From 5fd6bfa8b39f174254e69b4c2b28d56728dd12c4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 9 Jun 2022 23:01:54 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2017/20xxx/CVE-2017-20018.json | 10 +++++++--- 2017/20xxx/CVE-2017-20019.json | 12 ++++++++---- 2017/20xxx/CVE-2017-20020.json | 12 ++++++++---- 2017/20xxx/CVE-2017-20021.json | 12 ++++++++---- 2017/20xxx/CVE-2017-20022.json | 12 ++++++++---- 2017/20xxx/CVE-2017-20023.json | 12 ++++++++---- 2017/20xxx/CVE-2017-20024.json | 12 ++++++++---- 2017/20xxx/CVE-2017-20025.json | 12 ++++++++---- 2017/20xxx/CVE-2017-20026.json | 10 +++++++--- 2017/20xxx/CVE-2017-20027.json | 10 +++++++--- 2017/20xxx/CVE-2017-20028.json | 12 ++++++++---- 11 files changed, 85 insertions(+), 41 deletions(-) diff --git a/2017/20xxx/CVE-2017-20018.json b/2017/20xxx/CVE-2017-20018.json index b10a3df6854..b047127505d 100644 --- a/2017/20xxx/CVE-2017-20018.json +++ b/2017/20xxx/CVE-2017-20018.json @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "6.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/packetstormsecurity.com\/files\/142406\/xampp-dllhijack.txt" + "url": "https://packetstormsecurity.com/files/142406/xampp-dllhijack.txt", + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/142406/xampp-dllhijack.txt" }, { - "url": "https:\/\/vuldb.com\/?id.100950" + "url": "https://vuldb.com/?id.100950", + "refsource": "MISC", + "name": "https://vuldb.com/?id.100950" } ] } diff --git a/2017/20xxx/CVE-2017-20019.json b/2017/20xxx/CVE-2017-20019.json index bfbcb0d6df5..99953441732 100644 --- a/2017/20xxx/CVE-2017-20019.json +++ b/2017/20xxx/CVE-2017-20019.json @@ -52,7 +52,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability classified as problematic was found in Solare Solar-Log 2.8.4-56\/3.5.2-85. Affected by this vulnerability is an unknown functionality of the component Config Handler. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." + "value": "A vulnerability classified as problematic was found in Solare Solar-Log 2.8.4-56/3.5.2-85. Affected by this vulnerability is an unknown functionality of the component Config Handler. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." } ] }, @@ -61,16 +61,20 @@ "cvss": { "version": "3.1", "baseScore": "4.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Mar\/58" + "url": "http://seclists.org/fulldisclosure/2017/Mar/58", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Mar/58" }, { - "url": "https:\/\/vuldb.com\/?id.98929" + "url": "https://vuldb.com/?id.98929", + "refsource": "MISC", + "name": "https://vuldb.com/?id.98929" } ] } diff --git a/2017/20xxx/CVE-2017-20020.json b/2017/20xxx/CVE-2017-20020.json index 6bb1246006e..dd11d101ee0 100644 --- a/2017/20xxx/CVE-2017-20020.json +++ b/2017/20xxx/CVE-2017-20020.json @@ -52,7 +52,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability, which was classified as problematic, has been found in Solare Solar-Log 2.8.4-56\/3.5.2-85. Affected by this issue is some unknown functionality. The manipulation leads to cross site request forgery. The attack may be launched remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." + "value": "A vulnerability, which was classified as problematic, has been found in Solare Solar-Log 2.8.4-56/3.5.2-85. Affected by this issue is some unknown functionality. The manipulation leads to cross site request forgery. The attack may be launched remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." } ] }, @@ -61,16 +61,20 @@ "cvss": { "version": "3.1", "baseScore": "5.