"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-01-04 10:00:38 +00:00
parent d30a9f9d94
commit 8a88210d0c
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
20 changed files with 1182 additions and 8 deletions

View File

@ -0,0 +1,106 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2010-10003",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as critical was found in gesellix titlelink. Affected by this vulnerability is an unknown functionality of the file plugin_content_title.php. The manipulation of the argument phrase leads to sql injection. The name of the patch is b4604e523853965fa981a4e79aef4b554a535db0. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217351."
},
{
"lang": "deu",
"value": "In gesellix titlelink wurde eine kritische Schwachstelle entdeckt. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei plugin_content_title.php. Mit der Manipulation des Arguments phrase mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Patch wird als b4604e523853965fa981a4e79aef4b554a535db0 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "gesellix",
"product": {
"product_data": [
{
"product_name": "titlelink",
"version": {
"version_data": [
{
"version_value": "n/a",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.217351",
"refsource": "MISC",
"name": "https://vuldb.com/?id.217351"
},
{
"url": "https://vuldb.com/?ctiid.217351",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.217351"
},
{
"url": "https://github.com/gesellix/titlelink/commit/b4604e523853965fa981a4e79aef4b554a535db0",
"refsource": "MISC",
"name": "https://github.com/gesellix/titlelink/commit/b4604e523853965fa981a4e79aef4b554a535db0"
}
]
},
"credits": [
{
"lang": "en",
"value": "VulDB GitHub Commit Analyzer"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5.5,
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 5.5,
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 5.2,
"vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P",
"baseSeverity": "MEDIUM"
}
]
}
}

View File

@ -0,0 +1,106 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2014-125039",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability, which was classified as problematic, has been found in kkokko NeoXplora. Affected by this issue is some unknown functionality of the component Trainer Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is dce1aecd6ee050a29f953ffd8f02f21c7c13f1e6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217352."
},
{
"lang": "deu",
"value": "Eine problematische Schwachstelle wurde in kkokko NeoXplora entdeckt. Dies betrifft einen unbekannten Teil der Komponente Trainer Handler. Durch die Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Patch wird als dce1aecd6ee050a29f953ffd8f02f21c7c13f1e6 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross Site Scripting",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "kkokko",
"product": {
"product_data": [
{
"product_name": "NeoXplora",
"version": {
"version_data": [
{
"version_value": "n/a",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.217352",
"refsource": "MISC",
"name": "https://vuldb.com/?id.217352"
},
{
"url": "https://vuldb.com/?ctiid.217352",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.217352"
},
{
"url": "https://github.com/kkokko/NeoXplora/commit/dce1aecd6ee050a29f953ffd8f02f21c7c13f1e6",
"refsource": "MISC",
"name": "https://github.com/kkokko/NeoXplora/commit/dce1aecd6ee050a29f953ffd8f02f21c7c13f1e6"
}
]
},
"credits": [
{
"lang": "en",
"value": "VulDB GitHub Commit Analyzer"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseSeverity": "MEDIUM"
}
]
}
}

View File

@ -0,0 +1,106 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2016-15008",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in oxguy3 coebot-www and classified as problematic. This issue affects the function displayChannelCommands/displayChannelQuotes/displayChannelAutoreplies/showChannelHighlights/showChannelBoir of the file js/channel.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is c1a6c44092585da4236237e0e7da94ee2996a0ca. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217355."
},
{
"lang": "deu",
"value": "Eine problematische Schwachstelle wurde in oxguy3 coebot-www gefunden. Davon betroffen ist die Funktion displayChannelCommands/displayChannelQuotes/displayChannelAutoreplies/showChannelHighlights/showChannelBoir der Datei js/channel.js. Mittels Manipulieren mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Patch wird als c1a6c44092585da4236237e0e7da94ee2996a0ca bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross Site Scripting",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "oxguy3",
"product": {
"product_data": [
{
"product_name": "coebot-www",
"version": {
"version_data": [
{
"version_value": "n/a",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.217355",
"refsource": "MISC",
"name": "https://vuldb.com/?id.217355"
},
{
"url": "https://vuldb.com/?ctiid.217355",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.217355"
},
{
"url": "https://github.com/oxguy3/coebot-www/commit/c1a6c44092585da4236237e0e7da94ee2996a0ca",
"refsource": "MISC",
"name": "https://github.com/oxguy3/coebot-www/commit/c1a6c44092585da4236237e0e7da94ee2996a0ca"
}
]
},
"credits": [
{
"lang": "en",
"value": "VulDB GitHub Commit Analyzer"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseSeverity": "MEDIUM"
}
]
}
}

