"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-12-29 18:00:40 +00:00
parent 9be819b2c5
commit b883a9fedc
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
53 changed files with 1662 additions and 923 deletions

View File

@ -1,40 +1,17 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@golang.org",
"ID": "CVE-2020-28366", "ID": "CVE-2020-28366",
"ASSIGNER": "security@golang.org",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Go before 1.14.12 and 1.15.x before 1.15.5 allows Code Injection." "value": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file."
} }
] ]
}, },
@ -44,49 +21,88 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "n/a" "value": "CWE-94: Improper Control of Generation of Code ('Code Injection')"
} }
] ]
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Go toolchain",
"product": {
"product_data": [
{
"product_name": "cmd/go",
"version": {
"version_data": [
{
"version_value": "0",
"version_affected": "="
},
{
"version_value": "1.15.0",
"version_affected": "="
}
]
}
},
{
"product_name": "cmd/cgo",
"version": {
"version_data": [
{
"version_value": "0",
"version_affected": "="
},
{
"version_value": "1.15.0",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "MLIST", "url": "https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM",
"name": "[trafficcontrol-issues] 20201112 [GitHub] [trafficcontrol] zrhoffman opened a new pull request #5278: Update Go version to 1.15.5",
"url": "https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM",
"url": "https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM"
},
{
"refsource": "MISC", "refsource": "MISC",
"name": "https://github.com/golang/go/issues/42559", "name": "https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM"
"url": "https://github.com/golang/go/issues/42559"
}, },
{ {
"refsource": "FEDORA", "url": "https://go.dev/cl/269658",
"name": "FEDORA-2020-864922e78a", "refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/" "name": "https://go.dev/cl/269658"
}, },
{ {
"refsource": "CONFIRM", "url": "https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292",
"name": "https://security.netapp.com/advisory/ntap-20201202-0004/", "refsource": "MISC",
"url": "https://security.netapp.com/advisory/ntap-20201202-0004/" "name": "https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292"
}, },
{ {
"refsource": "FEDORA", "url": "https://go.dev/issue/42559",
"name": "FEDORA-2020-e971480183", "refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/" "name": "https://go.dev/issue/42559"
}, },
{ {
"refsource": "GENTOO", "url": "https://pkg.go.dev/vuln/GO-2022-0475",
"name": "GLSA-202208-02", "refsource": "MISC",
"url": "https://security.gentoo.org/glsa/202208-02" "name": "https://pkg.go.dev/vuln/GO-2022-0475"
} }
] ]
} },
"credits": [
{
"lang": "en",
"value": "Chris Brown and Tempus Ex"
}
]
} }

View File

@ -1,34 +1,11 @@
{ {
"CVE_data_meta": { "data_version": "4.0",
"ASSIGNER": "security@golang.org",
"ID": "CVE-2020-28367",
"STATE": "PUBLIC"
},
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE", "data_format": "MITRE",
"data_version": "4.0", "CVE_data_meta": {
"affects": { "ID": "CVE-2020-28367",
"vendor": { "ASSIGNER": "security@golang.org",
"vendor_data": [ "STATE": "PUBLIC"
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
}, },
"description": { "description": {
"description_data": [ "description_data": [
@ -44,12 +21,40 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "n/a" "value": "CWE-94: Improper Control of Generation of Code ('Code Injection')"
} }
] ]
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Go toolchain",
"product": {
"product_data": [
{
"product_name": "cmd/go",
"version": {
"version_data": [
{
"version_value": "0",
"version_affected": "="
},
{
"version_value": "1.15.0",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
@ -79,9 +84,9 @@
} }
] ]
}, },
"credit": [ "credits": [
{ {
"lang": "eng", "lang": "en",
"value": "Imre Rad" "value": "Imre Rad"
} }
] ]

View File

@ -47,24 +47,6 @@
} }
] ]
} }
},
{
"vendor_name": "github.com/go-yaml/yaml",
"product": {
"product_data": [
{
"product_name": "github.com/go-yaml/yaml",
"version": {
"version_data": [
{
"version_value": "n/a",
"version_affected": "?"
}
]
}
}
]
}
} }
] ]
} }

