mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
d528a2a419
commit
8fb5bc23b2
@ -81,19 +81,19 @@
|
|||||||
"attackVector": "LOCAL",
|
"attackVector": "LOCAL",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact": "NONE",
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
"baseScore": 3.3,
|
"baseScore": 5.5,
|
||||||
"baseSeverity": "LOW",
|
"baseSeverity": "MEDIUM",
|
||||||
"confidentialityImpact": "LOW",
|
"confidentialityImpact": "HIGH",
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
"environmentalScore": 3.3,
|
"environmentalScore": 5.5,
|
||||||
"environmentalSeverity": "LOW",
|
"environmentalSeverity": "MEDIUM",
|
||||||
"exploitCodeMaturity": "NOT_DEFINED",
|
"exploitCodeMaturity": "NOT_DEFINED",
|
||||||
"integrityImpact": "NONE",
|
"integrityImpact": "NONE",
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
"modifiedAttackComplexity": "LOW",
|
"modifiedAttackComplexity": "LOW",
|
||||||
"modifiedAttackVector": "LOCAL",
|
"modifiedAttackVector": "LOCAL",
|
||||||
"modifiedAvailabilityImpact": "NONE",
|
"modifiedAvailabilityImpact": "NONE",
|
||||||
"modifiedConfidentialityImpact": "LOW",
|
"modifiedConfidentialityImpact": "HIGH",
|
||||||
"modifiedIntegrityImpact": "NONE",
|
"modifiedIntegrityImpact": "NONE",
|
||||||
"modifiedPrivilegesRequired": "NONE",
|
"modifiedPrivilegesRequired": "NONE",
|
||||||
"modifiedScope": "NOT_DEFINED",
|
"modifiedScope": "NOT_DEFINED",
|
||||||
@ -102,10 +102,10 @@
|
|||||||
"remediationLevel": "NOT_DEFINED",
|
"remediationLevel": "NOT_DEFINED",
|
||||||
"reportConfidence": "NOT_DEFINED",
|
"reportConfidence": "NOT_DEFINED",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"temporalScore": 3.3,
|
"temporalScore": 5.5,
|
||||||
"temporalSeverity": "LOW",
|
"temporalSeverity": "MEDIUM",
|
||||||
"userInteraction": "REQUIRED",
|
"userInteraction": "REQUIRED",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
"version": "3.1"
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -81,19 +81,19 @@
|
|||||||
"attackVector": "LOCAL",
|
"attackVector": "LOCAL",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact": "NONE",
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
"baseScore": 3.3,
|
"baseScore": 5.5,
|
||||||
"baseSeverity": "LOW",
|
"baseSeverity": "MEDIUM",
|
||||||
"confidentialityImpact": "LOW",
|
"confidentialityImpact": "HIGH",
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
"environmentalScore": 3.3,
|
"environmentalScore": 5.5,
|
||||||
"environmentalSeverity": "LOW",
|
"environmentalSeverity": "MEDIUM",
|
||||||
"exploitCodeMaturity": "NOT_DEFINED",
|
"exploitCodeMaturity": "NOT_DEFINED",
|
||||||
"integrityImpact": "NONE",
|
"integrityImpact": "NONE",
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
"modifiedAttackComplexity": "LOW",
|
"modifiedAttackComplexity": "LOW",
|
||||||
"modifiedAttackVector": "LOCAL",
|
"modifiedAttackVector": "LOCAL",
|
||||||
"modifiedAvailabilityImpact": "NONE",
|
"modifiedAvailabilityImpact": "NONE",
|
||||||
"modifiedConfidentialityImpact": "LOW",
|
"modifiedConfidentialityImpact": "HIGH",
|
||||||
"modifiedIntegrityImpact": "NONE",
|
"modifiedIntegrityImpact": "NONE",
|
||||||
"modifiedPrivilegesRequired": "NONE",
|
"modifiedPrivilegesRequired": "NONE",
|
||||||
"modifiedScope": "NOT_DEFINED",
|
"modifiedScope": "NOT_DEFINED",
|
||||||
@ -102,10 +102,10 @@
|
|||||||
"remediationLevel": "NOT_DEFINED",
|
"remediationLevel": "NOT_DEFINED",
|
||||||
"reportConfidence": "NOT_DEFINED",
|
"reportConfidence": "NOT_DEFINED",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"temporalScore": 3.3,
|
"temporalScore": 5.5,
|
||||||
