"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-06-29 07:00:48 +00:00
parent 9738e078d0
commit 75bc9955bc
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
5 changed files with 40 additions and 18 deletions

View File

@ -49,7 +49,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as problematic has been found in Easy Table Plugin 1.6. This affects an unknown part of the file \/wordpress\/wp-admin\/options-general.php. The manipulation with the input \"><script>alert(1)<\/script> leads to basic cross site scripting. It is possible to initiate the attack remotely."
"value": "A vulnerability classified as problematic has been found in Easy Table Plugin 1.6. This affects an unknown part of the file /wordpress/wp-admin/options-general.php. The manipulation with the input \"><script>alert(1)</script> leads to basic cross site scripting. It is possible to initiate the attack remotely."
}
]
},
@ -58,16 +58,20 @@
"cvss": {
"version": "3.1",
"baseScore": "3.5",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
}
},
"references": {
"reference_data": [
{
"url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/24"
"url": "http://seclists.org/fulldisclosure/2017/Feb/24",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2017/Feb/24"
},
{
"url": "https:\/\/vuldb.com\/?id.97119"
"url": "https://vuldb.com/?id.97119",
"refsource": "MISC",
"name": "https://vuldb.com/?id.97119"
}
]
}

View File

@ -52,7 +52,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as problematic was found in Teleopti WFM up to 7.1.0. Affected by this vulnerability is an unknown functionality of the file \/TeleoptiWFM\/Administration\/GetOneTenant of the component Administration. The manipulation leads to information disclosure (Credentials). The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue."
"value": "A vulnerability classified as problematic was found in Teleopti WFM up to 7.1.0. Affected by this vulnerability is an unknown functionality of the file /TeleoptiWFM/Administration/GetOneTenant of the component Administration. The manipulation leads to information disclosure (Credentials). The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue."
}
]
},
@ -61,16 +61,20 @@
"cvss": {
"version": "3.1",
"baseScore": "4.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
}
},
"references": {
"reference_data": [
{
"url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/13"
"url": "http://seclists.org/fulldisclosure/2017/Feb/13",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2017/Feb/13"
},
{
"url": "https:\/\/vuldb.com\/?id.96805"
"url": "https://vuldb.com/?id.96805",
"refsource": "MISC",
"name": "https://vuldb.com/?id.96805"
}
]
}

View File

@ -61,16 +61,20 @@
"cvss": {
"version": "3.1",
"baseScore": "4.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
}
},
"references": {
"reference_data": [
{
"url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/13"
"url": "http://seclists.org/fulldisclosure/2017/Feb/13",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2017/Feb/13"
},
{
"url": "https:\/\/vuldb.com\/?id.96806"
"url": "https://vuldb.com/?id.96806",
"refsource": "MISC",
"name": "https://vuldb.com/?id.96806"
}
]
}

View File

@ -58,16 +58,20 @@
"cvss": {
"version": "3.1",
"baseScore": "7.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/13"
"url": "http://seclists.org/fulldisclosure/2017/Feb/13",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2017/Feb/13"
},
{
"url": "https:\/\/vuldb.com\/?id.96807"
"url": "https://vuldb.com/?id.96807",
"refsource": "MISC",
"name": "https://vuldb.com/?id.96807"
}
]
}

View File

@ -58,19 +58,25 @@
"cvss": {
"version": "3.1",
"baseScore": "7.8",
"vectorString": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H"
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
},
"references": {
"reference_data": [
{
"url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/14"
"url": "http://seclists.org/fulldisclosure/2017/Feb/14",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2017/Feb/14"
},
{
"url": "https:\/\/github.com\/kacperszurek\/exploits\/blob\/master\/IVPN\/ivpn_privilege_escalation.py"
"url": "https://github.com/kacperszurek/exploits/blob/master/IVPN/ivpn_privilege_escalation.py",
"refsource": "MISC",
"name": "https://github.com/kacperszurek/exploits/blob/master/IVPN/ivpn_privilege_escalation.py"
},
{
"url": "https:\/\/vuldb.com\/?id.96655"
"url": "https://vuldb.com/?id.96655",
"refsource": "MISC",
"name": "https://vuldb.com/?id.96655"
}
]
}