View File

@ -1,40 +1,17 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@golang.org",
"ID": "CVE-2022-28131", "ID": "CVE-2022-28131",
"ASSIGNER": "security@golang.org",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "In Decoder.Skip in encoding/xml in Go before 1.17.12 and 1.18.x before 1.18.4, stack exhaustion and a panic can occur via a deeply nested XML document." "value": "Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a deeply nested XML document."
} }
] ]
}, },
@ -44,29 +21,73 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "n/a" "value": "CWE-674: Uncontrolled Recursion"
} }
] ]
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Go standard library",
"product": {
"product_data": [
{
"product_name": "encoding/xml",
"version": {
"version_data": [
{
"version_value": "0",
"version_affected": "="
},
{
"version_value": "1.18.0",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://groups.google.com/g/golang-announce", "url": "https://pkg.go.dev/vuln/GO-2022-0521",
"refsource": "MISC", "refsource": "MISC",
"name": "https://groups.google.com/g/golang-announce" "name": "https://pkg.go.dev/vuln/GO-2022-0521"
}, },
{ {
"refsource": "CONFIRM", "url": "https://go.dev/cl/417062",
"name": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "refsource": "MISC",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" "name": "https://go.dev/cl/417062"
}, },
{ {
"refsource": "CONFIRM", "url": "https://go.googlesource.com/go/+/08c46ed43d80bbb67cb904944ea3417989be4af3",
"name": "https://security.netapp.com/advisory/ntap-20221111-0009/", "refsource": "MISC",
"url": "https://security.netapp.com/advisory/ntap-20221111-0009/" "name": "https://go.googlesource.com/go/+/08c46ed43d80bbb67cb904944ea3417989be4af3"
},
{
"url": "https://go.dev/issue/53614",
"refsource": "MISC",
"name": "https://go.dev/issue/53614"
},
{
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE",
"refsource": "MISC",
"name": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
} }
] ]
} },
"credits": [
{
"lang": "en",
"value": "Go Security Team and Juho Nurminen of Mattermost"
}
]
} }

View File

@ -1,40 +1,17 @@
{ {
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@golang.org",
"ID": "CVE-2022-29804", "ID": "CVE-2022-29804",
"ASSIGNER": "security@golang.org",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "In filepath.Clean in path/filepath in Go before 1.17.11 and 1.18.x before 1.18.3 on Windows, invalid paths such as .\\c: could be converted to valid paths (such as c: in this example)." "value": "Incorrect conversion of certain invalid paths to valid, absolute paths in Clean in path/filepath before Go 1.17.11 and Go 1.18.3 on Windows allows potential directory traversal attack."
} }
] ]
}, },
@ -44,24 +21,73 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "n/a" "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
} }
] ]
} }
] ]
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Go standard library",
"product": {
"product_data": [
{
"product_name": "path/filepath",
"version": {
"version_data": [
{
"version_value": "0",
"version_affected": "="
},
{
"version_value": "1.18.0",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://groups.google.com/g/golang-announce", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ",
"refsource": "MISC", "refsource": "MISC",
"name": "https://groups.google.com/g/golang-announce" "name": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ"
}, },
{ {
"refsource": "CONFIRM", "url": "https://pkg.go.dev/vuln/GO-2022-0533",
"name": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "refsource": "MISC",
"url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" "name": "https://pkg.go.dev/vuln/GO-2022-0533"
},
{
"url": "https://go.dev/cl/401595",
"refsource": "MISC",
"name": "https://go.dev/cl/401595"
},
{
"url": "https://go.googlesource.com/go/+/9cd1818a7d019c02fa4898b3e45a323e35033290",
"refsource": "MISC",
"name": "https://go.googlesource.com/go/+/9cd1818a7d019c02fa4898b3e45a323e35033290"
},
{
"url": "https://go.dev/issue/52476",
"refsource": "MISC",
"name": "https://go.dev/issue/52476"
} }
] ]
} },
"credits": [
{
"lang": "en",
"value": "Unrud"
}
]
} }

