mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 19:17:10 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
a4bf9935c8
commit
7d7747bc04
@ -1,16 +1,37 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"AKA": "TWCERT/CC",
|
|
||||||
"ASSIGNER": "cve@cert.org.tw",
|
|
||||||
"DATE_PUBLIC": "2020-03-27T03:59:00.000Z",
|
|
||||||
"ID": "CVE-2020-3920",
|
"ID": "CVE-2020-3920",
|
||||||
"STATE": "PUBLIC",
|
"ASSIGNER": "cve@cert.org.tw",
|
||||||
"TITLE": "Unisoon UltraLog Express - Broken Authentication"
|
"STATE": "PUBLIC"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "UltraLog Express device management interface does not properly perform access authentication in some specific pages/functions. Any user can access the privileged page to manage accounts through specific system directory.\n\n"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Broken Authentication"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
|
"vendor_name": "Unisoon",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
@ -25,28 +46,42 @@
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
}
|
||||||
"vendor_name": "Unisoon"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"data_format": "MITRE",
|
"references": {
|
||||||
"data_type": "CVE",
|
"reference_data": [
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
|
||||||
"description_data": [
|
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"url": "https://www.twcert.org.tw/tw/cp-132-3452-937d6-1.html",
|
||||||
"value": "UltraLog Express device management interface does not properly perform access authentication in some specific pages/functions. Any user can access the privileged page to manage accounts through specific system directory."
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.twcert.org.tw/tw/cp-132-3452-937d6-1.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"generator": {
|
"generator": {
|
||||||
"engine": "Vulnogram 0.0.9"
|
"engine": "Vulnogram 0.0.9"
|
||||||
},
|
},
|
||||||
|
"source": {
|
||||||
|
"discovery": "UNKNOWN"
|
||||||
|
},
|
||||||
|
"solution": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "<p>\n\nUpdate to V1.5.0 or later version.\n\n</p>"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "\nUpdate to V1.5.0 or later version.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
"impact": {
|
"impact": {
|
||||||
"cvss": {
|
"cvss": [
|
||||||
|
{
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact": "NONE",
|
||||||
@ -60,35 +95,6 @@
|
|||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
"version": "3.1"
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
},
|
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "Broken Authentication"
|
|
||||||
}
|
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
|
||||||
},
|
|
||||||
"references": {
|
|
||||||
"reference_data": [
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"url": "https://www.twcert.org.tw/tw/cp-132-3452-937d6-1.html",
|
|
||||||
"name": "https://www.twcert.org.tw/tw/cp-132-3452-937d6-1.html"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"solution": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "Contact Unisoon for vulnerabilities repairment."
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"source": {
|
|
||||||
"discovery": "UNKNOWN"
|
|
||||||
}
|
|
||||||
}
|
}
|
@ -1,16 +1,37 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"AKA": "TWCERT/CC",
|
|
||||||
"ASSIGNER": "cve@cert.org.tw",
|
|
||||||
"DATE_PUBLIC": "2020-03-27T03:59:00.000Z",
|
|
||||||
"ID": "CVE-2020-3921",
|
"ID": "CVE-2020-3921",
|
||||||
"STATE": "PUBLIC",
|
"ASSIGNER": "cve@cert.org.tw",
|
||||||
"TITLE": "Unisoon UltraLog Express - Sensitive Data Exposure"
|
"STATE": "PUBLIC"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "UltraLog Express device management software stores user\u2019s information in cleartext. Any user can obtain accounts information through a specific page.\n\n"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Sensitive Data Exposure"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
|
"vendor_name": "Unisoon",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
@ -25,28 +46,42 @@
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
}
|
||||||
"vendor_name": "Unisoon"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"data_format": "MITRE",
|
"references": {
|
||||||
"data_type": "CVE",
|
"reference_data": [
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
|
||||||
"description_data": [
|
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"url": "https://www.twcert.org.tw/tw/cp-132-3453-442a5-1.html",
|
||||||
"value": "UltraLog Express device management software stores user\u2019s information in cleartext. Any user can obtain accounts information through a specific page."
