"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-08-08 13:01:02 +00:00
parent d832a85404
commit 73f9dbc9b5
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
15 changed files with 150 additions and 50 deletions

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/E1CHO\/water_cve\/blob\/main\/E-learning%20System%20comment_frame.php%20post_id%20parameter%20SQl%20injection.pdf"
"url": "https://github.com/E1CHO/water_cve/blob/main/E-learning%20System%20comment_frame.php%20post_id%20parameter%20SQl%20injection.pdf",
"refsource": "MISC",
"name": "https://github.com/E1CHO/water_cve/blob/main/E-learning%20System%20comment_frame.php%20post_id%20parameter%20SQl%20injection.pdf"
},
{
"url": "https:\/\/vuldb.com\/?id.205818"
"url": "https://vuldb.com/?id.205818",
"refsource": "MISC",
"name": "https://vuldb.com/?id.205818"
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/E1CHO\/water_cve\/blob\/main\/E-learning%20System%20Class%20comment%20query%20SQl%20vulnerability.pdf"
"url": "https://github.com/E1CHO/water_cve/blob/main/E-learning%20System%20Class%20comment%20query%20SQl%20vulnerability.pdf",
"refsource": "MISC",
"name": "https://github.com/E1CHO/water_cve/blob/main/E-learning%20System%20Class%20comment%20query%20SQl%20vulnerability.pdf"
},
{
"url": "https:\/\/vuldb.com\/?id.205819"
"url": "https://vuldb.com/?id.205819",
"refsource": "MISC",
"name": "https://vuldb.com/?id.205819"
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -49,7 +49,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in SourceCodester Simple E-Learning System. It has been rated as critical. Affected by this issue is some unknown functionality of the file \/claire_blake. The manipulation of the argument phoneNumber leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205820."
"value": "A vulnerability was found in SourceCodester Simple E-Learning System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /claire_blake. The manipulation of the argument phoneNumber leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205820."
}
]
},
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/E1CHO\/water_cve\/blob\/main\/E-learning%20System%20personal%20data%20modification%20SQl%20vulnerability.pdf"
"url": "https://github.com/E1CHO/water_cve/blob/main/E-learning%20System%20personal%20data%20modification%20SQl%20vulnerability.pdf",
"refsource": "MISC",
"name": "https://github.com/E1CHO/water_cve/blob/main/E-learning%20System%20personal%20data%20modification%20SQl%20vulnerability.pdf"
},
{
"url": "https:\/\/vuldb.com\/?id.205820"
"url": "https://vuldb.com/?id.205820",
"refsource": "MISC",
"name": "https://vuldb.com/?id.205820"
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "4.7",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:H\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/gdianq\/Gym-Management-System-Sqlinjection\/blob\/main\/README.md"
"url": "https://github.com/gdianq/Gym-Management-System-Sqlinjection/blob/main/README.md",
"refsource": "MISC",
"name": "https://github.com/gdianq/Gym-Management-System-Sqlinjection/blob/main/README.md"
},
{
"url": "https:\/\/vuldb.com\/?id.205821"
"url": "https://vuldb.com/?id.205821",
"refsource": "MISC",
"name": "https://vuldb.com/?id.205821"
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -49,7 +49,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as problematic was found in SourceCodester Simple E-Learning System. This vulnerability affects unknown code of the file \/claire_blake. The manipulation of the argument Bio leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-205822 is the identifier assigned to this vulnerability."
"value": "A vulnerability classified as problematic was found in SourceCodester Simple E-Learning System. This vulnerability affects unknown code of the file /claire_blake. The manipulation of the argument Bio leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-205822 is the identifier assigned to this vulnerability."
}
]
},
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "3.5",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/E1CHO\/water_cve\/blob\/main\/E-learning%20System%20personal%20data%20modification%20XSS%20vulnerability.pdf"
"url": "https://github.com/E1CHO/water_cve/blob/main/E-learning%20System%20personal%20data%20modification%20XSS%20vulnerability.pdf",
"refsource": "MISC",
"name": "https://github.com/E1CHO/water_cve/blob/main/E-learning%20System%20personal%20data%20modification%20XSS%20vulnerability.pdf"
},
{
"url": "https:\/\/vuldb.com\/?id.205822"
"url": "https://vuldb.com/?id.205822",
"refsource": "MISC",
"name": "https://vuldb.com/?id.205822"
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "7.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/Jamison2022\/Company-Website-CMS\/blob\/main\/Company%20Website%20CMS-Unauthorized%20Access.md"
"url": "https://github.com/Jamison2022/Company-Website-CMS/blob/main/Company%20Website%20CMS-Unauthorized%20Access.md",
"refsource": "MISC",
"name": "https://github.com/Jamison2022/Company-Website-CMS/blob/main/Company%20Website%20CMS-Unauthorized%20Access.md"
},
{
"url": "https:\/\/vuldb.com\/?id.205826"
"url": "https://vuldb.com/?id.205826",
"refsource": "MISC",
"name": "https://vuldb.com/?id.205826"
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/gdianq\/Gym-Management-Exercises-Sqlinjection\/blob\/main\/README.md"
"url": "https://github.com/gdianq/Gym-Management-Exercises-Sqlinjection/blob/main/README.md",
"refsource": "MISC",
"name": "https://github.com/gdianq/Gym-Management-Exercises-Sqlinjection/blob/main/README.md"
},
{
"url": "https:\/\/vuldb.com\/?id.205827"
"url": "https://vuldb.com/?id.205827",
"refsource": "MISC",
"name": "https://vuldb.com/?id.205827"
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "4.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/vuls\/vuls\/blob\/main\/Simple%20E-Learning%20System%20downloadFiles.php%20Arbitrary%20File%20Download\/Simple%20E-Learning%20System%20downloadFiles.php%20Arbitrary%20File%20Download.md"
"url": "https://github.com/vuls/vuls/blob/main/Simple%20E-Learning%20System%20downloadFiles.php%20Arbitrary%20File%20Download/Simple%20E-Learning%20System%20downloadFiles.php%20Arbitrary%20File%20Download.md",
"refsource": "MISC",
"name": "https://github.com/vuls/vuls/blob/main/Simple%20E-Learning%20System%20downloadFiles.php%20Arbitrary%20File%20Download/Simple%20E-Learning%20System%20downloadFiles.php%20Arbitrary%20File%20Download.md"
},
{
"url": "https:\/\/vuldb.com\/?id.205828"
"url": "https://vuldb.com/?id.205828",
"refsource": "MISC",
"name": "https://vuldb.com/?id.205828"
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -49,7 +49,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in SourceCodester Simple Student Information System. It has been rated as critical. This issue affects some unknown processing of the file admin\/departments\/manage_department.php. The manipulation of the argument id with the input -5756%27%20UNION%20ALL%20SELECT%20NULL,database(),user(),NULL,NULL,NULL,NULL--%20- leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205829 was assigned to this vulnerability."
"value": "A vulnerability was found in SourceCodester Simple Student Information System. It has been rated as critical. This issue affects some unknown processing of the file admin/departments/manage_department.php. The manipulation of the argument id with the input -5756%27%20UNION%20ALL%20SELECT%20NULL,database(),user(),NULL,NULL,NULL,NULL--%20- leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205829 was assigned to this vulnerability."
}
]
},
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/bewhale.github.io\/post\/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Simple%20Student%20Information%20System\/"
"url": "https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Simple%20Student%20Information%20System/",
"refsource": "MISC",
"name": "https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Simple%20Student%20Information%20System/"
},
{
"url": "https:\/\/vuldb.com\/?id.205829"
"url": "https://vuldb.com/?id.205829",
"refsource": "MISC",
"name": "https://vuldb.com/?id.205829"
}
]
}