View File

@ -66,6 +66,11 @@
"url": "https://github.com/pytest-dev/py/blob/cb87a83960523a2367d0f19226a73aed4ce4291d/py/_path/svnurl.py#L316", "url": "https://github.com/pytest-dev/py/blob/cb87a83960523a2367d0f19226a73aed4ce4291d/py/_path/svnurl.py#L316",
"refsource": "MISC", "refsource": "MISC",
"name": "https://github.com/pytest-dev/py/blob/cb87a83960523a2367d0f19226a73aed4ce4291d/py/_path/svnurl.py#L316" "name": "https://github.com/pytest-dev/py/blob/cb87a83960523a2367d0f19226a73aed4ce4291d/py/_path/svnurl.py#L316"
},
{
"refsource": "MISC",
"name": "https://news.ycombinator.com/item?id=34163710",
"url": "https://news.ycombinator.com/item?id=34163710"
} }
] ]
}, },

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-48181",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-48182",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-48183",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-48184",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-48185",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-48186",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-48187",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-48188",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-48189",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-48190",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -1,89 +1,89 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@huntr.dev", "ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-4843", "ID": "CVE-2022-4843",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "NULL Pointer Dereference in radareorg/radare2" "TITLE": "NULL Pointer Dereference in radareorg/radare2"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "radareorg/radare2", "product_name": "radareorg/radare2",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "<", "version_affected": "<",
"version_value": "5.8.2" "version_value": "5.8.2"
} }
] ]
}
}
]
},
"vendor_name": "radareorg"
} }
}
] ]
},
"vendor_name": "radareorg"
} }
] },
} "data_format": "MITRE",
}, "data_type": "CVE",
"data_format": "MITRE", "data_version": "4.0",
"data_type": "CVE", "description": {
"data_version": "4.0", "description_data": [
"description": { {
"description_data": [ "lang": "eng",
{ "value": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2."
"lang": "eng", }
"value": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-476 NULL Pointer Dereference"
}
] ]
} },
] "impact": {
}, "cvss": {
"references": { "attackComplexity": "LOW",
"reference_data": [ "attackVector": "LOCAL",
{ "availabilityImpact": "LOW",
"name": "https://huntr.dev/bounties/075b2760-66a0-4d38-b3b5-e9934956ab7f", "baseScore": 4.4,
"refsource": "CONFIRM", "baseSeverity": "MEDIUM",
"url": "https://huntr.dev/bounties/075b2760-66a0-4d38-b3b5-e9934956ab7f" "confidentialityImpact": "NONE",
}, "integrityImpact": "LOW",
{ "privilegesRequired": "NONE",
"name": "https://github.com/radareorg/radare2/commit/842f809d4ec6a12af2906f948657281c9ebc8a24", "scope": "UNCHANGED",
"refsource": "MISC", "userInteraction": "REQUIRED",
"url": "https://github.com/radareorg/radare2/commit/842f809d4ec6a12af2906f948657281c9ebc8a24" "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
} "version": "3.0"
] }
}, },
"source": { "problemtype": {
"advisory": "075b2760-66a0-4d38-b3b5-e9934956ab7f", "problemtype_data": [
"discovery": "EXTERNAL" {
} "description": [
{
"lang": "eng",
"value": "CWE-476 NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/075b2760-66a0-4d38-b3b5-e9934956ab7f",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/075b2760-66a0-4d38-b3b5-e9934956ab7f"
},
{
"name": "https://github.com/radareorg/radare2/commit/842f809d4ec6a12af2906f948657281c9ebc8a24",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/842f809d4ec6a12af2906f948657281c9ebc8a24"
}
]
},
"source": {
"advisory": "075b2760-66a0-4d38-b3b5-e9934956ab7f",
"discovery": "EXTERNAL"
}
} }

