"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-08-23 02:00:44 +00:00
parent 5d6bb6f05d
commit d4dc049ab5
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
2 changed files with 63 additions and 9 deletions

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-35992",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-35992",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Fiserv Prologue through 2020-12-16 does not properly protect the database password. If an attacker were to gain access to the configuration file (specifically, the LogPassword attribute within appconfig.ini), they would be able to decrypt the password stored within the configuration file. This would yield cleartext credentials for the database (to gain access to financial records of customers stored within the database), and in some cases would allow remote login to the database."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.fiserv.com",
"refsource": "MISC",
"name": "https://www.fiserv.com"
},
{
"refsource": "MISC",
"name": "https://github.com/micahvandeusen/PrologueDecrypt",
"url": "https://github.com/micahvandeusen/PrologueDecrypt"
}
]
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-35733",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "http://www.unimo.co.jp/table_notice/index.php?act=1&resid=1643590226-637355"
"url": "http://www.unimo.co.jp/table_notice/index.php?act=1&resid=1643590226-637355",
"refsource": "MISC",
"name": "http://www.unimo.co.jp/table_notice/index.php?act=1&resid=1643590226-637355"
},
{
"url": "https://jvn.jp/en/vu/JVNVU90821877/index.html"
"url": "https://jvn.jp/en/vu/JVNVU90821877/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU90821877/index.html"
}
]
},