mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3f25555099
commit
747936ba46
@ -40,7 +40,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -51,7 +51,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,7 +62,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -73,7 +73,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -84,7 +84,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -95,7 +95,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -106,7 +106,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -117,7 +117,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -128,7 +128,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -139,7 +139,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -150,7 +150,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -161,7 +161,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -172,7 +172,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -183,7 +183,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -194,7 +194,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -205,7 +205,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -216,7 +216,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -227,7 +227,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -238,7 +238,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -249,7 +249,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -260,7 +260,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -271,7 +271,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -282,7 +282,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -293,7 +293,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -304,7 +304,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -315,7 +315,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -326,7 +326,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -337,7 +337,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -348,7 +348,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -359,7 +359,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -370,7 +370,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -381,7 +381,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -392,7 +392,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -403,7 +403,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -414,7 +414,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -425,7 +425,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -436,7 +436,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -447,7 +447,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -458,7 +458,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -469,7 +469,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -480,7 +480,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -491,7 +491,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -502,7 +502,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -513,7 +513,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -524,7 +524,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -535,7 +535,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -546,7 +546,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -557,7 +557,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -568,7 +568,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -579,7 +579,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -590,7 +590,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -601,7 +601,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -612,7 +612,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -623,7 +623,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -634,7 +634,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -645,7 +645,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -656,7 +656,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -667,7 +667,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -678,7 +678,7 @@
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "V4.1.60 build date before 20230821"
|
||||
"version_value": "Build date before 230821(Version before V4.1.60 are not affected)"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Amazzing Filter for Prestashop through 3.2.2 is vulnerable to Cross-Site Scripting (XSS)."
|
||||
"value": "Cross Site Scripting (XSS) in Search filters in Prestashop Amazzing filter version up to version 3.2.5, allows remote attackers to inject arbitrary JavaScript code."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,17 +1,66 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-49052",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2023-49052",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "File Upload vulnerability in Microweber v.2.0.4 allows a remote attacker to execute arbitrary code via a crafted script to the file upload function in the created forms component."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/Cyber-Wo0dy/report/blob/main/microweber/v2.0.4/microweber_unrestricted_upload",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/Cyber-Wo0dy/report/blob/main/microweber/v2.0.4/microweber_unrestricted_upload"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/Cyber-Wo0dy/CVE-2023-49052",
|
||||
"url": "https://github.com/Cyber-Wo0dy/CVE-2023-49052"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,90 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-49081",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "security-advisories@github.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation made it possible for an attacker to modify the HTTP request (e.g. to insert a new header) or create a new HTTP request if the attacker controls the HTTP version. The vulnerability only occurs if the attacker can control the HTTP version of the request. This issue has been patched in version 3.9.0."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-20: Improper Input Validation",
|
||||
"cweId": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "aio-libs",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "aiohttp",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": "< 3.9.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-q3qx-c6g2-7pw2",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-q3qx-c6g2-7pw2"
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/jnovikov/184afb593d9c2114d77f508e0ccd508e",
|
||||
"refsource": "MISC",
|
||||
"name": "https://gist.github.com/jnovikov/184afb593d9c2114d77f508e0ccd508e"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"advisory": "GHSA-q3qx-c6g2-7pw2",
|
||||
"discovery": "UNKNOWN"
|
||||
},
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"attackComplexity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"version": "3.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user