View File

@ -1,89 +1,89 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@huntr.dev", "ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-4844", "ID": "CVE-2022-4844",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "Cross-Site Request Forgery (CSRF) in usememos/memos" "TITLE": "Cross-Site Request Forgery (CSRF) in usememos/memos"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "usememos/memos", "product_name": "usememos/memos",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "<", "version_affected": "<",
"version_value": "0.9.1" "version_value": "0.9.1"
} }
] ]
}
}
]
},
"vendor_name": "usememos"
} }
}
] ]
},
"vendor_name": "usememos"
} }
] },
} "data_format": "MITRE",
}, "data_type": "CVE",
"data_format": "MITRE", "data_version": "4.0",
"data_type": "CVE", "description": {
"data_version": "4.0", "description_data": [
"description": { {
"description_data": [ "lang": "eng",
{ "value": "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1."
"lang": "eng", }
"value": "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
] ]
} },
] "impact": {
}, "cvss": {
"references": { "attackComplexity": "LOW",
"reference_data": [ "attackVector": "NETWORK",
{ "availabilityImpact": "NONE",
"name": "https://huntr.dev/bounties/8e8df1f4-07ab-4b75-aec8-75b1229e93a3", "baseScore": 6.5,
"refsource": "CONFIRM", "baseSeverity": "MEDIUM",
"url": "https://huntr.dev/bounties/8e8df1f4-07ab-4b75-aec8-75b1229e93a3" "confidentialityImpact": "LOW",
}, "integrityImpact": "LOW",
{ "privilegesRequired": "NONE",
"name": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948", "scope": "UNCHANGED",
"refsource": "MISC", "userInteraction": "NONE",
"url": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948" "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
} "version": "3.0"
] }
}, },
"source": { "problemtype": {
"advisory": "8e8df1f4-07ab-4b75-aec8-75b1229e93a3", "problemtype_data": [
"discovery": "EXTERNAL" {
} "description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948",
"refsource": "MISC",
"url": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948"
},
{
"name": "https://huntr.dev/bounties/8e8df1f4-07ab-4b75-aec8-75b1229e93a3",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/8e8df1f4-07ab-4b75-aec8-75b1229e93a3"
}
]
},
"source": {
"advisory": "8e8df1f4-07ab-4b75-aec8-75b1229e93a3",
"discovery": "EXTERNAL"
}
} }

View File

@ -1,89 +1,89 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@huntr.dev", "ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-4845", "ID": "CVE-2022-4845",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "Cross-Site Request Forgery (CSRF) in usememos/memos" "TITLE": "Cross-Site Request Forgery (CSRF) in usememos/memos"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "usememos/memos", "product_name": "usememos/memos",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "<", "version_affected": "<",
"version_value": "0.9.1" "version_value": "0.9.1"
} }
] ]
}
}
]
},
"vendor_name": "usememos"
} }
}
] ]
},
"vendor_name": "usememos"
} }
] },
} "data_format": "MITRE",
}, "data_type": "CVE",
"data_format": "MITRE", "data_version": "4.0",
"data_type": "CVE", "description": {
"data_version": "4.0", "description_data": [
"description": { {
"description_data": [ "lang": "eng",
{ "value": "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1."
"lang": "eng", }
"value": "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
] ]
} },
] "impact": {
}, "cvss": {
"references": { "attackComplexity": "HIGH",
"reference_data": [ "attackVector": "NETWORK",
{ "availabilityImpact": "HIGH",
"name": "https://huntr.dev/bounties/075dbd51-b078-436c-9e3d-7f25cd2e7e1b", "baseScore": 6.7,
"refsource": "CONFIRM", "baseSeverity": "MEDIUM",
"url": "https://huntr.dev/bounties/075dbd51-b078-436c-9e3d-7f25cd2e7e1b" "confidentialityImpact": "LOW",
}, "integrityImpact": "HIGH",
{ "privilegesRequired": "LOW",
"name": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948", "scope": "UNCHANGED",
"refsource": "MISC", "userInteraction": "REQUIRED",
"url": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948" "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:H",
} "version": "3.0"
] }
}, },
"source": { "problemtype": {
"advisory": "075dbd51-b078-436c-9e3d-7f25cd2e7e1b", "problemtype_data": [
"discovery": "EXTERNAL" {
} "description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948",
"refsource": "MISC",
"url": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948"
},
{
"name": "https://huntr.dev/bounties/075dbd51-b078-436c-9e3d-7f25cd2e7e1b",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/075dbd51-b078-436c-9e3d-7f25cd2e7e1b"
}
]
},
"source": {
"advisory": "075dbd51-b078-436c-9e3d-7f25cd2e7e1b",
"discovery": "EXTERNAL"
}
} }