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.twcert.org.tw/tw/cp-132-3453-442a5-1.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"generator": {
|
"generator": {
|
||||||
"engine": "Vulnogram 0.0.9"
|
"engine": "Vulnogram 0.0.9"
|
||||||
},
|
},
|
||||||
|
"source": {
|
||||||
|
"discovery": "UNKNOWN"
|
||||||
|
},
|
||||||
|
"solution": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "\n\n<span style=\"background-color: rgb(255, 255, 255);\">Update to V1.5.0 or later version.</span>"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "\nUpdate to V1.5.0 or later version."
|
||||||
|
}
|
||||||
|
],
|
||||||
"impact": {
|
"impact": {
|
||||||
"cvss": {
|
"cvss": [
|
||||||
|
{
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact": "NONE",
|
||||||
@ -60,35 +95,6 @@
|
|||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||||||
"version": "3.1"
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
},
|
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "Sensitive Data Exposure"
|
|
||||||
}
|
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
|
||||||
},
|
|
||||||
"references": {
|
|
||||||
"reference_data": [
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"url": "https://www.twcert.org.tw/tw/cp-132-3453-442a5-1.html",
|
|
||||||
"name": "https://www.twcert.org.tw/tw/cp-132-3453-442a5-1.html"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"solution": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "Contact Unisoon for vulnerabilities repairment."
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"source": {
|
|
||||||
"discovery": "UNKNOWN"
|
|
||||||
}
|
|
||||||
}
|
}
|
@ -1,16 +1,38 @@
|
|||||||
{
|
{
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"AKA": "TWCERT/CC",
|
|
||||||
"ASSIGNER": "cve@cert.org.tw",
|
|
||||||
"DATE_PUBLIC": "2020-03-27T03:59:00.000Z",
|
|
||||||
"ID": "CVE-2020-3936",
|
"ID": "CVE-2020-3936",
|
||||||
"STATE": "PUBLIC",
|
"ASSIGNER": "cve@cert.org.tw",
|
||||||
"TITLE": "Unisoon UltraLog Express - SQL Injection"
|
"STATE": "PUBLIC"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "UltraLog Express device management interface does not properly filter user inputted string in some specific parameters, attackers can inject arbitrary SQL command.\n\n"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "CWE-89 SQL Injection",
|
||||||
|
"cweId": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
|
"vendor_name": "Unisoon",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
@ -25,28 +47,42 @@
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
}
|
||||||
"vendor_name": "Unisoon"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"data_format": "MITRE",
|
"references": {
|
||||||
"data_type": "CVE",
|
"reference_data": [
|
||||||
"data_version": "4.0",
|
|
||||||
"description": {
|
|
||||||
"description_data": [
|
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"url": "https://www.twcert.org.tw/tw/cp-132-3451-7d9f0-1.html",
|
||||||
"value": "UltraLog Express device management interface does not properly filter user inputted string in some specific parameters, attackers can inject arbitrary SQL command."
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.twcert.org.tw/tw/cp-132-3451-7d9f0-1.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"generator": {
|
"generator": {
|
||||||
"engine": "Vulnogram 0.0.9"
|
"engine": "Vulnogram 0.0.9"
|
||||||
},
|
},
|
||||||
|
"source": {
|
||||||
|
"discovery": "UNKNOWN"
|
||||||
|
},
|
||||||
|
"solution": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "<p>\n\nUpdate to V1.5.0 or later version.\n\n</p>"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "\nUpdate to V1.5.0 or later version.\n\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
"impact": {
|
"impact": {
|
||||||
"cvss": {
|
"cvss": [
|
||||||
|
{
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"availabilityImpact": "HIGH",
|
"availabilityImpact": "HIGH",
|
||||||
@ -60,35 +96,6 @@
|
|||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||||
"version": "3.1"
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
},
|
|
||||||
"problemtype": {
|
|
||||||
"problemtype_data": [
|
|
||||||
{
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "CWE-89 SQL Injection"
|
|
||||||
}
|
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
|
||||||
},
|
|
||||||
"references": {
|
|
||||||
"reference_data": [
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"url": "https://www.twcert.org.tw/tw/cp-132-3451-7d9f0-1.html",
|
|
||||||
"name": "https://www.twcert.org.tw/tw/cp-132-3451-7d9f0-1.html"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"solution": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "Contact Unisoon for vulnerabilities repairment."
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"source": {
|
|
||||||
"discovery": "UNKNOWN"
|
|
||||||
}
|
|
||||||
}
|
}
|
18
2024/4xxx/CVE-2024-4537.json
Normal file
18
2024/4xxx/CVE-2024-4537.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2024-4537",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2024/4xxx/CVE-2024-4538.json
Normal file
18
2024/4xxx/CVE-2024-4538.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2024-4538",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user