"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-03-27 05:00:38 +00:00
parent 171aa68fe9
commit babf3a5a7c
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
13 changed files with 44 additions and 31 deletions

View File

@ -83,8 +83,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6922-4a37a-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6922-4a37a-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6922-4a37a-1.html"
}
]
},

View File

@ -80,8 +80,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6953-79236-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6953-79236-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6953-79236-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6954-ed16b-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6954-ed16b-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6954-ed16b-1.html"
}
]
},

View File

@ -38,7 +38,7 @@
"description_data": [
{
"lang": "eng",
"value": "Softnext Technologies Corp.s SPAM SQR has a vulnerability of Code Injection within its specific function. An authenticated remote attacker with administrator privilege can exploit this vulnerability to execute arbitrary system command to perform arbitrary system operation or disrupt service."
"value": "Softnext Technologies Corp.\u2019s SPAM SQR has a vulnerability of Code Injection within its specific function. An authenticated remote attacker with administrator privilege can exploit this vulnerability to execute arbitrary system command to perform arbitrary system operation or disrupt service."
}
]
},
@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6955-c7612-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6955-c7612-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6955-c7612-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6956-fbd85-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6956-fbd85-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6956-fbd85-1.html"
}
]
},

View File

@ -38,7 +38,7 @@
"description_data": [
{
"lang": "eng",
"value": "HGiga PowerStation has a vulnerability of Information Leakage. An unauthenticated remote attacker can exploit this vulnerability to obtain the administrators credential, resulting in performing arbitrary system operation or disrupt service."
"value": "HGiga PowerStation has a vulnerability of Information Leakage. An unauthenticated remote attacker can exploit this vulnerability to obtain the administrator\u2019s credential, resulting in performing arbitrary system operation or disrupt service."
}
]
},
@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6957-d8f67-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6957-d8f67-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6957-d8f67-1.html"
}
]
},

View File

@ -44,7 +44,7 @@
"description_data": [
{
"lang": "eng",
"value": "HGiga MailSherlocks specific function has insufficient filtering for user input. An unauthenticated remote attacker can exploit this vulnerability to inject JavaScript, conducting a reflected XSS attack."
"value": "HGiga MailSherlock\u2019s specific function has insufficient filtering for user input. An unauthenticated remote attacker can exploit this vulnerability to inject JavaScript, conducting a reflected XSS attack."
}
]
},
@ -82,8 +82,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6958-e1a8e-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6958-e1a8e-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6958-e1a8e-1.html"
}
]
},

View File

@ -39,7 +39,7 @@
"description_data": [
{
"lang": "eng",
"value": "HGiga MailSherlock mail query function has vulnerability of insufficient validation for user input. An authenticated remote attacker with administrator privilege can exploit this vulnerability to inject SQL commands to read, modify, and delete the database. "
"value": "HGiga MailSherlock mail query function has vulnerability of insufficient validation for user input. An authenticated remote attacker with administrator privilege can exploit this vulnerability to inject SQL commands to read, modify, and delete the database."
}
]
},
@ -77,8 +77,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6959-cdecb-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6959-cdecb-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6959-cdecb-1.html"
}
]
},

View File

@ -77,8 +77,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6960-fc2fe-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6960-fc2fe-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6960-fc2fe-1.html"
}
]
},

View File

@ -44,7 +44,7 @@
"description_data": [
{
"lang": "eng",
"value": "HGiga MailSherlock has vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to access partial content of another users mail by changing user ID and mail ID within URL."
"value": "HGiga MailSherlock has vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to access partial content of another user\u2019s mail by changing user ID and mail ID within URL."
}
]
},
@ -82,8 +82,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6961-12444-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6961-12444-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6961-12444-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6962-34ac1-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6962-34ac1-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6962-34ac1-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6963-7d2ee-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6963-7d2ee-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6963-7d2ee-1.html"
}
]
},

View File

@ -80,8 +80,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6973-45872-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6973-45872-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6973-45872-1.html"
}
]
},