"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-12-05 13:00:37 +00:00
parent 4e96e4f353
commit e1edcd7911
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
6 changed files with 91 additions and 42 deletions

View File

@ -59,10 +59,16 @@
"name": "https://candidats.net/"
},
{
"url": "https://fluidattacks.com/advisories/jcole/",
"url": "https://fluidattacks.com/advisories/modestep/",
"refsource": "MISC",
"name": "https://fluidattacks.com/advisories/jcole/"
"name": "https://fluidattacks.com/advisories/modestep/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
}
}

View File

@ -59,10 +59,16 @@
"name": "https://candidats.net/"
},
{
"url": "https://fluidattacks.com/advisories/jcole/",
"url": "https://fluidattacks.com/advisories/modestep/",
"refsource": "MISC",
"name": "https://fluidattacks.com/advisories/jcole/"
"name": "https://fluidattacks.com/advisories/modestep/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
}
}

View File

@ -59,10 +59,16 @@
"name": "https://candidats.net/"
},
{
"url": "https://fluidattacks.com/advisories/jcole/",
"url": "https://fluidattacks.com/advisories/modestep/",
"refsource": "MISC",
"name": "https://fluidattacks.com/advisories/jcole/"
"name": "https://fluidattacks.com/advisories/modestep/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
}
}

View File

@ -59,10 +59,16 @@
"name": "https://candidats.net/"
},
{
"url": "https://fluidattacks.com/advisories/jcole/",
"url": "https://fluidattacks.com/advisories/modestep/",
"refsource": "MISC",
"name": "https://fluidattacks.com/advisories/jcole/"
"name": "https://fluidattacks.com/advisories/modestep/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
}
}

View File

@ -1,34 +1,19 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-45476",
"ASSIGNER": "help@fluidattacks.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Tiny File Manager",
"version": {
"version_data": [
{
"version_value": "2.4.8"
}
]
}
}
]
}
}
]
}
"description": {
"description_data": [
{
"lang": "eng",
"value": "Tiny File Manager version 2.4.8 executes the code of files uploaded by users of the application, instead of just returning them for download. This is possible because the application is vulnerable to insecure file upload."
}
]
},
"problemtype": {
"problemtype_data": [
@ -42,26 +27,48 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Tiny File Manager",
"version": {
"version_data": [
{
"version_value": "2.4.8",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/prasathmani/tinyfilemanager/",
"refsource": "MISC",
"name": "https://github.com/prasathmani/tinyfilemanager/",
"url": "https://github.com/prasathmani/tinyfilemanager/"
"name": "https://github.com/prasathmani/tinyfilemanager/"
},
{
"url": "https://fluidattacks.com/advisories/mosey/",
"refsource": "MISC",
"name": "https://fluidattacks.com/advisories/mosey/",
"url": "https://fluidattacks.com/advisories/mosey/"
"name": "https://fluidattacks.com/advisories/mosey/"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Tiny File Manager version 2.4.8 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application is vulnerable to CSRF, processes uploaded files server-side (instead of just returning them for download), and allows unauthenticated users to access uploaded files."
}
]
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-4286",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}