View File

@ -1,89 +1,89 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@huntr.dev", "ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-4846", "ID": "CVE-2022-4846",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "Cross-Site Request Forgery (CSRF) in usememos/memos" "TITLE": "Cross-Site Request Forgery (CSRF) in usememos/memos"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "usememos/memos", "product_name": "usememos/memos",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "<", "version_affected": "<",
"version_value": "0.9.1" "version_value": "0.9.1"
} }
] ]
}
}
]
},
"vendor_name": "usememos"
} }
}
] ]
},
"vendor_name": "usememos"
} }
] },
} "data_format": "MITRE",
}, "data_type": "CVE",
"data_format": "MITRE", "data_version": "4.0",
"data_type": "CVE", "description": {
"data_version": "4.0", "description_data": [
"description": { {
"description_data": [ "lang": "eng",
{ "value": "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1."
"lang": "eng", }
"value": "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
] ]
} },
] "impact": {
}, "cvss": {
"references": { "attackComplexity": "LOW",
"reference_data": [ "attackVector": "NETWORK",
{ "availabilityImpact": "LOW",
"name": "https://huntr.dev/bounties/38c685fc-7065-472d-a46e-e26bf0b556d3", "baseScore": 6.3,
"refsource": "CONFIRM", "baseSeverity": "MEDIUM",
"url": "https://huntr.dev/bounties/38c685fc-7065-472d-a46e-e26bf0b556d3" "confidentialityImpact": "LOW",
}, "integrityImpact": "LOW",
{ "privilegesRequired": "LOW",
"name": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948", "scope": "UNCHANGED",
"refsource": "MISC", "userInteraction": "NONE",
"url": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948" "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
} "version": "3.0"
] }
}, },
"source": { "problemtype": {
"advisory": "38c685fc-7065-472d-a46e-e26bf0b556d3", "problemtype_data": [
"discovery": "EXTERNAL" {
} "description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948",
"refsource": "MISC",
"url": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948"
},
{
"name": "https://huntr.dev/bounties/38c685fc-7065-472d-a46e-e26bf0b556d3",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/38c685fc-7065-472d-a46e-e26bf0b556d3"
}
]
},
"source": {
"advisory": "38c685fc-7065-472d-a46e-e26bf0b556d3",
"discovery": "EXTERNAL"
}
} }