"temporalSeverity": "LOW",
|
"temporalSeverity": "MEDIUM",
|
||||||
"userInteraction": "REQUIRED",
|
"userInteraction": "REQUIRED",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
"version": "3.1"
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -81,19 +81,19 @@
|
|||||||
"attackVector": "LOCAL",
|
"attackVector": "LOCAL",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact": "NONE",
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
"baseScore": 3.3,
|
"baseScore": 5.5,
|
||||||
"baseSeverity": "LOW",
|
"baseSeverity": "MEDIUM",
|
||||||
"confidentialityImpact": "LOW",
|
"confidentialityImpact": "HIGH",
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
"environmentalScore": 3.3,
|
"environmentalScore": 5.5,
|
||||||
"environmentalSeverity": "LOW",
|
"environmentalSeverity": "MEDIUM",
|
||||||
"exploitCodeMaturity": "NOT_DEFINED",
|
"exploitCodeMaturity": "NOT_DEFINED",
|
||||||
"integrityImpact": "NONE",
|
"integrityImpact": "NONE",
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
"modifiedAttackComplexity": "LOW",
|
"modifiedAttackComplexity": "LOW",
|
||||||
"modifiedAttackVector": "LOCAL",
|
"modifiedAttackVector": "LOCAL",
|
||||||
"modifiedAvailabilityImpact": "NONE",
|
"modifiedAvailabilityImpact": "NONE",
|
||||||
"modifiedConfidentialityImpact": "LOW",
|
"modifiedConfidentialityImpact": "HIGH",
|
||||||
"modifiedIntegrityImpact": "NONE",
|
"modifiedIntegrityImpact": "NONE",
|
||||||
"modifiedPrivilegesRequired": "NONE",
|
"modifiedPrivilegesRequired": "NONE",
|
||||||
"modifiedScope": "NOT_DEFINED",
|
"modifiedScope": "NOT_DEFINED",
|
||||||
@ -102,10 +102,10 @@
|
|||||||
"remediationLevel": "NOT_DEFINED",
|
"remediationLevel": "NOT_DEFINED",
|
||||||
"reportConfidence": "NOT_DEFINED",
|
"reportConfidence": "NOT_DEFINED",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"temporalScore": 3.3,
|
"temporalScore": 5.5,
|
||||||
"temporalSeverity": "LOW",
|
"temporalSeverity": "MEDIUM",
|
||||||
"userInteraction": "REQUIRED",
|
"userInteraction": "REQUIRED",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
"version": "3.1"
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -81,19 +81,19 @@
|
|||||||
"attackVector": "LOCAL",
|
"attackVector": "LOCAL",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact": "NONE",
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
"baseScore": 3.3,
|
"baseScore": 5.5,
|
||||||
"baseSeverity": "LOW",
|
"baseSeverity": "MEDIUM",
|
||||||
"confidentialityImpact": "LOW",
|
"confidentialityImpact": "HIGH",
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
"environmentalScore": 3.3,
|
"environmentalScore": 5.5,
|
||||||
"environmentalSeverity": "LOW",
|
"environmentalSeverity": "MEDIUM",
|
||||||
"exploitCodeMaturity": "NOT_DEFINED",
|
"exploitCodeMaturity": "NOT_DEFINED",
|
||||||
"integrityImpact": "NONE",
|
"integrityImpact": "NONE",
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
"modifiedAttackComplexity": "LOW",
|
"modifiedAttackComplexity": "LOW",
|
||||||
"modifiedAttackVector": "LOCAL",
|
"modifiedAttackVector": "LOCAL",
|
||||||
"modifiedAvailabilityImpact": "NONE",
|
"modifiedAvailabilityImpact": "NONE",
|
||||||
"modifiedConfidentialityImpact": "LOW",
|
"modifiedConfidentialityImpact": "HIGH",
|
||||||
"modifiedIntegrityImpact": "NONE",
|
"modifiedIntegrityImpact": "NONE",
|
||||||
"modifiedPrivilegesRequired": "NONE",
|
"modifiedPrivilegesRequired": "NONE",
|
||||||
"modifiedScope": "NOT_DEFINED",
|
"modifiedScope": "NOT_DEFINED",
|
||||||
@ -102,10 +102,10 @@
|
|||||||
"remediationLevel": "NOT_DEFINED",
|
"remediationLevel": "NOT_DEFINED",
|
||||||
"reportConfidence": "NOT_DEFINED",
