mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
c58b68c71b
commit
c3f0b4fce3
@ -22,7 +22,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n\/a"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -49,7 +49,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in ISS BlackICE PC Protection and classified as critical. Affected by this issue is the component Cross Site Scripting Detection. The manipulation as part of POST\/PUT\/DELETE\/OPTIONS Request leads to privilege escalation. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in ISS BlackICE PC Protection and classified as critical. Affected by this issue is the component Cross Site Scripting Detection. The manipulation as part of POST/PUT/DELETE/OPTIONS Request leads to privilege escalation. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -58,19 +58,25 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "5.3",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:L\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.104"
|
||||
"url": "https://vuldb.com/?id.104",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.104"
|
||||
},
|
||||
{
|
||||
"url": "http:\/\/www.computec.ch\/mruef\/advisories\/black_ice_pc_protection_xss_evasion.txt"
|
||||
"url": "http://www.computec.ch/mruef/advisories/black_ice_pc_protection_xss_evasion.txt",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.computec.ch/mruef/advisories/black_ice_pc_protection_xss_evasion.txt"
|
||||
},
|
||||
{
|
||||
"url": "http:\/\/www.cgisecurity.com\/articles\/xss-faq.shtml"
|
||||
"url": "http://www.cgisecurity.com/articles/xss-faq.shtml",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.cgisecurity.com/articles/xss-faq.shtml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -22,7 +22,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n\/a"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,13 +58,15 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "3.7",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:N\/S:U\/C:L\/I:N\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.295"
|
||||
"url": "https://vuldb.com/?id.295",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.295"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -22,7 +22,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n\/a"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,13 +58,15 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "5.0",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:L\/I:L\/A:L"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.296"
|
||||
"url": "https://vuldb.com/?id.296",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.296"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,7 +52,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Netegrity SiteMinder up to 4.5.1 and classified as critical. Affected by this issue is the file \/siteminderagent\/pwcgi\/smpwservicescgi.exe of the component Login. The manipulation of the argument target leads to an open redirect. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Netegrity SiteMinder up to 4.5.1 and classified as critical. Affected by this issue is the file /siteminderagent/pwcgi/smpwservicescgi.exe of the component Login. The manipulation of the argument target leads to an open redirect. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,13 +61,15 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "5.4",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:L\/I:L\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.1022"
|
||||
"url": "https://vuldb.com/?id.1022",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.1022"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -22,7 +22,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n\/a"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,16 +58,20 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "5.5",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:L\/I:L\/A:L"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.3809"
|
||||
"url": "https://vuldb.com/?id.3809",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.3809"
|
||||
},
|
||||
{
|
||||
"url": "http:\/\/seclists.org\/bugtraq\/2008\/Sep\/0157.html"
|
||||
"url": "http://seclists.org/bugtraq/2008/Sep/0157.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://seclists.org/bugtraq/2008/Sep/0157.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,19 +58,25 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "5.3",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:L"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.4143"
|
||||
"url": "https://vuldb.com/?id.4143",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.4143"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/www.scip.ch\/publikationen\/advisories\/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
|
||||
"url": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.scip.ch/publikationen/advisories/scip_advisory-4143_shemes_grabbit_malicious_nzb_date_denial_of_service.txt"
|
||||
},
|
||||
{
|
||||
"url": "http:\/\/seclists.org\/bugtraq\/2010\/Jul\/60"
|
||||
"url": "http://seclists.org/bugtraq/2010/Jul/60",
|
||||
"refsource": "MISC",
|
||||
"name": "http://seclists.org/bugtraq/2010/Jul/60"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,16 +58,20 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "2.8",
|
||||
"vectorString": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:N\/A:L"
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.101969"
|
||||
"url": "https://vuldb.com/?id.101969",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.101969"
|
||||
},
|
||||
{
|
||||
"url": "http:\/\/www.computec.ch\/news.php?item.117"
|
||||
"url": "http://www.computec.ch/news.php?item.117",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.computec.ch/news.php?item.117"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -82,19 +82,25 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "2.8",