View File

@ -1,89 +1,89 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@huntr.dev", "ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-4847", "ID": "CVE-2022-4847",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "Incorrectly Specified Destination in a Communication Channel in usememos/memos" "TITLE": "Incorrectly Specified Destination in a Communication Channel in usememos/memos"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "usememos/memos", "product_name": "usememos/memos",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "<", "version_affected": "<",
"version_value": "0.9.1" "version_value": "0.9.1"
} }
] ]
}
}
]
},
"vendor_name": "usememos"
} }
}
] ]
},
"vendor_name": "usememos"
} }
] },
} "data_format": "MITRE",
}, "data_type": "CVE",
"data_format": "MITRE", "data_version": "4.0",
"data_type": "CVE", "description": {
"data_version": "4.0", "description_data": [
"description": { {
"description_data": [ "lang": "eng",
{ "value": "Incorrectly Specified Destination in a Communication Channel in GitHub repository usememos/memos prior to 0.9.1."
"lang": "eng", }
"value": "Incorrectly Specified Destination in a Communication Channel in GitHub repository usememos/memos prior to 0.9.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-941 Incorrectly Specified Destination in a Communication Channel"
}
] ]
} },
] "impact": {
}, "cvss": {
"references": { "attackComplexity": "LOW",
"reference_data": [ "attackVector": "NETWORK",
{ "availabilityImpact": "HIGH",
"name": "https://huntr.dev/bounties/ff6d4b5a-5e75-4a14-b5ce-f318f8613b73", "baseScore": 8.3,
"refsource": "CONFIRM", "baseSeverity": "HIGH",
"url": "https://huntr.dev/bounties/ff6d4b5a-5e75-4a14-b5ce-f318f8613b73" "confidentialityImpact": "HIGH",
}, "integrityImpact": "LOW",
{ "privilegesRequired": "NONE",
"name": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948", "scope": "UNCHANGED",
"refsource": "MISC", "userInteraction": "REQUIRED",
"url": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948" "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H",
} "version": "3.0"
] }
}, },
"source": { "problemtype": {
"advisory": "ff6d4b5a-5e75-4a14-b5ce-f318f8613b73", "problemtype_data": [
"discovery": "EXTERNAL" {
} "description": [
{
"lang": "eng",
"value": "CWE-941 Incorrectly Specified Destination in a Communication Channel"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/ff6d4b5a-5e75-4a14-b5ce-f318f8613b73",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/ff6d4b5a-5e75-4a14-b5ce-f318f8613b73"
},
{
"name": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948",
"refsource": "MISC",
"url": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948"
}
]
},
"source": {
"advisory": "ff6d4b5a-5e75-4a14-b5ce-f318f8613b73",
"discovery": "EXTERNAL"
}
} }

View File

@ -1,89 +1,89 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@huntr.dev", "ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-4848", "ID": "CVE-2022-4848",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "Improper Verification of Source of a Communication Channel in usememos/memos" "TITLE": "Improper Verification of Source of a Communication Channel in usememos/memos"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "usememos/memos", "product_name": "usememos/memos",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "<", "version_affected": "<",
"version_value": "0.9.1" "version_value": "0.9.1"
} }
] ]
}
}
]
},
"vendor_name": "usememos"
} }
}
] ]
},
"vendor_name": "usememos"
} }
] },
} "data_format": "MITRE",
}, "data_type": "CVE",
"data_format": "MITRE", "data_version": "4.0",
"data_type": "CVE", "description": {
"data_version": "4.0", "description_data": [
"description": { {
"description_data": [ "lang": "eng",
{ "value": "Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1."
"lang": "eng", }
"value": "Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-940 Improper Verification of Source of a Communication Channel"
}
] ]
} },
] "impact": {
}, "cvss": {
"references": { "attackComplexity": "LOW",
"reference_data": [ "attackVector": "NETWORK",
{ "availabilityImpact": "LOW",
"name": "https://huntr.dev/bounties/25de88cc-8d0d-41a1-b069-9ef1327770bc", "baseScore": 8.6,
"refsource": "CONFIRM", "baseSeverity": "HIGH",
"url": "https://huntr.dev/bounties/25de88cc-8d0d-41a1-b069-9ef1327770bc" "confidentialityImpact": "LOW",
}, "integrityImpact": "HIGH",
{ "privilegesRequired": "NONE",
"name": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948", "scope": "UNCHANGED",
"refsource": "MISC", "userInteraction": "NONE",
"url": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948" "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
} "version": "3.0"
] }
}, },
"source": { "problemtype": {
"advisory": "25de88cc-8d0d-41a1-b069-9ef1327770bc", "problemtype_data": [
"discovery": "EXTERNAL" {
} "description": [
{
"lang": "eng",
"value": "CWE-940 Improper Verification of Source of a Communication Channel"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948",
"refsource": "MISC",
"url": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948"
},
{
"name": "https://huntr.dev/bounties/25de88cc-8d0d-41a1-b069-9ef1327770bc",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/25de88cc-8d0d-41a1-b069-9ef1327770bc"
}
]
},
"source": {
"advisory": "25de88cc-8d0d-41a1-b069-9ef1327770bc",
"discovery": "EXTERNAL"
}
} }