|
"reportConfidence": "NOT_DEFINED",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"temporalScore": 3.3,
|
"temporalScore": 5.5,
|
||||||
"temporalSeverity": "LOW",
|
"temporalSeverity": "MEDIUM",
|
||||||
"userInteraction": "REQUIRED",
|
"userInteraction": "REQUIRED",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
"version": "3.1"
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -81,19 +81,19 @@
|
|||||||
"attackVector": "LOCAL",
|
"attackVector": "LOCAL",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact": "NONE",
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
"baseScore": 3.3,
|
"baseScore": 5.5,
|
||||||
"baseSeverity": "LOW",
|
"baseSeverity": "MEDIUM",
|
||||||
"confidentialityImpact": "LOW",
|
"confidentialityImpact": "HIGH",
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
"environmentalScore": 3.3,
|
"environmentalScore": 5.5,
|
||||||
"environmentalSeverity": "LOW",
|
"environmentalSeverity": "MEDIUM",
|
||||||
"exploitCodeMaturity": "NOT_DEFINED",
|
"exploitCodeMaturity": "NOT_DEFINED",
|
||||||
"integrityImpact": "NONE",
|
"integrityImpact": "NONE",
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
"modifiedAttackComplexity": "LOW",
|
"modifiedAttackComplexity": "LOW",
|
||||||
"modifiedAttackVector": "LOCAL",
|
"modifiedAttackVector": "LOCAL",
|
||||||
"modifiedAvailabilityImpact": "NONE",
|
"modifiedAvailabilityImpact": "NONE",
|
||||||
"modifiedConfidentialityImpact": "LOW",
|
"modifiedConfidentialityImpact": "HIGH",
|
||||||
"modifiedIntegrityImpact": "NONE",
|
"modifiedIntegrityImpact": "NONE",
|
||||||
"modifiedPrivilegesRequired": "NONE",
|
"modifiedPrivilegesRequired": "NONE",
|
||||||
"modifiedScope": "NOT_DEFINED",
|
"modifiedScope": "NOT_DEFINED",
|
||||||
@ -102,10 +102,10 @@
|
|||||||
"remediationLevel": "NOT_DEFINED",
|
"remediationLevel": "NOT_DEFINED",
|
||||||
"reportConfidence": "NOT_DEFINED",
|
"reportConfidence": "NOT_DEFINED",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"temporalScore": 3.3,
|
"temporalScore": 5.5,
|
||||||
"temporalSeverity": "LOW",
|
"temporalSeverity": "MEDIUM",
|
||||||
"userInteraction": "REQUIRED",
|
"userInteraction": "REQUIRED",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
"version": "3.1"
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -81,19 +81,19 @@
|
|||||||
"attackVector": "LOCAL",
|
"attackVector": "LOCAL",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact": "NONE",
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
"baseScore": 3.3,
|
"baseScore": 5.5,
|
||||||
"baseSeverity": "LOW",
|
"baseSeverity": "MEDIUM",
|
||||||
"confidentialityImpact": "LOW",
|
"confidentialityImpact": "HIGH",
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
"environmentalScore": 3.3,
|
"environmentalScore": 5.5,
|
||||||
"environmentalSeverity": "LOW",
|
"environmentalSeverity": "MEDIUM",
|
||||||
"exploitCodeMaturity": "NOT_DEFINED",
|
"exploitCodeMaturity": "NOT_DEFINED",
|
||||||
"integrityImpact": "NONE",
|
"integrityImpact": "NONE",
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
"modifiedAttackComplexity": "LOW",
|
"modifiedAttackComplexity": "LOW",
|
||||||
"modifiedAttackVector": "LOCAL",
|
"modifiedAttackVector": "LOCAL",
|
||||||
"modifiedAvailabilityImpact": "NONE",
|
"modifiedAvailabilityImpact": "NONE",
|
||||||
"modifiedConfidentialityImpact": "LOW",
|
"modifiedConfidentialityImpact": "HIGH",
|
||||||
"modifiedIntegrityImpact": "NONE",
|
"modifiedIntegrityImpact": "NONE",
|
||||||
"modifiedPrivilegesRequired": "NONE",
|
"modifiedPrivilegesRequired": "NONE",
|
||||||
"modifiedScope": "NOT_DEFINED",
|
"modifiedScope": "NOT_DEFINED",
