": "EXTERNAL"
}
}

View File

@ -91,6 +91,11 @@
"refsource": "MISC",
"url": "https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php",
"name": "https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html",
"url": "http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html"
}
]
},

View File

@ -101,6 +101,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/165207/WordPress-Catch-Themes-Demo-Import-1.6.1-Shell-Upload.html",
"url": "http://packetstormsecurity.com/files/165207/WordPress-Catch-Themes-Demo-Import-1.6.1-Shell-Upload.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/165463/WordPress-Catch-Themes-Demo-Import-Shell-Upload.html",
"url": "http://packetstormsecurity.com/files/165463/WordPress-Catch-Themes-Demo-Import-Shell-Upload.html"
}
]
},

View File

@ -61,6 +61,11 @@
"refsource": "CONFIRM",
"name": "https://community.automox.com/product-updates-4/cve-2021-43326-and-cve-2021-43325-local-privilege-escalation-in-automox-agent-windows-only-1636",
"url": "https://community.automox.com/product-updates-4/cve-2021-43326-and-cve-2021-43325-local-privilege-escalation-in-automox-agent-windows-only-1636"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/165449/Automox-Agent-32-Local-Privilege-Escalation.html",
"url": "http://packetstormsecurity.com/files/165449/Automox-Agent-32-Local-Privilege-Escalation.html"
}
]
}

View File

@ -83,6 +83,11 @@
"name": "https://github.com/Gerapy/Gerapy/commit/49bcb19be5e0320e7e1535f34fe00f16a3cf3b28",
"refsource": "MISC",
"url": "https://github.com/Gerapy/Gerapy/commit/49bcb19be5e0320e7e1535f34fe00f16a3cf3b28"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/165459/Gerapy-0.9.7-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/165459/Gerapy-0.9.7-Remote-Code-Execution.html"
}
]
},

View File

@ -61,6 +61,11 @@
"url": "https://drive.google.com/file/d/1yVuCfovUpqwp6KKZW1togf5PigxXQ3dh/view?usp=sharing",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1yVuCfovUpqwp6KKZW1togf5PigxXQ3dh/view?usp=sharing"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/165439/Safari-Montage-8.5-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/165439/Safari-Montage-8.5-Cross-Site-Scripting.html"
}
]
}

View File

@ -61,6 +61,11 @@
"url": "https://drive.google.com/file/d/1WS_pa2PzLS1EplBu7pjx7hXlyBwCepP9/view?usp=sharing",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1WS_pa2PzLS1EplBu7pjx7hXlyBwCepP9/view?usp=sharing"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/165438/Nettmp-NNT-5.1-SQL-Injection.html",
"url": "http://packetstormsecurity.com/files/165438/Nettmp-NNT-5.1-SQL-Injection.html"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0129",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}