"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-06-07 18:01:41 +00:00
parent a61b971d7d
commit a246ba88d8
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
20 changed files with 1430 additions and 60 deletions

View File

@ -4,14 +4,73 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36523",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "PlantUML Database Information Macro cross site scripting",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "",
"product": {
"product_data": [
{
"product_name": "PlantUML",
"version": {
"version_data": [
{
"version_value": "6.43"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross Site Scripting"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in PlantUML 6.43. It has been declared as problematic. Affected by this vulnerability is the component Database Information Macro. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "3.5",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
}
},
"references": {
"reference_data": [
{
"url": "https://seclists.org/fulldisclosure/2020/Oct/15",
"refsource": "MISC",
"name": "https://seclists.org/fulldisclosure/2020/Oct/15"
},
{
"url": "https://vuldb.com/?id.164509",
"refsource": "MISC",
"name": "https://vuldb.com/?id.164509"
}
]
}

View File

@ -4,14 +4,73 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36524",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "Refined Toolkit UI-Image/UI-Button cross site scripting",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "",
"product": {
"product_data": [
{
"product_name": "Refined Toolkit",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross Site Scripting"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in Refined Toolkit. It has been rated as problematic. Affected by this issue is some unknown functionality of the component UI-Image/UI-Button. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "3.5",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
}
},
"references": {
"reference_data": [
{
"url": "https://seclists.org/fulldisclosure/2020/Oct/15",
"refsource": "MISC",
"name": "https://seclists.org/fulldisclosure/2020/Oct/15"
},
{
"url": "https://vuldb.com/?id.164510",
"refsource": "MISC",
"name": "https://vuldb.com/?id.164510"
}
]
}

View File

@ -4,14 +4,73 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36525",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "Linking New Windows Macro cross site scripting",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "",
"product": {
"product_data": [
{
"product_name": "Linking",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross Site Scripting"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as problematic has been found in Linking. This affects an unknown part of the component New Windows Macro. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "3.5",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
}
},
"references": {
"reference_data": [
{
"url": "https://seclists.org/fulldisclosure/2020/Oct/15",
"refsource": "MISC",
"name": "https://seclists.org/fulldisclosure/2020/Oct/15"
},
{
"url": "https://vuldb.com/?id.164511",
"refsource": "MISC",
"name": "https://vuldb.com/?id.164511"
}
]
}

View File

@ -4,14 +4,73 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36526",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "Countdown Timer Macro cross site scripting",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "",
"product": {
"product_data": [
{
"product_name": "Countdown Timer",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross Site Scripting"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as problematic was found in Countdown Timer. This vulnerability affects unknown code of the component Macro Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "3.5",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
}
},
"references": {
"reference_data": [
{
"url": "https://seclists.org/fulldisclosure/2020/Oct/15",
"refsource": "MISC",
"name": "https://seclists.org/fulldisclosure/2020/Oct/15"
},
{
"url": "https://vuldb.com/?id.164512",
"refsource": "MISC",
"name": "https://vuldb.com/?id.164512"
}
]
}

View File

@ -4,14 +4,73 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36527",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "Server Status HTTP Status/SMTP Status cross site scripting",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "",
"product": {
"product_data": [
{
"product_name": "Server Status",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross Site Scripting"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability, which was classified as problematic, has been found in Server Status. This issue affects some unknown processing of the component HTTP Status/SMTP Status. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "3.5",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
}
},
"references": {
"reference_data": [
{
"url": "https://seclists.org/fulldisclosure/2020/Oct/15",
"refsource": "MISC",
"name": "https://seclists.org/fulldisclosure/2020/Oct/15"
},
{
"url": "https://vuldb.com/?id.164513",
"refsource": "MISC",
"name": "https://vuldb.com/?id.164513"
}
]
}

View File

@ -4,14 +4,74 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36528",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "Platinum Mobile MobileHandler.ashx access control",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "",
"product": {
"product_data": [
{
"product_name": "Platinum Mobile",
"version": {
"version_data": [
{
"version_value": "1.0.4.850"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-264 Improper Access Controls"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability, which was classified as critical, was found in Platinum Mobile 1.0.4.850. Affected is /MobileHandler.ashx which leads to broken access control. The attack requires authentication. Upgrading to version 1.0.4.851 is able to address this issue. It is recommended to upgrade the affected component."
}
]
},
"credit": "M. Li",
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "5.5",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "http://seclists.org/fulldisclosure/2020/Oct/4",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2020/Oct/4"
},
{
"url": "https://vuldb.com/?id.162264",
"refsource": "MISC",
"name": "https://vuldb.com/?id.162264"
}
]
}

