"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-03-28 21:01:28 +00:00
parent c58b68c71b
commit c3f0b4fce3
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
15 changed files with 1257 additions and 1133 deletions

View File

@ -22,7 +22,7 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "n\/a" "version_value": "n/a"
} }
] ]
} }
@ -49,7 +49,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in ISS BlackICE PC Protection and classified as critical. Affected by this issue is the component Cross Site Scripting Detection. The manipulation as part of POST\/PUT\/DELETE\/OPTIONS Request leads to privilege escalation. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." "value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in ISS BlackICE PC Protection and classified as critical. Affected by this issue is the component Cross Site Scripting Detection. The manipulation as part of POST/PUT/DELETE/OPTIONS Request leads to privilege escalation. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
} }
] ]
}, },
@ -58,19 +58,25 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "5.3", "baseScore": "5.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:L\/A:N" "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.104" "url": "https://vuldb.com/?id.104",
"refsource": "MISC",
"name": "https://vuldb.com/?id.104"
}, },
{ {
"url": "http:\/\/www.computec.ch\/mruef\/advisories\/black_ice_pc_protection_xss_evasion.txt" "url": "http://www.computec.ch/mruef/advisories/black_ice_pc_protection_xss_evasion.txt",
"refsource": "MISC",
"name": "http://www.computec.ch/mruef/advisories/black_ice_pc_protection_xss_evasion.txt"
}, },
{ {
"url": "http:\/\/www.cgisecurity.com\/articles\/xss-faq.shtml" "url": "http://www.cgisecurity.com/articles/xss-faq.shtml",
"refsource": "MISC",
"name": "http://www.cgisecurity.com/articles/xss-faq.shtml"
} }
] ]
} }

View File

@ -22,7 +22,7 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "n\/a" "version_value": "n/a"
} }
] ]
} }
@ -58,13 +58,15 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "3.7", "baseScore": "3.7",
"vectorString": "CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:N\/S:U\/C:L\/I:N\/A:N" "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.295" "url": "https://vuldb.com/?id.295",
"refsource": "MISC",
"name": "https://vuldb.com/?id.295"
} }
] ]
} }

View File

@ -22,7 +22,7 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "n\/a" "version_value": "n/a"
} }
] ]
} }
@ -58,13 +58,15 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "5.0", "baseScore": "5.0",
"vectorString": "CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:L\/I:L\/A:L" "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.296" "url": "https://vuldb.com/?id.296",
"refsource": "MISC",
"name": "https://vuldb.com/?id.296"
} }
] ]
} }

View File

@ -52,7 +52,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Netegrity SiteMinder up to 4.5.1 and classified as critical. Affected by this issue is the file \/siteminderagent\/pwcgi\/smpwservicescgi.exe of the component Login. The manipulation of the argument target leads to an open redirect. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." "value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Netegrity SiteMinder up to 4.5.1 and classified as critical. Affected by this issue is the file /siteminderagent/pwcgi/smpwservicescgi.exe of the component Login. The manipulation of the argument target leads to an open redirect. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
} }
] ]
}, },
@ -61,13 +61,15 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "5.4", "baseScore": "5.4",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:L\/I:L\/A:N" "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.1022" "url": "https://vuldb.com/?id.1022",
"refsource": "MISC",
"name": "https://vuldb.com/?id.1022"
} }
] ]
} }

View File

@ -22,7 +22,7 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "n\/a" "version_value": "n/a"
} }
] ]
} }
@ -58,16 +58,20 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "5.5", "baseScore": "5.5",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:L\/I:L\/A:L" "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.3809" "url": "https://vuldb.com/?id.3809",
"refsource": "MISC",
"name": "https://vuldb.com/?id.3809"
}, },
{ {
"url": "http:\/\/seclists.org\/bugtraq\/2008\/Sep\/0157.html" "url": "http://seclists.org/bugtraq/2008/Sep/0157.html",
"refsource": "MISC",
"name": "http://seclists.org/bugtraq/2008/Sep/0157.html"
} }
] ]
} }

View File

@ -58,19 +58,25 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "5.3", "baseScore": "5.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:L" "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.4143" "url": "https://vuldb.com/?id.4143",
"refsource": "MISC",
"name": "https://vuldb.com/?id.4143"
}, },
{ {
"url": "https:\/\/www.scip.ch\/publikationen\/advisories\/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt" "url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt",
"refsource": "MISC",
"name": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
}, },
{ {
"url": "http:\/\/seclists.org\/bugtraq\/2010\/Jul\/60" "url": "http://seclists.org/bugtraq/2010/Jul/60",
"refsource": "MISC",
"name": "http://seclists.org/bugtraq/2010/Jul/60"
} }
] ]
} }

View File

@ -58,16 +58,20 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "2.8", "baseScore": "2.8",
"vectorString": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:N\/A:L" "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.101969" "url": "https://vuldb.com/?id.101969",
"refsource": "MISC",
"name": "https://vuldb.com/?id.101969"
}, },
{ {
"url": "http:\/\/www.computec.ch\/news.php?item.117" "url": "http://www.computec.ch/news.php?item.117",
"refsource": "MISC",
"name": "http://www.computec.ch/news.php?item.117"
} }
] ]
} }

