diff --git a/2017/20xxx/CVE-2017-20103.json b/2017/20xxx/CVE-2017-20103.json index 2cbb58c2073..7f416403592 100644 --- a/2017/20xxx/CVE-2017-20103.json +++ b/2017/20xxx/CVE-2017-20103.json @@ -73,7 +73,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability classified as critical has been found in Kama Click Counter Plugin up to 3.4.8. This affects an unknown part of the file wp-admin\/admin.php. The manipulation of the argument order_by\/order with the input ASC%2c(select*from(select(sleep(2)))a) leads to sql injection (Blind). It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.4.9 is able to address this issue. It is recommended to upgrade the affected component." + "value": "A vulnerability classified as critical has been found in Kama Click Counter Plugin up to 3.4.8. This affects an unknown part of the file wp-admin/admin.php. The manipulation of the argument order_by/order with the input ASC%2c(select*from(select(sleep(2)))a) leads to sql injection (Blind). It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.4.9 is able to address this issue. It is recommended to upgrade the affected component." } ] }, @@ -82,16 +82,20 @@ "cvss": { "version": "3.1", "baseScore": "6.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/67" + "url": "http://seclists.org/fulldisclosure/2017/Feb/67", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Feb/67" }, { - "url": "https:\/\/vuldb.com\/?id.97335" + "url": "https://vuldb.com/?id.97335", + "refsource": "MISC", + "name": "https://vuldb.com/?id.97335" } ] } diff --git a/2017/20xxx/CVE-2017-20122.json b/2017/20xxx/CVE-2017-20122.json new file mode 100644 index 00000000000..56668a11370 --- /dev/null +++ b/2017/20xxx/CVE-2017-20122.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2017-20122", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2017/20xxx/CVE-2017-20123.json b/2017/20xxx/CVE-2017-20123.json new file mode 100644 index 00000000000..957b50c593c --- /dev/null +++ b/2017/20xxx/CVE-2017-20123.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2017-20123", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2017/20xxx/CVE-2017-20124.json b/2017/20xxx/CVE-2017-20124.json new file mode 100644 index 00000000000..b2a1f2bbdb8 --- /dev/null +++ b/2017/20xxx/CVE-2017-20124.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2017-20124", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2017/20xxx/CVE-2017-20125.json b/2017/20xxx/CVE-2017-20125.json new file mode 100644 index 00000000000..0905a565b03 --- /dev/null +++ b/2017/20xxx/CVE-2017-20125.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2017-20125", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/31xxx/CVE-2022-31084.json b/2022/31xxx/CVE-2022-31084.json index e725a5ba25d..d680c9c439b 100644 --- a/2022/31xxx/CVE-2022-31084.json +++ b/2022/31xxx/CVE-2022-31084.json @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-r387-grjx-qgvw", - "refsource": "CONFIRM", - "url": "https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-r387-grjx-qgvw" - }, { "name": "https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4", "refsource": "MISC", "url": "https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4" + }, + { + "name": "https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-r387-grjx-qgvw", + "refsource": "CONFIRM", + "url": "https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-r387-grjx-qgvw" } ] }, diff --git a/2022/31xxx/CVE-2022-31085.json b/2022/31xxx/CVE-2022-31085.json index 2e0d3860b7d..a8a64db0f01 100644 --- a/2022/31xxx/CVE-2022-31085.json +++ b/2022/31xxx/CVE-2022-31085.json @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-6m3q-5c84-6h6j", - "refsource": "CONFIRM", - "url": "https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-6m3q-5c84-6h6j" - }, { "name": "https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4", "refsource": "MISC", "url": "https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4" + }, + { + "name": "https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-6m3q-5c84-6h6j", + "refsource": "CONFIRM", + "url": "https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-6m3q-5c84-6h6j" } ] }, diff --git a/2022/31xxx/CVE-2022-31089.json b/2022/31xxx/CVE-2022-31089.json index 29e4c5e7470..301952aac50 100644 --- a/2022/31xxx/CVE-2022-31089.json +++ b/2022/31xxx/CVE-2022-31089.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In affected versions certain types of invalid files requests are not handled properly and can crash the server. If you are running multiple Parse Server instances in a cluster, the availability impact may be low; if you are running Parse Server as single instance without redundancy, the availability impact may be high. This issue has been addressed in versions 4.10.12 and 5.2.3. Users are advised to upgrade. There are no known workarounds for this issue.\n" + "value": "Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In affected versions certain types of invalid files requests are not handled properly and can crash the server. If you are running multiple Parse Server instances in a cluster, the availability impact may be low; if you are running Parse Server as single instance without redundancy, the availability impact may be high. This issue has been addressed in versions 4.10.12 and 5.2.3. Users are advised to upgrade. There are no known workarounds for this issue." } ] }, diff --git a/2022/31xxx/CVE-2022-31090.json b/2022/31xxx/CVE-2022-31090.json index 4f6e12bf3b9..83687ce0acd 100644 --- a/2022/31xxx/CVE-2022-31090.json +++ b/2022/31xxx/CVE-2022-31090.