"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-05-25 09:01:36 +00:00
parent a07c1c5c5f
commit c9f72e78f8
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
2 changed files with 85 additions and 85 deletions

View File

@ -1,89 +1,89 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-1883",
"STATE": "PUBLIC",
"TITLE": " SQL Injection in camptocamp/terraboard"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "camptocamp/terraboard",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "2.2.0"
}
]
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-1883",
"STATE": "PUBLIC",
"TITLE": " SQL Injection in camptocamp/terraboard"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "camptocamp/terraboard",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "2.2.0"
}
]
}
}
]
},
"vendor_name": "camptocamp"
}
}
]
},
"vendor_name": "camptocamp"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": " SQL Injection in GitHub repository camptocamp/terraboard prior to 2.2.0."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command"
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL Injection in GitHub repository camptocamp/terraboard prior to 2.2.0."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/a25d15bd-cd23-487e-85cd-587960f1b9e7",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/a25d15bd-cd23-487e-85cd-587960f1b9e7"
},
{
"name": "https://github.com/camptocamp/terraboard/commit/2a5dbaac015dc0714b41a59995e24f5767f89ddc",
"refsource": "MISC",
"url": "https://github.com/camptocamp/terraboard/commit/2a5dbaac015dc0714b41a59995e24f5767f89ddc"
}
]
},
"source": {
"advisory": "a25d15bd-cd23-487e-85cd-587960f1b9e7",
"discovery": "EXTERNAL"
}
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/a25d15bd-cd23-487e-85cd-587960f1b9e7",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/a25d15bd-cd23-487e-85cd-587960f1b9e7"
},
{
"name": "https://github.com/camptocamp/terraboard/commit/2a5dbaac015dc0714b41a59995e24f5767f89ddc",
"refsource": "MISC",
"url": "https://github.com/camptocamp/terraboard/commit/2a5dbaac015dc0714b41a59995e24f5767f89ddc"
}
]
},
"source": {
"advisory": "a25d15bd-cd23-487e-85cd-587960f1b9e7",
"discovery": "EXTERNAL"
}
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.de",
"ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2022-05-25T00:00:00.000Z",
"ID": "CVE-2022-21951",
"STATE": "PUBLIC",
@ -50,7 +50,7 @@
"description_data": [
{
"lang": "eng",
"value": "A Missing Encryption of Sensitive Data vulnerability in SUSE Rancher, Rancher allows attackers on the network to read and change network data due to missing encryption of data transmitted via the network when a cluster is created from an RKE template with the CNI value overridden\nThis issue affects:\nSUSE Rancher\nRancher versions prior to 2.5.14;\nRancher versions prior to 2.6.5."
"value": "A Missing Encryption of Sensitive Data vulnerability in SUSE Rancher, Rancher allows attackers on the network to read and change network data due to missing encryption of data transmitted via the network when a cluster is created from an RKE template with the CNI value overridden This issue affects: SUSE Rancher Rancher versions prior to 2.5.14; Rancher versions prior to 2.6.5."
}
]
},