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Mar\/58" + "url": "http://seclists.org/fulldisclosure/2017/Mar/58", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Mar/58" }, { - "url": "https:\/\/vuldb.com\/?id.98930" + "url": "https://vuldb.com/?id.98930", + "refsource": "MISC", + "name": "https://vuldb.com/?id.98930" } ] } diff --git a/2017/20xxx/CVE-2017-20021.json b/2017/20xxx/CVE-2017-20021.json index 6a2156fa1dc..98b86b23988 100644 --- a/2017/20xxx/CVE-2017-20021.json +++ b/2017/20xxx/CVE-2017-20021.json @@ -52,7 +52,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability, which was classified as critical, was found in Solare Solar-Log 2.8.4-56\/3.5.2-85. This affects an unknown part of the component File Upload. The manipulation leads to privilege escalation. It is possible to initiate the attack remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." + "value": "A vulnerability, which was classified as critical, was found in Solare Solar-Log 2.8.4-56/3.5.2-85. This affects an unknown part of the component File Upload. The manipulation leads to privilege escalation. It is possible to initiate the attack remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." } ] }, @@ -61,16 +61,20 @@ "cvss": { "version": "3.1", "baseScore": "6.5", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Mar\/58" + "url": "http://seclists.org/fulldisclosure/2017/Mar/58", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Mar/58" }, { - "url": "https:\/\/vuldb.com\/?id.98931" + "url": "https://vuldb.com/?id.98931", + "refsource": "MISC", + "name": "https://vuldb.com/?id.98931" } ] } diff --git a/2017/20xxx/CVE-2017-20022.json b/2017/20xxx/CVE-2017-20022.json index 64842d6b723..1cc8d2dda32 100644 --- a/2017/20xxx/CVE-2017-20022.json +++ b/2017/20xxx/CVE-2017-20022.json @@ -52,7 +52,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been found in Solare Solar-Log 2.8.4-56\/3.5.2-85 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to information disclosure. The attack can be initiated remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." + "value": "A vulnerability has been found in Solare Solar-Log 2.8.4-56/3.5.2-85 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to information disclosure. The attack can be initiated remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." } ] }, @@ -61,16 +61,20 @@ "cvss": { "version": "3.1", "baseScore": "2.9", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Mar\/58" + "url": "http://seclists.org/fulldisclosure/2017/Mar/58", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Mar/58" }, { - "url": "https:\/\/vuldb.com\/?id.98932" + "url": "https://vuldb.com/?id.98932", + "refsource": "MISC", + "name": "https://vuldb.com/?id.98932" } ] } diff --git a/2017/20xxx/CVE-2017-20023.json b/2017/20xxx/CVE-2017-20023.json index ca3a0d86c5e..e99da04fa5c 100644 --- a/2017/20xxx/CVE-2017-20023.json +++ b/2017/20xxx/CVE-2017-20023.json @@ -52,7 +52,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in Solare Solar-Log 2.8.4-56\/3.5.2-85 and classified as critical. This issue affects some unknown processing of the component Network Config. The manipulation leads to privilege escalation. The attack may be initiated remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." + "value": "A vulnerability was found in Solare Solar-Log 2.8.4-56/3.5.2-85 and classified as critical. This issue affects some unknown processing of the component Network Config. The manipulation leads to privilege escalation. The attack may be initiated remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." } ] }, @@ -61,16 +61,20 @@ "cvss": { "version": "3.1", "baseScore": "6.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Mar\/58" + "url": "http://seclists.org/fulldisclosure/2017/Mar/58", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Mar/58" }, { - "url": "https:\/\/vuldb.com\/?id.98933" + "url": "https://vuldb.com/?id.98933", + "refsource": "MISC", + "name": "https://vuldb.com/?id.98933" } ] } diff --git a/2017/20xxx/CVE-2017-20024.json b/2017/20xxx/CVE-2017-20024.json index 1f881516012..6a848155902 100644 --- a/2017/20xxx/CVE-2017-20024.json +++ b/2017/20xxx/CVE-2017-20024.json @@ -52,7 +52,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in Solare Solar-Log 2.8.4-56\/3.5.2-85. It has been classified as problematic. Affected is an unknown function. The manipulation leads to denial of service. It is possible to launch the attack remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." + "value": "A vulnerability was found in Solare Solar-Log 2.8.4-56/3.5.2-85. It has been classified as problematic. Affected is an unknown function. The manipulation leads to denial of service. It is possible to launch the attack remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." } ] }, @@ -61,16 +61,20 @@ "cvss": { "version": "3.1", "baseScore": "5.