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": " Guzzle, an extensible PHP HTTP client. `Authorization` headers on requests are sensitive information. In affected versions when using our Curl handler, it is possible to use the `CURLOPT_HTTPAUTH` option to specify an `Authorization` header. On making a request which responds with a redirect to a URI with a different origin (change in host, scheme or port), if we choose to follow it, we should remove the `CURLOPT_HTTPAUTH` option before continuing, stopping curl from appending the `Authorization` header to the new request. Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5. Note that a partial fix was implemented in Guzzle 7.4.2, where a change in host would trigger removal of the curl-added Authorization header, however this earlier fix did not cover change in scheme or change in port. If you do not require or expect redirects to be followed, one should simply disable redirects all together. Alternatively, one can specify to use the Guzzle steam handler backend, rather than curl.\n" + "value": "Guzzle, an extensible PHP HTTP client. `Authorization` headers on requests are sensitive information. In affected versions when using our Curl handler, it is possible to use the `CURLOPT_HTTPAUTH` option to specify an `Authorization` header. On making a request which responds with a redirect to a URI with a different origin (change in host, scheme or port), if we choose to follow it, we should remove the `CURLOPT_HTTPAUTH` option before continuing, stopping curl from appending the `Authorization` header to the new request. Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5. Note that a partial fix was implemented in Guzzle 7.4.2, where a change in host would trigger removal of the curl-added Authorization header, however this earlier fix did not cover change in scheme or change in port. If you do not require or expect redirects to be followed, one should simply disable redirects all together. Alternatively, one can specify to use the Guzzle steam handler backend, rather than curl." } ] }, diff --git a/2022/31xxx/CVE-2022-31091.json b/2022/31xxx/CVE-2022-31091.json index 14798845fd2..db6f6949235 100644 --- a/2022/31xxx/CVE-2022-31091.json +++ b/2022/31xxx/CVE-2022-31091.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": " Guzzle, an extensible PHP HTTP client. `Authorization` and `Cookie` headers on requests are sensitive information. In affected versions on making a request which responds with a redirect to a URI with a different port, if we choose to follow it, we should remove the `Authorization` and `Cookie` headers from the request, before containing. Previously, we would only consider a change in host or scheme. Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5. Note that a partial fix was implemented in Guzzle 7.4.2, where a change in host would trigger removal of the curl-added Authorization header, however this earlier fix did not cover change in scheme or change in port. An alternative approach would be to use your own redirect middleware, rather than ours, if you are unable to upgrade. If you do not require or expect redirects to be followed, one should simply disable redirects all together.\n" + "value": "Guzzle, an extensible PHP HTTP client. `Authorization` and `Cookie` headers on requests are sensitive information. In affected versions on making a request which responds with a redirect to a URI with a different port, if we choose to follow it, we should remove the `Authorization` and `Cookie` headers from the request, before containing. Previously, we would only consider a change in host or scheme. Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5. Note that a partial fix was implemented in Guzzle 7.4.2, where a change in host would trigger removal of the curl-added Authorization header, however this earlier fix did not cover change in scheme or change in port. An alternative approach would be to use your own redirect middleware, rather than ours, if you are unable to upgrade. If you do not require or expect redirects to be followed, one should simply disable redirects all together." } ] }, @@ -72,15 +72,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699", - "refsource": "CONFIRM", - "url": "https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699" - }, { "name": "https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82", "refsource": "MISC", "url": "https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82" + }, + { + "name": "https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699", + "refsource": "CONFIRM", + "url": "https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699" } ] }, diff --git a/2022/31xxx/CVE-2022-31092.json b/2022/31xxx/CVE-2022-31092.json index 98b2771e0c7..3310bf9ac6f 100644 --- a/2022/31xxx/CVE-2022-31092.json +++ b/2022/31xxx/CVE-2022-31092.