View File

@ -4,14 +4,140 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36529",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "SevOne Network Management System Traceroute traceroute.php command injection",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SevOne",
"product": {
"product_data": [
{
"product_name": "Network Management System",
"version": {
"version_data": [
{
"version_value": "5.7.2.0"
},
{
"version_value": "5.7.2.1"
},
{
"version_value": "5.7.2.2"
},
{
"version_value": "5.7.2.3"
},
{
"version_value": "5.7.2.4"
},
{
"version_value": "5.7.2.5"
},
{
"version_value": "5.7.2.6"
},
{
"version_value": "5.7.2.7"
},
{
"version_value": "5.7.2.8"
},
{
"version_value": "5.7.2.9"
},
{
"version_value": "5.7.2.10"
},
{
"version_value": "5.7.2.11"
},
{
"version_value": "5.7.2.12"
},
{
"version_value": "5.7.2.13"
},
{
"version_value": "5.7.2.14"
},
{
"version_value": "5.7.2.15"
},
{
"version_value": "5.7.2.16"
},
{
"version_value": "5.7.2.17"
},
{
"version_value": "5.7.2.18"
},
{
"version_value": "5.7.2.19"
},
{
"version_value": "5.7.2.20"
},
{
"version_value": "5.7.2.21"
},
{
"version_value": "5.7.2.22"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77 Command Injection"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as critical has been found in SevOne Network Management System up to 5.7.2.22. This affects the file traceroute.php of the Traceroute Handler. The manipulation leads to privilege escalation with a command injection. It is possible to initiate the attack remotely."
}
]
},
"credit": "Calvin Phang",
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "8.8",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
},
"references": {
"reference_data": [
{
"url": "http://seclists.org/fulldisclosure/2020/Oct/5",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2020/Oct/5"
},
{
"url": "https://vuldb.com/?id.162261",
"refsource": "MISC",
"name": "https://vuldb.com/?id.162261"
}
]
}

View File

@ -4,14 +4,140 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36530",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "SevOne Network Management System Alert Summary sql injection",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SevOne",
"product": {
"product_data": [
{
"product_name": "Network Management System",
"version": {
"version_data": [
{
"version_value": "5.7.2.0"
},
{
"version_value": "5.7.2.1"
},
{
"version_value": "5.7.2.2"
},
{
"version_value": "5.7.2.3"
},
{
"version_value": "5.7.2.4"
},
{
"version_value": "5.7.2.5"
},
{
"version_value": "5.7.2.6"
},
{
"version_value": "5.7.2.7"
},
{
"version_value": "5.7.2.8"
},
{
"version_value": "5.7.2.9"
},
{
"version_value": "5.7.2.10"
},
{
"version_value": "5.7.2.11"
},
{
"version_value": "5.7.2.12"
},
{
"version_value": "5.7.2.13"
},
{
"version_value": "5.7.2.14"
},
{
"version_value": "5.7.2.15"
},
{
"version_value": "5.7.2.16"
},
{
"version_value": "5.7.2.17"
},
{
"version_value": "5.7.2.18"
},
{
"version_value": "5.7.2.19"
},
{
"version_value": "5.7.2.20"
},
{
"version_value": "5.7.2.21"
},
{
"version_value": "5.7.2.22"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as critical was found in SevOne Network Management System up to 5.7.2.22. This vulnerability affects the Alert Summary. The manipulation leads to sql injection. The attack can be initiated remotely."
}
]
},
"credit": "Calvin Phang",
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "http://seclists.org/fulldisclosure/2020/Oct/5",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2020/Oct/5"
},
{
"url": "https://vuldb.com/?id.162262",
"refsource": "MISC",
"name": "https://vuldb.com/?id.162262"
}
]
}

