mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
c8bf5466da
commit
839c80fb3f
@ -1,17 +1,130 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2009-10003",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability was found in capnsquarepants wordcraft up to 0.6. It has been classified as problematic. Affected is an unknown function of the file tag.php. The manipulation of the argument tag leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 0.7 is able to address this issue. The name of the patch is be23028633e8105de92f387036871c03f34d3124. It is recommended to upgrade the affected component. VDB-219714 is the identifier assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "Es wurde eine problematische Schwachstelle in capnsquarepants wordcraft bis 0.6 ausgemacht. Betroffen hiervon ist ein unbekannter Ablauf der Datei tag.php. Dank der Manipulation des Arguments tag mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Ein Aktualisieren auf die Version 0.7 vermag dieses Problem zu l\u00f6sen. Der Patch wird als be23028633e8105de92f387036871c03f34d3124 bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-79 Cross Site Scripting",
|
||||
"cweId": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "capnsquarepants",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "wordcraft",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0.1",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.2",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.3",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.4",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.5",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.6",
|
||||
"version_affected": "="
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.219714",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.219714"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.219714",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.219714"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/capnsquarepants/wordcraft/commit/be23028633e8105de92f387036871c03f34d3124",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/capnsquarepants/wordcraft/commit/be23028633e8105de92f387036871c03f34d3124"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/capnsquarepants/wordcraft/releases/tag/wordcraft-0.7",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/capnsquarepants/wordcraft/releases/tag/wordcraft-0.7"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VulDB GitHub Commit Analyzer"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 3.5,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 3.5,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 4,
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,182 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2016-15022",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability was found in mosbth cimage up to 0.7.18. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file check_system.php. The manipulation of the argument $_SERVER['SERVER_SOFTWARE'] leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.7.19 is able to address this issue. The name of the patch is 401478c8393989836beeddfeac5ce44570af162b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-219715."
|
||||
},
|
||||
{
|
||||
"lang": "deu",
|
||||
"value": "In mosbth cimage bis 0.7.18 wurde eine problematische Schwachstelle ausgemacht. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei check_system.php. Dank Manipulation des Arguments $_SERVER['SERVER_SOFTWARE'] mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Ein Aktualisieren auf die Version 0.7.19 vermag dieses Problem zu l\u00f6sen. Der Patch wird als 401478c8393989836beeddfeac5ce44570af162b bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-79 Cross Site Scripting",
|
||||
"cweId": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "mosbth",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "cimage",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0.7.0",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.1",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.2",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.3",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.4",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.5",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.6",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.7",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.8",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.9",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.10",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.11",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.12",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.13",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.14",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.15",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.16",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.17",
|
||||
"version_affected": "="
|
||||
},
|
||||
{
|
||||
"version_value": "0.7.18",
|
||||
"version_affected": "="
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.219715",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.219715"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.219715",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?ctiid.219715"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mosbth/cimage/commit/401478c8393989836beeddfeac5ce44570af162b",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/mosbth/cimage/commit/401478c8393989836beeddfeac5ce44570af162b"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mosbth/cimage/releases/tag/v0.7.19",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/mosbth/cimage/releases/tag/v0.7.19"
|
||||
}
|
||||
]
|
||||
},
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VulDB GitHub Commit Analyzer"
|
||||
}
|
||||
],
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseScore": 2,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "3.0",
|
||||
"baseScore": 2,
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
{
|
||||
"version": "2.0",
|
||||
"baseScore": 1.7,
|
||||
"vectorString": "AV:N/AC:H/Au:M/C:N/I:P/A:N",
|
||||
"baseSeverity": "LOW"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user