|
||||||
@ -102,10 +102,10 @@
|
|||||||
"remediationLevel": "NOT_DEFINED",
|
"remediationLevel": "NOT_DEFINED",
|
||||||
"reportConfidence": "NOT_DEFINED",
|
"reportConfidence": "NOT_DEFINED",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"temporalScore": 3.3,
|
"temporalScore": 5.5,
|
||||||
"temporalSeverity": "LOW",
|
"temporalSeverity": "MEDIUM",
|
||||||
"userInteraction": "REQUIRED",
|
"userInteraction": "REQUIRED",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
"version": "3.1"
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -81,19 +81,19 @@
|
|||||||
"attackVector": "LOCAL",
|
"attackVector": "LOCAL",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact": "NONE",
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
"baseScore": 3.3,
|
"baseScore": 5.5,
|
||||||
"baseSeverity": "LOW",
|
"baseSeverity": "MEDIUM",
|
||||||
"confidentialityImpact": "LOW",
|
"confidentialityImpact": "HIGH",
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
"environmentalScore": 3.3,
|
"environmentalScore": 5.5,
|
||||||
"environmentalSeverity": "LOW",
|
"environmentalSeverity": "MEDIUM",
|
||||||
"exploitCodeMaturity": "NOT_DEFINED",
|
"exploitCodeMaturity": "NOT_DEFINED",
|
||||||
"integrityImpact": "NONE",
|
"integrityImpact": "NONE",
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
"modifiedAttackComplexity": "LOW",
|
"modifiedAttackComplexity": "LOW",
|
||||||
"modifiedAttackVector": "LOCAL",
|
"modifiedAttackVector": "LOCAL",
|
||||||
"modifiedAvailabilityImpact": "NONE",
|
"modifiedAvailabilityImpact": "NONE",
|
||||||
"modifiedConfidentialityImpact": "LOW",
|
"modifiedConfidentialityImpact": "HIGH",
|
||||||
"modifiedIntegrityImpact": "NONE",
|
"modifiedIntegrityImpact": "NONE",
|
||||||
"modifiedPrivilegesRequired": "NONE",
|
"modifiedPrivilegesRequired": "NONE",
|
||||||
"modifiedScope": "NOT_DEFINED",
|
"modifiedScope": "NOT_DEFINED",
|
||||||
@ -102,10 +102,10 @@
|
|||||||
"remediationLevel": "NOT_DEFINED",
|
"remediationLevel": "NOT_DEFINED",
|
||||||
"reportConfidence": "NOT_DEFINED",
|
"reportConfidence": "NOT_DEFINED",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"temporalScore": 3.3,
|
"temporalScore": 5.5,
|
||||||
"temporalSeverity": "LOW",
|
"temporalSeverity": "MEDIUM",
|
||||||
"userInteraction": "REQUIRED",
|
"userInteraction": "REQUIRED",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
"version": "3.1"
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -81,19 +81,19 @@
|
|||||||
"attackVector": "LOCAL",
|
"attackVector": "LOCAL",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact": "NONE",
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
"baseScore": 3.3,
|
"baseScore": 5.5,
|
||||||
"baseSeverity": "LOW",
|
"baseSeverity": "MEDIUM",
|
||||||
"confidentialityImpact": "LOW",
|
"confidentialityImpact": "HIGH",
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
"environmentalScore": 3.3,
|
"environmentalScore": 5.5,
|
||||||
"environmentalSeverity": "LOW",
|
"environmentalSeverity": "MEDIUM",
|
||||||
"exploitCodeMaturity": "NOT_DEFINED",
|
"exploitCodeMaturity": "NOT_DEFINED",
|
||||||
"integrityImpact": "NONE",
|
"integrityImpact": "NONE",
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
"modifiedAttackComplexity": "LOW",
|
"modifiedAttackComplexity": "LOW",
|
||||||
"modifiedAttackVector": "LOCAL",
|
"modifiedAttackVector": "LOCAL",
|
||||||
"modifiedAvailabilityImpact": "NONE",
|
"modifiedAvailabilityImpact": "NONE",
|
||||||
"modifiedConfidentialityImpact": "LOW",
|
"modifiedConfidentialityImpact": "HIGH",
|
||||||
"modifiedIntegrityImpact": "NONE",
|
"modifiedIntegrityImpact": "NONE",