View File

@ -1,89 +1,89 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@huntr.dev", "ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-4849", "ID": "CVE-2022-4849",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "Cross-Site Request Forgery (CSRF) in usememos/memos" "TITLE": "Cross-Site Request Forgery (CSRF) in usememos/memos"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "usememos/memos", "product_name": "usememos/memos",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "<", "version_affected": "<",
"version_value": "0.9.1" "version_value": "0.9.1"
} }
] ]
}
}
]
},
"vendor_name": "usememos"
} }
}
] ]
},
"vendor_name": "usememos"
} }
] },
} "data_format": "MITRE",
}, "data_type": "CVE",
"data_format": "MITRE", "data_version": "4.0",
"data_type": "CVE", "description": {
"data_version": "4.0", "description_data": [
"description": { {
"description_data": [ "lang": "eng",
{ "value": "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1."
"lang": "eng", }
"value": "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
] ]
} },
] "impact": {
}, "cvss": {
"references": { "attackComplexity": "LOW",
"reference_data": [ "attackVector": "NETWORK",
{ "availabilityImpact": "LOW",
"name": "https://huntr.dev/bounties/404ce7dd-f345-4d98-ad80-c53ac74f4e5c", "baseScore": 8.3,
"refsource": "CONFIRM", "baseSeverity": "HIGH",
"url": "https://huntr.dev/bounties/404ce7dd-f345-4d98-ad80-c53ac74f4e5c" "confidentialityImpact": "HIGH",
}, "integrityImpact": "HIGH",
{ "privilegesRequired": "NONE",
"name": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948", "scope": "UNCHANGED",
"refsource": "MISC", "userInteraction": "REQUIRED",
"url": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948" "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
} "version": "3.0"
] }
}, },
"source": { "problemtype": {
"advisory": "404ce7dd-f345-4d98-ad80-c53ac74f4e5c", "problemtype_data": [
"discovery": "EXTERNAL" {
} "description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948",
"refsource": "MISC",
"url": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948"
},
{
"name": "https://huntr.dev/bounties/404ce7dd-f345-4d98-ad80-c53ac74f4e5c",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/404ce7dd-f345-4d98-ad80-c53ac74f4e5c"
}
]
},
"source": {
"advisory": "404ce7dd-f345-4d98-ad80-c53ac74f4e5c",
"discovery": "EXTERNAL"
}
} }

View File

@ -1,89 +1,89 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@huntr.dev", "ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-4850", "ID": "CVE-2022-4850",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "Cross-Site Request Forgery (CSRF) in usememos/memos" "TITLE": "Cross-Site Request Forgery (CSRF) in usememos/memos"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "usememos/memos", "product_name": "usememos/memos",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "<", "version_affected": "<",
"version_value": "0.9.1" "version_value": "0.9.1"
} }
] ]
}
}
]
},
"vendor_name": "usememos"
} }
}
] ]
},
"vendor_name": "usememos"
} }
] },
} "data_format": "MITRE",
}, "data_type": "CVE",
"data_format": "MITRE", "data_version": "4.0",
"data_type": "CVE", "description": {
"data_version": "4.0", "description_data": [
"description": { {
"description_data": [ "lang": "eng",
{ "value": "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1."
"lang": "eng", }
"value": "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
] ]
} },
] "impact": {
}, "cvss": {
"references": { "attackComplexity": "LOW",
"reference_data": [ "attackVector": "NETWORK",
{ "availabilityImpact": "NONE",
"name": "https://huntr.dev/bounties/46dc4728-eacc-43f5-9831-c203fdbcc346", "baseScore": 6.5,
"refsource": "CONFIRM", "baseSeverity": "MEDIUM",
"url": "https://huntr.dev/bounties/46dc4728-eacc-43f5-9831-c203fdbcc346" "confidentialityImpact": "NONE",
}, "integrityImpact": "HIGH",
{ "privilegesRequired": "NONE",
"name": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948", "scope": "UNCHANGED",
"refsource": "MISC", "userInteraction": "REQUIRED",
"url": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948" "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
} "version": "3.0"
] }
}, },
"source": { "problemtype": {
"advisory": "46dc4728-eacc-43f5-9831-c203fdbcc346", "problemtype_data": [
"discovery": "EXTERNAL" {
} "description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948",
"refsource": "MISC",
"url": "https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948"
},
{
"name": "https://huntr.dev/bounties/46dc4728-eacc-43f5-9831-c203fdbcc346",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/46dc4728-eacc-43f5-9831-c203fdbcc346"
}
]
},
"source": {
"advisory": "46dc4728-eacc-43f5-9831-c203fdbcc346",
"discovery": "EXTERNAL"
}
} }

