mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
9738e078d0
commit
75bc9955bc
@ -49,7 +49,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability classified as problematic has been found in Easy Table Plugin 1.6. This affects an unknown part of the file \/wordpress\/wp-admin\/options-general.php. The manipulation with the input \"><script>alert(1)<\/script> leads to basic cross site scripting. It is possible to initiate the attack remotely."
|
||||
"value": "A vulnerability classified as problematic has been found in Easy Table Plugin 1.6. This affects an unknown part of the file /wordpress/wp-admin/options-general.php. The manipulation with the input \"><script>alert(1)</script> leads to basic cross site scripting. It is possible to initiate the attack remotely."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -58,16 +58,20 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "3.5",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/24"
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Feb/24",
|
||||
"refsource": "MISC",
|
||||
"name": "http://seclists.org/fulldisclosure/2017/Feb/24"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.97119"
|
||||
"url": "https://vuldb.com/?id.97119",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.97119"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,7 +52,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability classified as problematic was found in Teleopti WFM up to 7.1.0. Affected by this vulnerability is an unknown functionality of the file \/TeleoptiWFM\/Administration\/GetOneTenant of the component Administration. The manipulation leads to information disclosure (Credentials). The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue."
|
||||
"value": "A vulnerability classified as problematic was found in Teleopti WFM up to 7.1.0. Affected by this vulnerability is an unknown functionality of the file /TeleoptiWFM/Administration/GetOneTenant of the component Administration. The manipulation leads to information disclosure (Credentials). The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,16 +61,20 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "4.3",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/13"
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Feb/13",
|
||||
"refsource": "MISC",
|
||||
"name": "http://seclists.org/fulldisclosure/2017/Feb/13"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.96805"
|
||||
"url": "https://vuldb.com/?id.96805",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.96805"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,16 +61,20 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "4.3",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/13"
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Feb/13",
|
||||
"refsource": "MISC",
|
||||
"name": "http://seclists.org/fulldisclosure/2017/Feb/13"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.96806"
|
||||
"url": "https://vuldb.com/?id.96806",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.96806"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,16 +58,20 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "7.3",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/13"
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Feb/13",
|
||||
"refsource": "MISC",
|
||||
"name": "http://seclists.org/fulldisclosure/2017/Feb/13"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.96807"
|
||||
"url": "https://vuldb.com/?id.96807",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.96807"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,19 +58,25 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "7.8",
|
||||
"vectorString": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H"
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/14"
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Feb/14",
|
||||
"refsource": "MISC",
|
||||
"name": "http://seclists.org/fulldisclosure/2017/Feb/14"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/github.com\/kacperszurek\/exploits\/blob\/master\/IVPN\/ivpn_privilege_escalation.py"
|
||||
"url": "https://github.com/kacperszurek/exploits/blob/master/IVPN/ivpn_privilege_escalation.py",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/kacperszurek/exploits/blob/master/IVPN/ivpn_privilege_escalation.py"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.96655"
|
||||
"url": "https://vuldb.com/?id.96655",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.96655"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user