View File

@ -0,0 +1,131 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2019-25094",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability, which was classified as problematic, was found in innologi appointments Extension up to 2.0.5. This affects an unknown part of the component Appointment Handler. The manipulation of the argument formfield leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.6 is able to address this issue. The name of the patch is 986d3cb34e5e086c6f04e061f600ffc5837abe7f. It is recommended to upgrade the affected component. The identifier VDB-217353 was assigned to this vulnerability."
},
{
"lang": "deu",
"value": "Es wurde eine problematische Schwachstelle in innologi appointments Extension bis 2.0.5 gefunden. Dabei betrifft es einen unbekannter Codeteil der Komponente Appointment Handler. Durch Manipulation des Arguments formfield mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Ein Aktualisieren auf die Version 2.0.6 vermag dieses Problem zu l\u00f6sen. Der Patch wird als 986d3cb34e5e086c6f04e061f600ffc5837abe7f bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross Site Scripting",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "innologi",
"product": {
"product_data": [
{
"product_name": "appointments Extension",
"version": {
"version_data": [
{
"version_value": "2.0.0",
"version_affected": "="
},
{
"version_value": "2.0.1",
"version_affected": "="
},
{
"version_value": "2.0.2",
"version_affected": "="
},
{
"version_value": "2.0.3",
"version_affected": "="
},
{
"version_value": "2.0.4",
"version_affected": "="
},
{
"version_value": "2.0.5",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.217353",
"refsource": "MISC",
"name": "https://vuldb.com/?id.217353"
},
{
"url": "https://vuldb.com/?ctiid.217353",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.217353"
},
{
"url": "https://github.com/innologi/typo3-appointments/commit/986d3cb34e5e086c6f04e061f600ffc5837abe7f",
"refsource": "MISC",
"name": "https://github.com/innologi/typo3-appointments/commit/986d3cb34e5e086c6f04e061f600ffc5837abe7f"
},
{
"url": "https://github.com/innologi/typo3-appointments/releases/tag/2.0.6",
"refsource": "MISC",
"name": "https://github.com/innologi/typo3-appointments/releases/tag/2.0.6"
}
]
},
"credits": [
{
"lang": "en",
"value": "VulDB GitHub Commit Analyzer"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseSeverity": "MEDIUM"
}
]
}
}

View File

@ -0,0 +1,111 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2020-36639",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been found in AlliedModders AMX Mod X and classified as critical. This vulnerability affects the function cmdVoteMap of the file plugins/adminvote.sma of the component Console Command Handler. The manipulation of the argument amx_votemap leads to path traversal. The name of the patch is a5f2b5539f6d61050b68df8b22ebb343a2862681. It is recommended to apply a patch to fix this issue. VDB-217354 is the identifier assigned to this vulnerability."
},
{
"lang": "deu",
"value": "In AlliedModders AMX Mod X wurde eine kritische Schwachstelle gefunden. Hierbei betrifft es die Funktion cmdVoteMap der Datei plugins/adminvote.sma der Komponente Console Command Handler. Mittels dem Manipulieren des Arguments amx_votemap mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Patch wird als a5f2b5539f6d61050b68df8b22ebb343a2862681 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22 Path Traversal",
"cweId": "CWE-22"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "AlliedModders",
"product": {
"product_data": [
{
"product_name": "AMX Mod X",
"version": {
"version_data": [
{
"version_value": "n/a",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.217354",
"refsource": "MISC",
"name": "https://vuldb.com/?id.217354"
},
{
"url": "https://vuldb.com/?ctiid.217354",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.217354"
},
{
"url": "https://github.com/alliedmodders/amxmodx/pull/823",
"refsource": "MISC",
"name": "https://github.com/alliedmodders/amxmodx/pull/823"
},
{
"url": "https://github.com/alliedmodders/amxmodx/commit/a5f2b5539f6d61050b68df8b22ebb343a2862681",
"refsource": "MISC",
"name": "https://github.com/alliedmodders/amxmodx/commit/a5f2b5539f6d61050b68df8b22ebb343a2862681"
}
]
},
"credits": [
{
"lang": "en",
"value": "VulDB GitHub Commit Analyzer"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 4.3,
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 4.3,
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 4.7,
"vectorString": "AV:A/AC:L/Au:M/C:P/I:P/A:P",
"baseSeverity": "MEDIUM"
}
]
}
}

View File

@ -1 +1,62 @@
{"CVE_data_meta": {"ASSIGNER": "security@unisoc.com", "ID": "CVE-2022-39081", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000", "version": {"version_data": [{"version_value": "Android10/Android11/Android12"}]}}]}, "vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"}]}]}, "references": {"reference_data": [{"refsource": "MISC", "name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001", "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"}]}}
{
"CVE_data_meta": {
"ASSIGNER": "security@unisoc.com",
"ID": "CVE-2022-39081",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000",
"version": {
"version_data": [
{
"version_value": "Android10/Android11/Android12"
}
]
}
}
]
},
"vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001",
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"
}
]
}
}