View File

@ -4,14 +4,140 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36531",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "SevOne Network Management System Device Manager Page injection",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SevOne",
"product": {
"product_data": [
{
"product_name": "Network Management System",
"version": {
"version_data": [
{
"version_value": "5.7.2.0"
},
{
"version_value": "5.7.2.1"
},
{
"version_value": "5.7.2.2"
},
{
"version_value": "5.7.2.3"
},
{
"version_value": "5.7.2.4"
},
{
"version_value": "5.7.2.5"
},
{
"version_value": "5.7.2.6"
},
{
"version_value": "5.7.2.7"
},
{
"version_value": "5.7.2.8"
},
{
"version_value": "5.7.2.9"
},
{
"version_value": "5.7.2.10"
},
{
"version_value": "5.7.2.11"
},
{
"version_value": "5.7.2.12"
},
{
"version_value": "5.7.2.13"
},
{
"version_value": "5.7.2.14"
},
{
"version_value": "5.7.2.15"
},
{
"version_value": "5.7.2.16"
},
{
"version_value": "5.7.2.17"
},
{
"version_value": "5.7.2.18"
},
{
"version_value": "5.7.2.19"
},
{
"version_value": "5.7.2.20"
},
{
"version_value": "5.7.2.21"
},
{
"version_value": "5.7.2.22"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-74 Injection"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability, which was classified as critical, has been found in SevOne Network Management System up to 5.7.2.22. This issue affects the Device Manager Page. An injection leads to privilege escalation. The attack may be initiated remotely."
}
]
},
"credit": "Calvin Phang",
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "http://seclists.org/fulldisclosure/2020/Oct/5",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2020/Oct/5"
},
{
"url": "https://vuldb.com/?id.162263",
"refsource": "MISC",
"name": "https://vuldb.com/?id.162263"
}
]
}

View File

@ -4,14 +4,74 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36532",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "Klapp App Authorization Credentials information disclosure",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Klapp",
"product": {
"product_data": [
{
"product_name": "App",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200 Information Disclosure"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been found in Klapp App and classified as problematic. This vulnerability affects unknown code of the component Authorization. The manipulation leads to information disclosure (Credentials). The attack can be initiated remotely. It is recommended to upgrade the affected app."
}
]
},
"credit": "Sven Fassbender",
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "4.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
}
},
"references": {
"reference_data": [
{
"url": "https://www.modzero.com/modlog/archives/2020/09/07/knapp_daneben_ist_auch_vorbei/index.html",
"refsource": "MISC",
"name": "https://www.modzero.com/modlog/archives/2020/09/07/knapp_daneben_ist_auch_vorbei/index.html"
},
{
"url": "https://vuldb.com/?id.160762",
"refsource": "MISC",
"name": "https://vuldb.com/?id.160762"
}
]
}

View File

@ -4,14 +4,74 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36533",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "Klapp App JSON Web Token improper authentication",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Klapp",
"product": {
"product_data": [
{
"product_name": "App",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-287 Improper Authentication"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in Klapp App and classified as problematic. This issue affects some unknown processing of the JSON Web Token Handler. The manipulation leads to weak authentication. The attack may be initiated remotely."
}
]
},
"credit": "Sven Fassbender",
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "3.7",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
},
"references": {
"reference_data": [
{
"url": "https://www.modzero.com/modlog/archives/2020/09/07/knapp_daneben_ist_auch_vorbei/index.html",
"refsource": "MISC",
"name": "https://www.modzero.com/modlog/archives/2020/09/07/knapp_daneben_ist_auch_vorbei/index.html"
},
{
"url": "https://vuldb.com/?id.160763",
"refsource": "MISC",
"name": "https://vuldb.com/?id.160763"
}
]
}

View File

@ -4,14 +4,73 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36534",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "easyii CMS out cross-site request forgery",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "easyii",
"product": {
"product_data": [
{
"product_name": "CMS",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in easyii CMS. It has been classified as problematic. Affected is an unknown function of the file /admin/sign/out. The manipulation leads to cross site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "4.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/noumo/easyii/",
"refsource": "MISC",
"name": "https://github.com/noumo/easyii/"
},
{
"url": "https://vuldb.com/?id.160278",
"refsource": "MISC",
"name": "https://vuldb.com/?id.160278"
}
]
}

View File

@ -4,14 +4,69 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36535",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "MINMAX newsDia.php sql injection",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "",
"product": {
"product_data": [
{
"product_name": "MINMAX",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as critical has been found in MINMAX. This affects an unknown part of the file /newsDia.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely."
}
]
},
"credit": "Mostafa Farzaneh",
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.159957",
"refsource": "MISC",
"name": "https://vuldb.com/?id.159957"
}
]
}