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Mar\/58" + "url": "http://seclists.org/fulldisclosure/2017/Mar/58", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Mar/58" }, { - "url": "https:\/\/vuldb.com\/?id.98934" + "url": "https://vuldb.com/?id.98934", + "refsource": "MISC", + "name": "https://vuldb.com/?id.98934" } ] } diff --git a/2017/20xxx/CVE-2017-20025.json b/2017/20xxx/CVE-2017-20025.json index d75c18a1a0c..b09823e8df8 100644 --- a/2017/20xxx/CVE-2017-20025.json +++ b/2017/20xxx/CVE-2017-20025.json @@ -52,7 +52,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in Solare Solar-Log 2.8.4-56\/3.5.2-85. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Flash Memory. The manipulation leads to privilege escalation. The attack can be launched remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." + "value": "A vulnerability was found in Solare Solar-Log 2.8.4-56/3.5.2-85. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Flash Memory. The manipulation leads to privilege escalation. The attack can be launched remotely. Upgrading to version 3.5.3-86 is able to address this issue. It is recommended to upgrade the affected component." } ] }, @@ -61,16 +61,20 @@ "cvss": { "version": "3.1", "baseScore": "7.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Mar\/58" + "url": "http://seclists.org/fulldisclosure/2017/Mar/58", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Mar/58" }, { - "url": "https:\/\/vuldb.com\/?id.98935" + "url": "https://vuldb.com/?id.98935", + "refsource": "MISC", + "name": "https://vuldb.com/?id.98935" } ] } diff --git a/2017/20xxx/CVE-2017-20026.json b/2017/20xxx/CVE-2017-20026.json index ecb7aa751c8..69db1c91dd0 100644 --- a/2017/20xxx/CVE-2017-20026.json +++ b/2017/20xxx/CVE-2017-20026.json @@ -61,16 +61,20 @@ "cvss": { "version": "3.1", "baseScore": "4.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Mar\/47" + "url": "http://seclists.org/fulldisclosure/2017/Mar/47", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Mar/47" }, { - "url": "https:\/\/vuldb.com\/?id.98923" + "url": "https://vuldb.com/?id.98923", + "refsource": "MISC", + "name": "https://vuldb.com/?id.98923" } ] } diff --git a/2017/20xxx/CVE-2017-20027.json b/2017/20xxx/CVE-2017-20027.json index 0c575439a76..328e5798c21 100644 --- a/2017/20xxx/CVE-2017-20027.json +++ b/2017/20xxx/CVE-2017-20027.json @@ -61,16 +61,20 @@ "cvss": { "version": "3.1", "baseScore": "4.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Mar\/47" + "url": "http://seclists.org/fulldisclosure/2017/Mar/47", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Mar/47" }, { - "url": "https:\/\/vuldb.com\/?id.98924" + "url": "https://vuldb.com/?id.98924", + "refsource": "MISC", + "name": "https://vuldb.com/?id.98924" } ] } diff --git a/2017/20xxx/CVE-2017-20028.json b/2017/20xxx/CVE-2017-20028.json index 18e899fdac1..681343b67fb 100644 --- a/2017/20xxx/CVE-2017-20028.json +++ b/2017/20xxx/CVE-2017-20028.json @@ -52,7 +52,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in HumHub 0.20.1\/1.0.0-beta.3. It has been classified as critical. This affects an unknown part. The manipulation leads to privilege escalation. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. It is recommended to upgrade the affected component." + "value": "A vulnerability was found in HumHub 0.20.1/1.0.0-beta.3. It has been classified as critical. This affects an unknown part. The manipulation leads to privilege escalation. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. It is recommended to upgrade the affected component." } ] }, @@ -61,16 +61,20 @@ "cvss": { "version": "3.1", "baseScore": "5.6", - "vectorString": "CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Mar\/48" + "url": "http://seclists.org/fulldisclosure/2017/Mar/48", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Mar/48" }, { - "url": "https:\/\/vuldb.com\/?id.98925" + "url": "https://vuldb.com/?id.98925", + "refsource": "MISC", + "name": "https://vuldb.com/?id.98925" } ] }