"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-05-28 20:03:19 +00:00
parent 480550d61f
commit c2ea90d10b
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
95 changed files with 242 additions and 125 deletions

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-5f0117140d9a"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -98,6 +98,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-d175d3acf727"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-d175d3acf727"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-5f0117140d9a"
"engine": "bippy-d175d3acf727"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
"engine": "bippy-d175d3acf727"
}
}

View File

@ -191,6 +191,6 @@
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
"engine": "bippy-d175d3acf727"
}
}

View File

@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
"engine": "bippy-d175d3acf727"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
"engine": "bippy-d175d3acf727"
}
}

View File

@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
"engine": "bippy-d175d3acf727"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
"engine": "bippy-d175d3acf727"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
"engine": "bippy-d175d3acf727"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-5f0117140d9a"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-1e70cc10feda"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-1e70cc10feda"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-5f0117140d9a"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -120,6 +120,6 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-b4257b672505"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -109,6 +109,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -109,6 +109,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -152,6 +152,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -193,6 +193,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -113,6 +113,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -152,6 +152,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -98,6 +98,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -98,6 +98,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -131,6 +131,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-45171",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-45171",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in LIVEBOX Collaboration vDesk through v018. An Unrestricted Upload of a File with a Dangerous Type can occur under the vShare web site section. A remote user, authenticated to the product, can arbitrarily upload potentially dangerous files without restrictions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.gruppotim.it/it/footer/red-team.html",
"url": "https://www.gruppotim.it/it/footer/red-team.html"
}
]
}

View File

@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -87,6 +87,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -87,6 +87,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -152,6 +152,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -164,6 +164,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-30307",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-30307",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue discovered in TP-LINK TL-R473GP-AC, TP-LINK XDR6020, TP-LINK TL-R479GP-AC, TP-LINK TL-R4239G, TP-LINK TL-WAR1200L, and TP-LINK TL-R476G routers allows attackers to hijack TCP sessions which could lead to a denial of service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/",
"url": "https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-46694",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-46694",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Vtenext 21.02 allows an authenticated attacker to upload arbitrary files, potentially enabling them to execute remote commands. This flaw exists due to the application's failure to enforce proper authentication controls when accessing the Ckeditor file manager functionality."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://github.com/invisiblebyte/CVE-2023-46694",
"url": "https://github.com/invisiblebyte/CVE-2023-46694"
}
]
}

View File

@ -137,6 +137,6 @@
]
},
"generator": {
"engine": "bippy-5f0117140d9a"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -131,6 +131,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -152,6 +152,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -116,15 +116,10 @@
"url": "https://git.kernel.org/stable/c/4b081ce0d830b684fdf967abc3696d1261387254",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/4b081ce0d830b684fdf967abc3696d1261387254"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/18/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2024/03/18/2"
}
]
},
"generator": {
"engine": "bippy-1d0b2ea67d2d"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -105,15 +105,10 @@
"url": "https://git.kernel.org/stable/c/536bb492d39bb6c080c92f31e8a55fe9934f452b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/536bb492d39bb6c080c92f31e8a55fe9934f452b"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/18/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2024/03/18/2"
}
]
},
"generator": {
"engine": "bippy-1d0b2ea67d2d"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -105,15 +105,10 @@
"url": "https://git.kernel.org/stable/c/3df0411e132ee74a87aa13142dfd2b190275332e",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/3df0411e132ee74a87aa13142dfd2b190275332e"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/18/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2024/03/18/2"
}
]
},
"generator": {
"engine": "bippy-1d0b2ea67d2d"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-5f0117140d9a"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -152,6 +152,6 @@
]
},
"generator": {
"engine": "bippy-8df59b4913de"
"engine": "bippy-a5840b7849dd"
}
}