|
||||
"vectorString": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:N\/A:L"
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.101970"
|
||||
"url": "https://vuldb.com/?id.101969",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.101969"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.101969"
|
||||
"url": "http://www.computec.ch/news.php?item.117",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.computec.ch/news.php?item.117"
|
||||
},
|
||||
{
|
||||
"url": "http:\/\/www.computec.ch\/news.php?item.117"
|
||||
"url": "https://vuldb.com/?id.101970",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.101970"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -82,19 +82,25 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "2.8",
|
||||
"vectorString": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:N\/A:L"
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.101971"
|
||||
"url": "https://vuldb.com/?id.101969",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.101969"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.101969"
|
||||
"url": "http://www.computec.ch/news.php?item.117",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.computec.ch/news.php?item.117"
|
||||
},
|
||||
{
|
||||
"url": "http:\/\/www.computec.ch\/news.php?item.117"
|
||||
"url": "https://vuldb.com/?id.101971",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.101971"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -82,19 +82,25 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "2.8",
|
||||
"vectorString": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:N\/A:L"
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.101972"
|
||||
"url": "https://vuldb.com/?id.101969",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.101969"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.101969"
|
||||
"url": "http://www.computec.ch/news.php?item.117",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.computec.ch/news.php?item.117"
|
||||
},
|
||||
{
|
||||
"url": "http:\/\/www.computec.ch\/news.php?item.117"
|
||||
"url": "https://vuldb.com/?id.101972",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.101972"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -82,19 +82,25 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "2.8",
|
||||
"vectorString": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:N\/A:L"
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.101973"
|
||||
"url": "https://vuldb.com/?id.101969",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.101969"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.101969"
|
||||
"url": "http://www.computec.ch/news.php?item.117",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.computec.ch/news.php?item.117"
|
||||
},
|
||||
{
|
||||
"url": "http:\/\/www.computec.ch\/news.php?item.117"
|
||||
"url": "https://vuldb.com/?id.101973",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.101973"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -82,19 +82,25 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "4.3",
|
||||
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:N\/A:L"
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.101974"
|
||||
"url": "https://vuldb.com/?id.101969",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.101969"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.101969"
|
||||
"url": "http://www.computec.ch/news.php?item.117",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.computec.ch/news.php?item.117"
|
||||
},
|
||||
{
|
||||
"url": "http:\/\/www.computec.ch\/news.php?item.117"
|
||||
"url": "https://vuldb.com/?id.101974",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.101974"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,7 +4,7 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2018-25030",
|
||||
"TITLE": "Mirmay Secure Private Browser \/ File Manager Auto Lock improper authentication",
|
||||
"TITLE": "Mirmay Secure Private Browser / File Manager Auto Lock improper authentication",
|
||||
"REQUESTER": "cna@vuldb.com",
|
||||
"ASSIGNER": "cna@vuldb.com",
|
||||
"STATE": "PUBLIC"
|
||||
@ -98,19 +98,25 @@
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"baseScore": "3.3",
|
||||
"vectorString": "CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N"
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https:\/\/vuldb.com\/?id.106056"
|
||||
"url": "https://vuldb.com/?id.106056",
|
||||
"refsource": "MISC",
|
||||
"name": "https://vuldb.com/?id.106056"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/www.scip.ch\/en\/?labs.20180201"
|
||||
"url": "https://youtu.be/cd6nbos-BI0",
|
||||
"refsource": "MISC",
|
||||
"name": "https://youtu.be/cd6nbos-BI0"
|
||||
},
|
||||
{
|
||||
"url": "https:\/\/youtu.be\/cd6nbos-BI0"
|
||||
"url": "https://www.scip.ch/en/?labs.20180201",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.scip.ch/en/?labs.20180201"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
18
2022/1xxx/CVE-2022-1123.json
Normal file
18
2022/1xxx/CVE-2022-1123.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-1123",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -1,17 +1,61 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-26278",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2022-26278",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Tenda AC9 v15.03.2.21_cn was discovered to contain a stack overflow via the time parameter in the PowerSaveSet function."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/pllrry/Tenda-AC9-V15.03.2.21_cn-Command-Execution-Vulnerability/tree/main/Tenda-AC9",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/pllrry/Tenda-AC9-V15.03.2.21_cn-Command-Execution-Vulnerability/tree/main/Tenda-AC9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user