View File

@ -1 +1,62 @@
{"CVE_data_meta": {"ASSIGNER": "security@unisoc.com", "ID": "CVE-2022-39082", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000", "version": {"version_data": [{"version_value": "Android10/Android11/Android12"}]}}]}, "vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"}]}]}, "references": {"reference_data": [{"refsource": "MISC", "name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001", "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"}]}}
{
"CVE_data_meta": {
"ASSIGNER": "security@unisoc.com",
"ID": "CVE-2022-39082",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000",
"version": {
"version_data": [
{
"version_value": "Android10/Android11/Android12"
}
]
}
}
]
},
"vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001",
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"
}
]
}
}

View File

@ -1 +1,62 @@
{"CVE_data_meta": {"ASSIGNER": "security@unisoc.com", "ID": "CVE-2022-39083", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000", "version": {"version_data": [{"version_value": "Android10/Android11/Android12"}]}}]}, "vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"}]}]}, "references": {"reference_data": [{"refsource": "MISC", "name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001", "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"}]}}
{
"CVE_data_meta": {
"ASSIGNER": "security@unisoc.com",
"ID": "CVE-2022-39083",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000",
"version": {
"version_data": [
{
"version_value": "Android10/Android11/Android12"
}
]
}
}
]
},
"vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001",
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"
}
]
}
}

View File

@ -1 +1,62 @@
{"CVE_data_meta": {"ASSIGNER": "security@unisoc.com", "ID": "CVE-2022-39084", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000", "version": {"version_data": [{"version_value": "Android10/Android11/Android12"}]}}]}, "vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"}]}]}, "references": {"reference_data": [{"refsource": "MISC", "name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001", "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"}]}}
{
"CVE_data_meta": {
"ASSIGNER": "security@unisoc.com",
"ID": "CVE-2022-39084",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000",
"version": {
"version_data": [
{
"version_value": "Android10/Android11/Android12"
}
]
}
}
]
},
"vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001",
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"
}
]
}
}

View File

@ -1 +1,62 @@
{"CVE_data_meta": {"ASSIGNER": "security@unisoc.com", "ID": "CVE-2022-39085", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000", "version": {"version_data": [{"version_value": "Android10/Android11/Android12"}]}}]}, "vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"}]}]}, "references": {"reference_data": [{"refsource": "MISC", "name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001", "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"}]}}
{
"CVE_data_meta": {
"ASSIGNER": "security@unisoc.com",
"ID": "CVE-2022-39085",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000",
"version": {
"version_data": [
{
"version_value": "Android10/Android11/Android12"
}
]
}
}
]
},
"vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001",
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"
}
]
}
}

View File

@ -1 +1,62 @@
{"CVE_data_meta": {"ASSIGNER": "security@unisoc.com", "ID": "CVE-2022-39086", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000", "version": {"version_data": [{"version_value": "Android10/Android11/Android12"}]}}]}, "vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"}]}]}, "references": {"reference_data": [{"refsource": "MISC", "name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001", "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"}]}}
{
"CVE_data_meta": {
"ASSIGNER": "security@unisoc.com",
"ID": "CVE-2022-39086",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000",
"version": {
"version_data": [
{
"version_value": "Android10/Android11/Android12"
}
]
}
}
]
},
"vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001",
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"
}
]
}
}

View File

@ -1 +1,62 @@
{"CVE_data_meta": {"ASSIGNER": "security@unisoc.com", "ID": "CVE-2022-39087", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000", "version": {"version_data": [{"version_value": "Android10/Android11/Android12"}]}}]}, "vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"}]}]}, "references": {"reference_data": [{"refsource": "MISC", "name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001", "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"}]}}
{
"CVE_data_meta": {
"ASSIGNER": "security@unisoc.com",
"ID": "CVE-2022-39087",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000",
"version": {
"version_data": [
{
"version_value": "Android10/Android11/Android12"
}
]
}
}
]
},
"vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001",
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"
}
]
}
}

View File

@ -1 +1,62 @@
{"CVE_data_meta": {"ASSIGNER": "security@unisoc.com", "ID": "CVE-2022-39088", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000", "version": {"version_data": [{"version_value": "Android10/Android11/Android12"}]}}]}, "vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"}]}]}, "references": {"reference_data": [{"refsource": "MISC", "name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001", "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"}]}}
{
"CVE_data_meta": {
"ASSIGNER": "security@unisoc.com",
"ID": "CVE-2022-39088",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000",
"version": {
"version_data": [
{
"version_value": "Android10/Android11/Android12"
}
]
}
}
]
},
"vendor_name": "Unisoc (Shanghai) Technologies Co., Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001",
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22603",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22604",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22605",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22606",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22607",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22608",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22609",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}