From cb33d09692e40a4898f58d07caaeeaf6a083cd4b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 10 Feb 2023 12:00:44 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/7xxx/CVE-2018-7935.json | 68 +++++++++++++++++++--- 2023/0xxx/CVE-2023-0772.json | 18 ++++++ 2023/0xxx/CVE-2023-0773.json | 18 ++++++ 2023/0xxx/CVE-2023-0774.json | 106 +++++++++++++++++++++++++++++++++++ 4 files changed, 202 insertions(+), 8 deletions(-) create mode 100644 2023/0xxx/CVE-2023-0772.json create mode 100644 2023/0xxx/CVE-2023-0773.json create mode 100644 2023/0xxx/CVE-2023-0774.json diff --git a/2018/7xxx/CVE-2018-7935.json b/2018/7xxx/CVE-2018-7935.json index 643ba850b3f..c24d3b36b70 100644 --- a/2018/7xxx/CVE-2018-7935.json +++ b/2018/7xxx/CVE-2018-7935.json @@ -1,18 +1,70 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-7935", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2018-7935", + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There is a vulnerability in 21.328.01.00.00 version of the E5573Cs-322. Remote attackers could exploit this vulnerability to make the network where the E5573Cs-322 is running temporarily unavailable." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Huawei", + "product": { + "product_data": [ + { + "product_name": " E5573Cs-322", + "version": { + "version_data": [ + { + "version_value": "21.328.01.00.00", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.huawei.com/en/psirt/security-notices/huawei-sn-20230210-01-dos-en", + "refsource": "MISC", + "name": "https://www.huawei.com/en/psirt/security-notices/huawei-sn-20230210-01-dos-en" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2023/0xxx/CVE-2023-0772.json b/2023/0xxx/CVE-2023-0772.json new file mode 100644 index 00000000000..16fef9532f0 --- /dev/null +++ b/2023/0xxx/CVE-2023-0772.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-0772", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/0xxx/CVE-2023-0773.json b/2023/0xxx/CVE-2023-0773.json new file mode 100644 index 00000000000..b00b058cb87 --- /dev/null +++ b/2023/0xxx/CVE-2023-0773.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-0773", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/0xxx/CVE-2023-0774.json b/2023/0xxx/CVE-2023-0774.json new file mode 100644 index 00000000000..ba163370779 --- /dev/null +++ b/2023/0xxx/CVE-2023-0774.json @@ -0,0 +1,106 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2023-0774", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability has been found in SourceCodester Medical Certificate Generator App 1.0 and classified as critical. This vulnerability affects unknown code of the file action.php. The manipulation of the argument lastname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-220558 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "In SourceCodester Medical Certificate Generator App 1.0 wurde eine kritische Schwachstelle gefunden. Dabei geht es um eine nicht genauer bekannte Funktion der Datei action.php. Durch Manipulieren des Arguments lastname mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Medical Certificate Generator App", + "version": { + "version_data": [ + { + "version_value": "1.0", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.220558", + "refsource": "MISC", + "name": "https://vuldb.com/?id.220558" + }, + { + "url": "https://vuldb.com/?ctiid.220558", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.220558" + }, + { + "url": "https://www.youtube.com/watch?v=s3oK5jebx_I", + "refsource": "MISC", + "name": "https://www.youtube.com/watch?v=s3oK5jebx_I" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Gab3 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseSeverity": "HIGH" + } + ] + } +} \ No newline at end of file