View File

@ -49,7 +49,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as critical has been found in SourceCodester Online Class and Exam Scheduling System 1.0. Affected is an unknown function of the file \/pages\/class_sched.php. The manipulation of the argument class with the input '||(SELECT 0x684d6b6c WHERE 5993=5993 AND (SELECT 2096 FROM(SELECT COUNT(*),CONCAT(0x717a786b71,(SELECT (ELT(2096=2096,1))),0x717a626271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||' leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-205830 is the identifier assigned to this vulnerability."
"value": "A vulnerability classified as critical has been found in SourceCodester Online Class and Exam Scheduling System 1.0. Affected is an unknown function of the file /pages/class_sched.php. The manipulation of the argument class with the input '||(SELECT 0x684d6b6c WHERE 5993=5993 AND (SELECT 2096 FROM(SELECT COUNT(*),CONCAT(0x717a786b71,(SELECT (ELT(2096=2096,1))),0x717a626271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||' leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-205830 is the identifier assigned to this vulnerability."
}
]
},
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/anx0ing\/CVE_demo\/blob\/main\/2022\/Online%20Class%20and%20Exam%20Scheduling%20System-SQL%20injections.md"
"url": "https://github.com/anx0ing/CVE_demo/blob/main/2022/Online%20Class%20and%20Exam%20Scheduling%20System-SQL%20injections.md",
"refsource": "MISC",
"name": "https://github.com/anx0ing/CVE_demo/blob/main/2022/Online%20Class%20and%20Exam%20Scheduling%20System-SQL%20injections.md"
},
{
"url": "https:\/\/vuldb.com\/?id.205830"
"url": "https://vuldb.com/?id.205830",
"refsource": "MISC",
"name": "https://vuldb.com/?id.205830"
}
]
}

View File

@ -49,7 +49,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as critical was found in SourceCodester Online Class and Exam Scheduling System 1.0. Affected by this vulnerability is an unknown functionality of the file \/pages\/faculty_sched.php. The manipulation of the argument faculty with the input ' OR (SELECT 2078 FROM(SELECT COUNT(*),CONCAT(0x716a717071,(SELECT (ELT(2078=2078,1))),0x717a706a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- uYCM leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205831."
"value": "A vulnerability classified as critical was found in SourceCodester Online Class and Exam Scheduling System 1.0. Affected by this vulnerability is an unknown functionality of the file /pages/faculty_sched.php. The manipulation of the argument faculty with the input ' OR (SELECT 2078 FROM(SELECT COUNT(*),CONCAT(0x716a717071,(SELECT (ELT(2078=2078,1))),0x717a706a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- uYCM leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205831."
}
]
},
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/github.com\/anx0ing\/CVE_demo\/blob\/main\/2022\/Online%20Class%20and%20Exam%20Scheduling%20System-SQL%20injections.md"
"url": "https://github.com/anx0ing/CVE_demo/blob/main/2022/Online%20Class%20and%20Exam%20Scheduling%20System-SQL%20injections.md",
"refsource": "MISC",
"name": "https://github.com/anx0ing/CVE_demo/blob/main/2022/Online%20Class%20and%20Exam%20Scheduling%20System-SQL%20injections.md"
},
{
"url": "https:\/\/vuldb.com\/?id.205831"
"url": "https://vuldb.com/?id.205831",
"refsource": "MISC",
"name": "https://vuldb.com/?id.205831"
}
]
}

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -57,13 +57,15 @@
"cvss": {
"version": "3.1",
"baseScore": "5.5",
"vectorString": "CVSS:3.1\/AV:A\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/vuldb.com\/?id.205833"
"url": "https://vuldb.com/?id.205833",
"refsource": "MISC",
"name": "https://vuldb.com/?id.205833"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-2712",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-37865",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-37866",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}