"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-04-13 13:01:48 +00:00
parent 2b72efcea8
commit 8609c57898
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
5 changed files with 193 additions and 18 deletions

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-29653",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-29653",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Froxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/Froxlor/Froxlor/commits/master",
"refsource": "MISC",
"name": "https://github.com/Froxlor/Froxlor/commits/master"
},
{
"url": "https://github.com/Froxlor/Froxlor/security/advisories",
"refsource": "MISC",
"name": "https://github.com/Froxlor/Froxlor/security/advisories"
},
{
"refsource": "MISC",
"name": "https://nozero.io/en/cve-2020-29653-froxlor-html-injection-dangling-markup/",
"url": "https://nozero.io/en/cve-2020-29653-froxlor-html-injection-dangling-markup/"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-43742",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-43742",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "CMSimple 5.4 is vulnerable to Cross Site Scripting (XSS) via the file upload feature."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/iiSiLvEr/CMSimple5.4-Vulnerabilities",
"refsource": "MISC",
"name": "https://github.com/iiSiLvEr/CMSimple5.4-Vulnerabilities"
},
{
"refsource": "MISC",
"name": "https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-43742",
"url": "https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-43742"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-1340",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-24308",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-24308",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Automox Agent prior to version 37 on Windows and Linux and Version 36 on OSX could allow for a non privileged user to obtain sensitive information during the install process."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://automox.com",
"refsource": "MISC",
"name": "https://automox.com"
}
]
}

View File

@ -56,6 +56,16 @@
"url": "https://github.com/harshitbansal373/PHP-CMS/issues/14",
"refsource": "MISC",
"name": "https://github.com/harshitbansal373/PHP-CMS/issues/14"
},
{
"refsource": "MISC",
"name": "https://github.com/harshitbansal373/PHP-CMS/issues/15",
"url": "https://github.com/harshitbansal373/PHP-CMS/issues/15"
},
{
"refsource": "MISC",
"name": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-26613",
"url": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-26613"
}
]
}