|
||||||
"modifiedPrivilegesRequired": "NONE",
|
"modifiedPrivilegesRequired": "NONE",
|
||||||
"modifiedScope": "NOT_DEFINED",
|
"modifiedScope": "NOT_DEFINED",
|
||||||
@ -102,10 +102,10 @@
|
|||||||
"remediationLevel": "NOT_DEFINED",
|
"remediationLevel": "NOT_DEFINED",
|
||||||
"reportConfidence": "NOT_DEFINED",
|
"reportConfidence": "NOT_DEFINED",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"temporalScore": 3.3,
|
"temporalScore": 5.5,
|
||||||
"temporalSeverity": "LOW",
|
"temporalSeverity": "MEDIUM",
|
||||||
"userInteraction": "REQUIRED",
|
"userInteraction": "REQUIRED",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
"version": "3.1"
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -81,19 +81,19 @@
|
|||||||
"attackVector": "LOCAL",
|
"attackVector": "LOCAL",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact": "NONE",
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
"baseScore": 3.3,
|
"baseScore": 5.5,
|
||||||
"baseSeverity": "LOW",
|
"baseSeverity": "MEDIUM",
|
||||||
"confidentialityImpact": "LOW",
|
"confidentialityImpact": "HIGH",
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
"environmentalScore": 3.3,
|
"environmentalScore": 5.5,
|
||||||
"environmentalSeverity": "LOW",
|
"environmentalSeverity": "MEDIUM",
|
||||||
"exploitCodeMaturity": "NOT_DEFINED",
|
"exploitCodeMaturity": "NOT_DEFINED",
|
||||||
"integrityImpact": "NONE",
|
"integrityImpact": "NONE",
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
"modifiedAttackComplexity": "LOW",
|
"modifiedAttackComplexity": "LOW",
|
||||||
"modifiedAttackVector": "LOCAL",
|
"modifiedAttackVector": "LOCAL",
|
||||||
"modifiedAvailabilityImpact": "NONE",
|
"modifiedAvailabilityImpact": "NONE",
|
||||||
"modifiedConfidentialityImpact": "LOW",
|
"modifiedConfidentialityImpact": "HIGH",
|
||||||
"modifiedIntegrityImpact": "NONE",
|
"modifiedIntegrityImpact": "NONE",
|
||||||
"modifiedPrivilegesRequired": "NONE",
|
"modifiedPrivilegesRequired": "NONE",
|
||||||
"modifiedScope": "NOT_DEFINED",
|
"modifiedScope": "NOT_DEFINED",
|
||||||
@ -102,10 +102,10 @@
|
|||||||
"remediationLevel": "NOT_DEFINED",
|
"remediationLevel": "NOT_DEFINED",
|
||||||
"reportConfidence": "NOT_DEFINED",
|
"reportConfidence": "NOT_DEFINED",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"temporalScore": 3.3,
|
"temporalScore": 5.5,
|
||||||
"temporalSeverity": "LOW",
|
"temporalSeverity": "MEDIUM",
|
||||||
"userInteraction": "REQUIRED",
|
"userInteraction": "REQUIRED",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
"version": "3.1"
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -81,19 +81,19 @@
|
|||||||
"attackVector": "LOCAL",
|
"attackVector": "LOCAL",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact": "NONE",
|
||||||
"availabilityRequirement": "NOT_DEFINED",
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
"baseScore": 3.3,
|
"baseScore": 5.5,
|
||||||
"baseSeverity": "LOW",
|
"baseSeverity": "MEDIUM",
|
||||||
"confidentialityImpact": "LOW",
|
"confidentialityImpact": "HIGH",
|
||||||
"confidentialityRequirement": "NOT_DEFINED",
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
"environmentalScore": 3.3,
|
"environmentalScore": 5.5,
|
||||||
"environmentalSeverity": "LOW",
|
"environmentalSeverity": "MEDIUM",
|
||||||
"exploitCodeMaturity": "NOT_DEFINED",
|
"exploitCodeMaturity": "NOT_DEFINED",
|
||||||
"integrityImpact": "NONE",
|
"integrityImpact": "NONE",
|
||||||
"integrityRequirement": "NOT_DEFINED",
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
"modifiedAttackComplexity": "LOW",
|
"modifiedAttackComplexity": "LOW",
|
||||||
