mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3dceb138e5
commit
bd6f702fd4
@ -58,16 +58,20 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "3.5",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/www.exploit-db.com\/exploits\/41184\/"
|
||||
"url": "https://www.exploit-db.com/exploits/41184/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.exploit-db.com/exploits/41184/"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.96627"
|
||||
"url": "https://vuldb.com/?id.96627",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.96627"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -49,7 +49,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been found in TrueConf Server 4.3.7 and classified as problematic. This vulnerability affects unknown code of the file \/admin\/conferences\/get-all-status\/. The manipulation of the argument keys[] leads to basic cross site scripting (Reflected). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability has been found in TrueConf Server 4.3.7 and classified as problematic. This vulnerability affects unknown code of the file /admin/conferences/get-all-status/. The manipulation of the argument keys[] leads to basic cross site scripting (Reflected). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -58,16 +58,20 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "3.5",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/www.exploit-db.com\/exploits\/41184\/"
|
||||
"url": "https://www.exploit-db.com/exploits/41184/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.exploit-db.com/exploits/41184/"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.96628"
|
||||
"url": "https://vuldb.com/?id.96628",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.96628"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -49,7 +49,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability was found in TrueConf Server 4.3.7 and classified as problematic. This issue affects some unknown processing of the file \/admin\/conferences\/list\/. The manipulation of the argument sort leads to basic cross site scripting (Reflected). The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability was found in TrueConf Server 4.3.7 and classified as problematic. This issue affects some unknown processing of the file /admin/conferences/list/. The manipulation of the argument sort leads to basic cross site scripting (Reflected). The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -58,16 +58,20 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "3.5",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/www.exploit-db.com\/exploits\/41184\/"
|
||||
"url": "https://www.exploit-db.com/exploits/41184/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.exploit-db.com/exploits/41184/"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.96629"
|
||||
"url": "https://vuldb.com/?id.96629",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.96629"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -49,7 +49,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability was found in TrueConf Server 4.3.7. It has been classified as problematic. Affected is an unknown function of the file \/admin\/group\/list\/. The manipulation of the argument checked_group_id leads to basic cross site scripting (Reflected). It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability was found in TrueConf Server 4.3.7. It has been classified as problematic. Affected is an unknown function of the file /admin/group/list/. The manipulation of the argument checked_group_id leads to basic cross site scripting (Reflected). It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -58,16 +58,20 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "3.5",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/www.exploit-db.com\/exploits\/41184\/"
|
||||
"url": "https://www.exploit-db.com/exploits/41184/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.exploit-db.com/exploits/41184/"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.96630"
|
||||
"url": "https://vuldb.com/?id.96630",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.96630"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -49,7 +49,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability was found in TrueConf Server 4.3.7. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file \/admin\/group. The manipulation leads to basic cross site scripting (DOM). The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability was found in TrueConf Server 4.3.7. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/group. The manipulation leads to basic cross site scripting (DOM). The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -58,16 +58,20 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "3.5",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/www.exploit-db.com\/exploits\/41184\/"
|
||||
"url": "https://www.exploit-db.com/exploits/41184/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.exploit-db.com/exploits/41184/"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.96631"
|
||||
"url": "https://vuldb.com/?id.96631",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.96631"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -49,7 +49,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability was found in TrueConf Server 4.3.7. It has been rated as problematic. Affected by this issue is some unknown functionality of the file \/admin\/conferences\/list\/. The manipulation of the argument domxss leads to basic cross site scripting (DOM). The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability was found in TrueConf Server 4.3.7. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/conferences/list/. The manipulation of the argument domxss leads to basic cross site scripting (DOM). The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -58,16 +58,20 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "3.5",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/www.exploit-db.com\/exploits\/41184\/"
|
||||
"url": "https://www.exploit-db.com/exploits/41184/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.exploit-db.com/exploits/41184/"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.96632"
|
||||
"url": "https://vuldb.com/?id.96632",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.96632"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -49,7 +49,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability classified as problematic has been found in TrueConf Server 4.3.7. This affects an unknown part of the file \/admin\/general\/change-lang. The manipulation of the argument redirect_url leads to open redirect. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability classified as problematic has been found in TrueConf Server 4.3.7. This affects an unknown part of the file /admin/general/change-lang. The manipulation of the argument redirect_url leads to open redirect. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -58,16 +58,20 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "3.5",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/www.exploit-db.com\/exploits\/41184\/"
|
||||
"url": "https://www.exploit-db.com/exploits/41184/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.exploit-db.com/exploits/41184/"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.96633"
|
||||
"url": "https://vuldb.com/?id.96633",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.96633"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -49,7 +49,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability classified as problematic was found in TrueConf Server 4.3.7. This vulnerability affects unknown code of the file \/admin\/service\/stop\/. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability classified as problematic was found in TrueConf Server 4.3.7. This vulnerability affects unknown code of the file /admin/service/stop/. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -58,16 +58,20 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "4.3",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/www.exploit-db.com\/exploits\/41184\/"
|
||||
"url": "https://www.exploit-db.com/exploits/41184/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.exploit-db.com/exploits/41184/"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.96634"
|
||||
"url": "https://vuldb.com/?id.96634",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.96634"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,61 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-33042",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2022-33042",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/inquiries/view_details.php."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/736335151/bug_report/blob/main/vendors/oretnom23/online-railway-reservation-system/SQLi-1.md",
|
||||
"url": "https://github.com/736335151/bug_report/blob/main/vendors/oretnom23/online-railway-reservation-system/SQLi-1.md"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user