View File

@ -82,19 +82,25 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "2.8", "baseScore": "2.8",
"vectorString": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:N\/A:L" "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.101970" "url": "https://vuldb.com/?id.101969",
"refsource": "MISC",
"name": "https://vuldb.com/?id.101969"
}, },
{ {
"url": "https:\/\/vuldb.com\/?id.101969" "url": "http://www.computec.ch/news.php?item.117",
"refsource": "MISC",
"name": "http://www.computec.ch/news.php?item.117"
}, },
{ {
"url": "http:\/\/www.computec.ch\/news.php?item.117" "url": "https://vuldb.com/?id.101970",
"refsource": "MISC",
"name": "https://vuldb.com/?id.101970"
} }
] ]
} }

View File

@ -82,19 +82,25 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "2.8", "baseScore": "2.8",
"vectorString": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:N\/A:L" "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.101971" "url": "https://vuldb.com/?id.101969",
"refsource": "MISC",
"name": "https://vuldb.com/?id.101969"
}, },
{ {
"url": "https:\/\/vuldb.com\/?id.101969" "url": "http://www.computec.ch/news.php?item.117",
"refsource": "MISC",
"name": "http://www.computec.ch/news.php?item.117"
}, },
{ {
"url": "http:\/\/www.computec.ch\/news.php?item.117" "url": "https://vuldb.com/?id.101971",
"refsource": "MISC",
"name": "https://vuldb.com/?id.101971"
} }
] ]
} }

View File

@ -82,19 +82,25 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "2.8", "baseScore": "2.8",
"vectorString": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:N\/A:L" "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.101972" "url": "https://vuldb.com/?id.101969",
"refsource": "MISC",
"name": "https://vuldb.com/?id.101969"
}, },
{ {
"url": "https:\/\/vuldb.com\/?id.101969" "url": "http://www.computec.ch/news.php?item.117",
"refsource": "MISC",
"name": "http://www.computec.ch/news.php?item.117"
}, },
{ {
"url": "http:\/\/www.computec.ch\/news.php?item.117" "url": "https://vuldb.com/?id.101972",
"refsource": "MISC",
"name": "https://vuldb.com/?id.101972"
} }
] ]
} }

View File

@ -82,19 +82,25 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "2.8", "baseScore": "2.8",
"vectorString": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:N\/A:L" "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.101973" "url": "https://vuldb.com/?id.101969",
"refsource": "MISC",
"name": "https://vuldb.com/?id.101969"
}, },
{ {
"url": "https:\/\/vuldb.com\/?id.101969" "url": "http://www.computec.ch/news.php?item.117",
"refsource": "MISC",
"name": "http://www.computec.ch/news.php?item.117"
}, },
{ {
"url": "http:\/\/www.computec.ch\/news.php?item.117" "url": "https://vuldb.com/?id.101973",
"refsource": "MISC",
"name": "https://vuldb.com/?id.101973"
} }
] ]
} }

View File

@ -82,19 +82,25 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "4.3", "baseScore": "4.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:N\/A:L" "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.101974" "url": "https://vuldb.com/?id.101969",
"refsource": "MISC",
"name": "https://vuldb.com/?id.101969"
}, },
{ {
"url": "https:\/\/vuldb.com\/?id.101969" "url": "http://www.computec.ch/news.php?item.117",
"refsource": "MISC",
"name": "http://www.computec.ch/news.php?item.117"
}, },
{ {
"url": "http:\/\/www.computec.ch\/news.php?item.117" "url": "https://vuldb.com/?id.101974",
"refsource": "MISC",
"name": "https://vuldb.com/?id.101974"
} }
] ]
} }

View File

@ -4,7 +4,7 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2018-25030", "ID": "CVE-2018-25030",
"TITLE": "Mirmay Secure Private Browser \/ File Manager Auto Lock improper authentication", "TITLE": "Mirmay Secure Private Browser / File Manager Auto Lock improper authentication",
"REQUESTER": "cna@vuldb.com", "REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com", "ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
@ -98,19 +98,25 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "3.3", "baseScore": "3.3",
"vectorString": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N" "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.106056" "url": "https://vuldb.com/?id.106056",
"refsource": "MISC",
"name": "https://vuldb.com/?id.106056"
}, },
{ {
"url": "https:\/\/www.scip.ch\/en\/?labs.20180201" "url": "https://youtu.be/cd6nbos-BI0",
"refsource": "MISC",
"name": "https://youtu.be/cd6nbos-BI0"
}, },
{ {
"url": "https:\/\/youtu.be\/cd6nbos-BI0" "url": "https://www.scip.ch/en/?labs.20180201",
"refsource": "MISC",
"name": "https://www.scip.ch/en/?labs.20180201"
} }
] ]
} }

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-1123",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -1,17 +1,61 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-26278",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2022-26278",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Tenda AC9 v15.03.2.21_cn was discovered to contain a stack overflow via the time parameter in the PowerSaveSet function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/pllrry/Tenda-AC9-V15.03.2.21_cn-Command-Execution-Vulnerability/tree/main/Tenda-AC9",
"refsource": "MISC",
"name": "https://github.com/pllrry/Tenda-AC9-V15.03.2.21_cn-Command-Execution-Vulnerability/tree/main/Tenda-AC9"
} }
] ]
} }