"modifiedAttackVector": "LOCAL",
|
"modifiedAttackVector": "LOCAL",
|
||||||
"modifiedAvailabilityImpact": "NONE",
|
"modifiedAvailabilityImpact": "NONE",
|
||||||
"modifiedConfidentialityImpact": "LOW",
|
"modifiedConfidentialityImpact": "HIGH",
|
||||||
"modifiedIntegrityImpact": "NONE",
|
"modifiedIntegrityImpact": "NONE",
|
||||||
"modifiedPrivilegesRequired": "NONE",
|
"modifiedPrivilegesRequired": "NONE",
|
||||||
"modifiedScope": "NOT_DEFINED",
|
"modifiedScope": "NOT_DEFINED",
|
||||||
@ -102,10 +102,10 @@
|
|||||||
"remediationLevel": "NOT_DEFINED",
|
"remediationLevel": "NOT_DEFINED",
|
||||||
"reportConfidence": "NOT_DEFINED",
|
"reportConfidence": "NOT_DEFINED",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"temporalScore": 3.3,
|
"temporalScore": 5.5,
|
||||||
"temporalSeverity": "LOW",
|
"temporalSeverity": "MEDIUM",
|
||||||
"userInteraction": "REQUIRED",
|
"userInteraction": "REQUIRED",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
"version": "3.1"
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -1,17 +1,66 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2023-48866",
|
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "RESERVED"
|
"ID": "CVE-2023-48866",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_version": "4.0",
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "A Cross-Site Scripting (XSS) vulnerability in the recipe preparation component within /api/objects/recipes and note component within /api/objects/shopping_lists/ of Grocy <= 4.0.3 allows attackers to obtain the victim's cookies."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/grocy/grocy",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/grocy/grocy"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://nitipoom-jar.github.io/CVE-2023-48866/",
|
||||||
|
"url": "https://nitipoom-jar.github.io/CVE-2023-48866/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,17 +1,61 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2023-48965",
|
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "RESERVED"
|
"ID": "CVE-2023-48965",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_version": "4.0",
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "An issue in the component /admin/api.plugs/script of ThinkAdmin v6.1.53 allows attackers to getshell via providing a crafted URL to download a malicious PHP file."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/1dreamGN/CVE/blob/main/ThinkAdmin%20Logical%20defect%20getshell.md",
|
||||||
|
"url": "https://github.com/1dreamGN/CVE/blob/main/ThinkAdmin%20Logical%20defect%20getshell.md"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,17 +1,61 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2023-48966",
|
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "RESERVED"
|
"ID": "CVE-2023-48966",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_version": "4.0",
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "An arbitrary file upload vulnerability in the component /admin/api.upload/file of ThinkAdmin v6.1.53 allows attackers to execute arbitrary code via a crafted Zip file."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/1dreamGN/CVE/blob/main/ThinkAdmin%20directory%20traversal%2Bfile%20upload%20getshell.md",
|
||||||
|
"url": "https://github.com/1dreamGN/CVE/blob/main/ThinkAdmin%20directory%20traversal%2Bfile%20upload%20getshell.md"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
18
2023/6xxx/CVE-2023-6486.json
Normal file
18
2023/6xxx/CVE-2023-6486.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2023-6486",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user