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Pimcore is an Open Source Data & Experience Management Platform. Pimcore offers developers listing classes to make querying data easier. This listing classes also allow to order or group the results based on one or more columns which should be quoted by default. The actual issue is that quoting is not done properly in both cases, so there's the theoretical possibility to inject custom SQL if the developer is using this methods with input data and not doing proper input validation in advance and so relies on the auto-quoting being done by the listing classes. This issue has been resolved in version 10.4.4. Users are advised to upgrade or to apple the patch manually. There are no known workarounds for this issue.\n" + "value": "Pimcore is an Open Source Data & Experience Management Platform. Pimcore offers developers listing classes to make querying data easier. This listing classes also allow to order or group the results based on one or more columns which should be quoted by default. The actual issue is that quoting is not done properly in both cases, so there's the theoretical possibility to inject custom SQL if the developer is using this methods with input data and not doing proper input validation in advance and so relies on the auto-quoting being done by the listing classes. This issue has been resolved in version 10.4.4. Users are advised to upgrade or to apple the patch manually. There are no known workarounds for this issue." } ] }, diff --git a/2022/31xxx/CVE-2022-31096.json b/2022/31xxx/CVE-2022-31096.json index 294207b4d7a..c9ea446a4cc 100644 --- a/2022/31xxx/CVE-2022-31096.json +++ b/2022/31xxx/CVE-2022-31096.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "Discourse is an open source discussion platform. Under certain conditions, a logged in user can redeem an invite with an email that either doesn't match the invite's email or does not adhere to the email domain restriction of an invite link. The impact of this flaw is aggravated when the invite has been configured to add the user that accepts the invite into restricted groups. Once a user has been incorrectly added to a restricted group, the user may then be able to view content which that are restricted to the respective group. Users are advised to upgrade to the current stable releases. There are no known workarounds to this issue.\n" + "value": "Discourse is an open source discussion platform. Under certain conditions, a logged in user can redeem an invite with an email that either doesn't match the invite's email or does not adhere to the email domain restriction of an invite link. The impact of this flaw is aggravated when the invite has been configured to add the user that accepts the invite into restricted groups. Once a user has been incorrectly added to a restricted group, the user may then be able to view content which that are restricted to the respective group. Users are advised to upgrade to the current stable releases. There are no known workarounds to this issue." } ] }, diff --git a/2022/32xxx/CVE-2022-32092.json b/2022/32xxx/CVE-2022-32092.json index 63abd463298..2e66cdaa92b 100644 --- a/2022/32xxx/CVE-2022-32092.json +++ b/2022/32xxx/CVE-2022-32092.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-32092", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-32092", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "D-Link DIR-645 v1.03 was discovered to contain a command injection vulnerability via the QUERY_STRING parameter at __ajax_explorer.sgi." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.dlink.com/en/security-bulletin/", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin/" + }, + { + "url": "https://github.com/fxc233/iot-vul/tree/main/D-Link/DIR-645", + "refsource": "MISC", + "name": "https://github.com/fxc233/iot-vul/tree/main/D-Link/DIR-645" } ] } diff --git a/2022/33xxx/CVE-2022-33007.json b/2022/33xxx/CVE-2022-33007.json index 7ee2067e8d9..665f67670f1 100644 --- a/2022/33xxx/CVE-2022-33007.json +++ b/2022/33xxx/CVE-2022-33007.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-33007", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-33007", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "TRENDnet Wi-Fi routers TEW751DR v1.03 and TEW-752DRU v1.03 were discovered to contain a stack overflow via the function genacgi_main." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/fxc233/CVE/blob/main/bufferoverflow.md", + "refsource": "MISC", + "name": "https://github.com/fxc233/CVE/blob/main/bufferoverflow.md" } ] } diff --git a/2022/33xxx/CVE-2022-33879.json b/2022/33xxx/CVE-2022-33879.json index 08118af0afb..62b10fc0468 100644 --- a/2022/33xxx/CVE-2022-33879.json +++ b/2022/33xxx/CVE-2022-33879.json @@ -38,7 +38,7 @@ "credit": [ { "lang": "eng", - "value": "This incomplete fix was discovered and reported by the CodeQL team member [@atorralba (Tony Torralba)](https://github.com/atorralba) and [@jarlob (Jaroslav Lobačevski)](https://github.com/jarlob) from Github Security Lab. The new ReDos was discovered by the Apache Tika team." + "value": "This incomplete fix was discovered and reported by the CodeQL team member [@atorralba (Tony Torralba)](https://github.com/atorralba) and [@jarlob (Jaroslav Loba\u010devski)](https://github.com/jarlob) from Github Security Lab. The new ReDos was discovered by the Apache Tika team." } ], "data_format": "MITRE", @@ -75,8 +75,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://lists.apache.org/thread/wfno8mf5nlcvbs78z93q9thgrm30wwfh" + "refsource": "MISC", + "url": "https://lists.apache.org/thread/wfno8mf5nlcvbs78z93q9thgrm30wwfh", + "name": "https://lists.apache.org/thread/wfno8mf5nlcvbs78z93q9thgrm30wwfh" } ] },