mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
4e96e4f353
commit
e1edcd7911
@ -59,10 +59,16 @@
|
||||
"name": "https://candidats.net/"
|
||||
},
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/jcole/",
|
||||
"url": "https://fluidattacks.com/advisories/modestep/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://fluidattacks.com/advisories/jcole/"
|
||||
"name": "https://fluidattacks.com/advisories/modestep/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"generator": {
|
||||
"engine": "Vulnogram 0.1.0-dev"
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
@ -59,10 +59,16 @@
|
||||
"name": "https://candidats.net/"
|
||||
},
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/jcole/",
|
||||
"url": "https://fluidattacks.com/advisories/modestep/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://fluidattacks.com/advisories/jcole/"
|
||||
"name": "https://fluidattacks.com/advisories/modestep/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"generator": {
|
||||
"engine": "Vulnogram 0.1.0-dev"
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
@ -59,10 +59,16 @@
|
||||
"name": "https://candidats.net/"
|
||||
},
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/jcole/",
|
||||
"url": "https://fluidattacks.com/advisories/modestep/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://fluidattacks.com/advisories/jcole/"
|
||||
"name": "https://fluidattacks.com/advisories/modestep/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"generator": {
|
||||
"engine": "Vulnogram 0.1.0-dev"
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
@ -59,10 +59,16 @@
|
||||
"name": "https://candidats.net/"
|
||||
},
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/jcole/",
|
||||
"url": "https://fluidattacks.com/advisories/modestep/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://fluidattacks.com/advisories/jcole/"
|
||||
"name": "https://fluidattacks.com/advisories/modestep/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"generator": {
|
||||
"engine": "Vulnogram 0.1.0-dev"
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
@ -1,34 +1,19 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-45476",
|
||||
"ASSIGNER": "help@fluidattacks.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Tiny File Manager",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "2.4.8"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Tiny File Manager version 2.4.8 executes the code of files uploaded by users of the application, instead of just returning them for download. This is possible because the application is vulnerable to insecure file upload."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
@ -42,26 +27,48 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Tiny File Manager",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "2.4.8",
|
||||
"version_affected": "="
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/prasathmani/tinyfilemanager/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/prasathmani/tinyfilemanager/",
|
||||
"url": "https://github.com/prasathmani/tinyfilemanager/"
|
||||
"name": "https://github.com/prasathmani/tinyfilemanager/"
|
||||
},
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/mosey/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://fluidattacks.com/advisories/mosey/",
|
||||
"url": "https://fluidattacks.com/advisories/mosey/"
|
||||
"name": "https://fluidattacks.com/advisories/mosey/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Tiny File Manager version 2.4.8 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application is vulnerable to CSRF, processes uploaded files server-side (instead of just returning them for download), and allows unauthenticated users to access uploaded files."
|
||||
}
|
||||
]
|
||||
"generator": {
|
||||
"engine": "Vulnogram 0.1.0-dev"
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
18
2022/4xxx/CVE-2022-4286.json
Normal file
18
2022/4xxx/CVE-2022-4286.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-4286",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user