From 988797e5ed2e52f64943629985322a5b8b780e6b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 31 Dec 2023 15:00:35 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/1xxx/CVE-2018-1311.json | 5 ++ 2020/12xxx/CVE-2020-12801.json | 5 ++ 2020/12xxx/CVE-2020-12802.json | 5 ++ 2020/12xxx/CVE-2020-12803.json | 5 ++ 2023/37xxx/CVE-2023-37536.json | 5 ++ 2023/6xxx/CVE-2023-6185.json | 5 ++ 2023/6xxx/CVE-2023-6186.json | 5 ++ 2023/7xxx/CVE-2023-7188.json | 99 ++++++++++++++++++++++++++++++++-- 2023/7xxx/CVE-2023-7189.json | 95 ++++++++++++++++++++++++++++++-- 9 files changed, 221 insertions(+), 8 deletions(-) diff --git a/2018/1xxx/CVE-2018-1311.json b/2018/1xxx/CVE-2018-1311.json index d7299187b30..d48c5ab12c2 100644 --- a/2018/1xxx/CVE-2018-1311.json +++ b/2018/1xxx/CVE-2018-1311.json @@ -103,6 +103,11 @@ "refsource": "FEDORA", "name": "FEDORA-2023-817ecc703f", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AJYZUBGPVWJ7LEHRCMB5XVADQBNGURXD/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20231231 [SECURITY] [DLA 3704-1] xerces-c security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00027.html" } ] }, diff --git a/2020/12xxx/CVE-2020-12801.json b/2020/12xxx/CVE-2020-12801.json index 0935693750e..d87b7bcbba2 100644 --- a/2020/12xxx/CVE-2020-12801.json +++ b/2020/12xxx/CVE-2020-12801.json @@ -79,6 +79,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0786", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00011.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html" } ] }, diff --git a/2020/12xxx/CVE-2020-12802.json b/2020/12xxx/CVE-2020-12802.json index 03fb636b86d..16e53a2a8d7 100644 --- a/2020/12xxx/CVE-2020-12802.json +++ b/2020/12xxx/CVE-2020-12802.json @@ -77,6 +77,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1261", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00058.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html" } ] }, diff --git a/2020/12xxx/CVE-2020-12803.json b/2020/12xxx/CVE-2020-12803.json index 240190239b1..9efe2e4cc7c 100644 --- a/2020/12xxx/CVE-2020-12803.json +++ b/2020/12xxx/CVE-2020-12803.json @@ -77,6 +77,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1261", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00058.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html" } ] }, diff --git a/2023/37xxx/CVE-2023-37536.json b/2023/37xxx/CVE-2023-37536.json index 4cd3eb5e8c3..b5c55a72e07 100644 --- a/2023/37xxx/CVE-2023-37536.json +++ b/2023/37xxx/CVE-2023-37536.json @@ -72,6 +72,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AJYZUBGPVWJ7LEHRCMB5XVADQBNGURXD/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AJYZUBGPVWJ7LEHRCMB5XVADQBNGURXD/" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00027.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/12/msg00027.html" } ] }, diff --git a/2023/6xxx/CVE-2023-6185.json b/2023/6xxx/CVE-2023-6185.json index 4ef53559a84..534bdaf5395 100644 --- a/2023/6xxx/CVE-2023-6185.json +++ b/2023/6xxx/CVE-2023-6185.json @@ -73,6 +73,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html" } ] }, diff --git a/2023/6xxx/CVE-2023-6186.json b/2023/6xxx/CVE-2023-6186.json index 34dc3c69b4e..8dfaacc2359 100644 --- a/2023/6xxx/CVE-2023-6186.json +++ b/2023/6xxx/CVE-2023-6186.json @@ -73,6 +73,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html" } ] }, diff --git a/2023/7xxx/CVE-2023-7188.json b/2023/7xxx/CVE-2023-7188.json index 305b73be8a6..e4b1c5aaf3d 100644 --- a/2023/7xxx/CVE-2023-7188.json +++ b/2023/7xxx/CVE-2023-7188.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-7188", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical has been found in Shipping 100 Fahuo100 up to 1.1. Affected is an unknown function of the file member/login.php. The manipulation of the argument M_pwd leads to sql injection. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-249390 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Es wurde eine kritische Schwachstelle in Shipping 100 Fahuo100 bis 1.1 entdeckt. Es betrifft eine unbekannte Funktion der Datei member/login.php. Durch das Beeinflussen des Arguments M_pwd mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie gilt als schwierig auszunutzen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Shipping 100", + "product": { + "product_data": [ + { + "product_name": "Fahuo100", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + }, + { + "version_affected": "=", + "version_value": "1.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.249390", + "refsource": "MISC", + "name": "https://vuldb.com/?id.249390" + }, + { + "url": "https://vuldb.com/?ctiid.249390", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.249390" + }, + { + "url": "https://note.zhaoj.in/share/az24SaQJn1UQ", + "refsource": "MISC", + "name": "https://note.zhaoj.in/share/az24SaQJn1UQ" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "glzjin (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5, + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5, + "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4.3, + "vectorString": "AV:A/AC:H/Au:N/C:P/I:P/A:P" } ] } diff --git a/2023/7xxx/CVE-2023-7189.json b/2023/7xxx/CVE-2023-7189.json index ecf6c0544a9..eaf8dd4a341 100644 --- a/2023/7xxx/CVE-2023-7189.json +++ b/2023/7xxx/CVE-2023-7189.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-7189", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical was found in S-CMS up to 2.0_build20220529-20231006. Affected by this vulnerability is an unknown functionality of the file /s/index.php?action=statistics. The manipulation of the argument lid leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249391. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "In S-CMS bis 2.0_build20220529-20231006 wurde eine kritische Schwachstelle entdeckt. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei /s/index.php?action=statistics. Durch Beeinflussen des Arguments lid mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "S-CMS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.0_build20220529-20231006" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.249391", + "refsource": "MISC", + "name": "https://vuldb.com/?id.249391" + }, + { + "url": "https://vuldb.com/?ctiid.249391", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.249391" + }, + { + "url": "https://note.zhaoj.in/share/9yaojoQvesLu", + "refsource": "MISC", + "name": "https://note.zhaoj.in/share/9yaojoQvesLu" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "glzjin (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 5.5, + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 5.5, + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 5.2, + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P" } ] }