View File

@ -4,14 +4,69 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36536",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "Brandbugle main.php sql injection",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "",
"product": {
"product_data": [
{
"product_name": "Brandbugle",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in Brandbugle. It has been rated as critical. Affected by this issue is some unknown functionality of the file /main.php. The manipulation leads to sql injection. The attack may be launched remotely."
}
]
},
"credit": "Mostafa Farzaneh",
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.159956",
"refsource": "MISC",
"name": "https://vuldb.com/?id.159956"
}
]
}

View File

@ -4,14 +4,69 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36537",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "Everywhere CMS sql injection",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Everywhere",
"product": {
"product_data": [
{
"product_name": "CMS",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in Everywhere CMS. It has been classified as critical. Affected is an unknown function. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely."
}
]
},
"credit": "Mostafa Farzaneh",
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.159954",
"refsource": "MISC",
"name": "https://vuldb.com/?id.159954"
}
]
}

View File

@ -4,14 +4,69 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36538",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "Eatan CMS sql injection",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Eatan",
"product": {
"product_data": [
{
"product_name": "CMS",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in Eatan CMS. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection. The attack can be launched remotely."
}
]
},
"credit": "Mostafa Farzaneh",
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.159955",
"refsource": "MISC",
"name": "https://vuldb.com/?id.159955"
}
]
}

View File

@ -4,14 +4,69 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36539",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "L\u00f3gico y Creativo sql injection",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "",
"product": {
"product_data": [
{
"product_name": "L\u00f3gico y Creativo",
"version": {
"version_data": [
{
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in L\u00f3gico y Creativo 1.0 and classified as critical. This issue affects some unknown processing. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely."
}
]
},
"credit": "Mostafa Farzaneh",
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.159953",
"refsource": "MISC",
"name": "https://vuldb.com/?id.159953"
}
]
}

View File

@ -4,14 +4,69 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36540",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "Neetai Tech product.php sql injection",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "",
"product": {
"product_data": [
{
"product_name": "Neetai Tech",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability, which was classified as critical, was found in Neetai Tech. Affected is an unknown function of the file /product.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
]
},
"credit": "Mostafa Farzaneh",
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.159438",
"refsource": "MISC",
"name": "https://vuldb.com/?id.159438"
}
]
}

View File

@ -4,14 +4,78 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36541",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "Demokratian genera_select.php sql injection",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "",
"product": {
"product_data": [
{
"product_name": "Demokratian",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in Demokratian. It has been rated as critical. Affected by this issue is some unknown functionality of the file basicos_php/genera_select.php. The manipulation of the argument id_provincia with the input -1%20union%20all%20select%201,2,3,4,database() leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "7.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https://alquimistadesistemas.com/sql-injection-y-archivo-peligroso-en-demokratian",
"refsource": "MISC",
"name": "https://alquimistadesistemas.com/sql-injection-y-archivo-peligroso-en-demokratian"
},
{
"url": "https://bitbucket.org/csalgadow/demokratian_votaciones/commits/b56c48b519fc52efa65404c312ea9bbde320e3fa",
"refsource": "MISC",
"name": "https://bitbucket.org/csalgadow/demokratian_votaciones/commits/b56c48b519fc52efa65404c312ea9bbde320e3fa"
},
{
"url": "https://vuldb.com/?id.159434",
"refsource": "MISC",
"name": "https://vuldb.com/?id.159434"
}
]
}

View File

@ -4,14 +4,78 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36542",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"TITLE": "Demokratian install3.php privileges management",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "",
"product": {
"product_data": [
{
"product_name": "Demokratian",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-269 Improper Privilege Management"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as critical has been found in Demokratian. This affects an unknown part of the file install/install3.php. The manipulation leads to privilege escalation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "7.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https://alquimistadesistemas.com/sql-injection-y-archivo-peligroso-en-demokratian",
"refsource": "MISC",
"name": "https://alquimistadesistemas.com/sql-injection-y-archivo-peligroso-en-demokratian"
},
{
"url": "https://bitbucket.org/csalgadow/demokratian_votaciones/commits/0d073ee461edd5f42528d41e00bf0a7b22e86bb3",
"refsource": "MISC",
"name": "https://bitbucket.org/csalgadow/demokratian_votaciones/commits/0d073ee461edd5f42528d41e00bf0a7b22e86bb3"
},
{
"url": "https://vuldb.com/?id.159435",
"refsource": "MISC",
"name": "https://vuldb.com/?id.159435"
}
]
}