"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-12-31 15:00:35 +00:00
parent 087d754da6
commit 988797e5ed
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
9 changed files with 221 additions and 8 deletions

View File

@ -103,6 +103,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2023-817ecc703f",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AJYZUBGPVWJ7LEHRCMB5XVADQBNGURXD/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20231231 [SECURITY] [DLA 3704-1] xerces-c security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00027.html"
}
]
},

View File

@ -79,6 +79,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0786",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html"
}
]
},

View File

@ -77,6 +77,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1261",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00058.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html"
}
]
},

View File

@ -77,6 +77,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1261",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00058.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html"
}
]
},

View File

@ -72,6 +72,11 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AJYZUBGPVWJ7LEHRCMB5XVADQBNGURXD/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AJYZUBGPVWJ7LEHRCMB5XVADQBNGURXD/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00027.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2023/12/msg00027.html"
}
]
},

View File

@ -73,6 +73,11 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html"
}
]
},

View File

@ -73,6 +73,11 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html"
}
]
},

View File

@ -1,17 +1,108 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-7188",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as critical has been found in Shipping 100 Fahuo100 up to 1.1. Affected is an unknown function of the file member/login.php. The manipulation of the argument M_pwd leads to sql injection. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-249390 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Es wurde eine kritische Schwachstelle in Shipping 100 Fahuo100 bis 1.1 entdeckt. Es betrifft eine unbekannte Funktion der Datei member/login.php. Durch das Beeinflussen des Arguments M_pwd mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie gilt als schwierig auszunutzen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Shipping 100",
"product": {
"product_data": [
{
"product_name": "Fahuo100",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
},
{
"version_affected": "=",
"version_value": "1.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.249390",
"refsource": "MISC",
"name": "https://vuldb.com/?id.249390"
},
{
"url": "https://vuldb.com/?ctiid.249390",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.249390"
},
{
"url": "https://note.zhaoj.in/share/az24SaQJn1UQ",
"refsource": "MISC",
"name": "https://note.zhaoj.in/share/az24SaQJn1UQ"
}
]
},
"credits": [
{
"lang": "en",
"value": "glzjin (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5,
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 5,
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 4.3,
"vectorString": "AV:A/AC:H/Au:N/C:P/I:P/A:P"
}
]
}

View File

@ -1,17 +1,104 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-7189",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as critical was found in S-CMS up to 2.0_build20220529-20231006. Affected by this vulnerability is an unknown functionality of the file /s/index.php?action=statistics. The manipulation of the argument lid leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249391. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "In S-CMS bis 2.0_build20220529-20231006 wurde eine kritische Schwachstelle entdeckt. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei /s/index.php?action=statistics. Durch Beeinflussen des Arguments lid mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "S-CMS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2.0_build20220529-20231006"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.249391",
"refsource": "MISC",
"name": "https://vuldb.com/?id.249391"
},
{
"url": "https://vuldb.com/?ctiid.249391",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.249391"
},
{
"url": "https://note.zhaoj.in/share/9yaojoQvesLu",
"refsource": "MISC",
"name": "https://note.zhaoj.in/share/9yaojoQvesLu"
}
]
},
"credits": [
{
"lang": "en",
"value": "glzjin (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5.5,
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 5.5,
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 5.2,
"vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P"
}
]
}