View File

@ -1,89 +1,89 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@huntr.dev", "ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-4851", "ID": "CVE-2022-4851",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "Improper Handling of Values in usememos/memos" "TITLE": "Improper Handling of Values in usememos/memos"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "usememos/memos", "product_name": "usememos/memos",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "<", "version_affected": "<",
"version_value": "0.9.1" "version_value": "0.9.1"
} }
] ]
}
}
]
},
"vendor_name": "usememos"
} }
}
] ]
},
"vendor_name": "usememos"
} }
] },
} "data_format": "MITRE",
}, "data_type": "CVE",
"data_format": "MITRE", "data_version": "4.0",
"data_type": "CVE", "description": {
"data_version": "4.0", "description_data": [
"description": { {
"description_data": [ "lang": "eng",
{ "value": "Improper Handling of Values in GitHub repository usememos/memos prior to 0.9.1."
"lang": "eng", }
"value": "Improper Handling of Values in GitHub repository usememos/memos prior to 0.9.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-229 Improper Handling of Values"
}
] ]
} },
] "impact": {
}, "cvss": {
"references": { "attackComplexity": "LOW",
"reference_data": [ "attackVector": "NETWORK",
{ "availabilityImpact": "HIGH",
"name": "https://huntr.dev/bounties/e3cebc1a-1326-4a08-abad-0414a717fa0f", "baseScore": 9.8,
"refsource": "CONFIRM", "baseSeverity": "CRITICAL",
"url": "https://huntr.dev/bounties/e3cebc1a-1326-4a08-abad-0414a717fa0f" "confidentialityImpact": "HIGH",
}, "integrityImpact": "HIGH",
{ "privilegesRequired": "NONE",
"name": "https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53", "scope": "UNCHANGED",
"refsource": "MISC", "userInteraction": "NONE",
"url": "https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53" "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
} "version": "3.0"
] }
}, },
"source": { "problemtype": {
"advisory": "e3cebc1a-1326-4a08-abad-0414a717fa0f", "problemtype_data": [
"discovery": "EXTERNAL" {
} "description": [
{
"lang": "eng",
"value": "CWE-229 Improper Handling of Values"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53",
"refsource": "MISC",
"url": "https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53"
},
{
"name": "https://huntr.dev/bounties/e3cebc1a-1326-4a08-abad-0414a717fa0f",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/e3cebc1a-1326-4a08-abad-0414a717fa0f"
}
]
},
"source": {
"advisory": "e3cebc1a-1326-4a08-abad-0414a717fa0f",
"discovery": "EXTERNAL"
}
} }

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-4852",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-4853",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-4854",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22476",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22477",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22478",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22479",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22480",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22481",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22482",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22483",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22484",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22485",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22486",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22487",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22488",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22489",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22490",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22491",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22492",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22493",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22494",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22495",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22496",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22497",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22498",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22499",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22500",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}