"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-12-14 01:00:37 +00:00
parent a7aa22be09
commit e40c4b34a1
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
7 changed files with 121 additions and 13 deletions

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9419",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-9419",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Arcadyan Wifi routers VRV9506JAC23 allow remote attackers to inject arbitrary web script or HTML via the hostName and domain_name parameters present in the LAN configuration section of the administrative dashboard."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://gist.github.com/AsherDLL/03d0762b5a535e300f1121caebe333ce",
"url": "https://gist.github.com/AsherDLL/03d0762b5a535e300f1121caebe333ce"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9420",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-9420",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The login password of the web administrative dashboard in Arcadyan Wifi routers VRV9506JAC23 is sent in cleartext, allowing an attacker to sniff and intercept traffic to learn the administrative credentials to the router."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://gist.github.com/AsherDLL/03d0762b5a535e300f1121caebe333ce",
"url": "https://gist.github.com/AsherDLL/03d0762b5a535e300f1121caebe333ce"
}
]
}

View File

@ -123,6 +123,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2022-2a5de7cb8b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221213 [SECURITY] [DLA 3239-1] git security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html"
}
]
},

View File

@ -137,6 +137,11 @@
"refsource": "FULLDISC",
"name": "20221107 APPLE-SA-2022-11-01-1 Xcode 14.1",
"url": "http://seclists.org/fulldisclosure/2022/Nov/1"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221213 [SECURITY] [DLA 3239-1] git security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html"
}
]
},

View File

@ -129,6 +129,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2022-fb088df94c",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7B6JPKX5CGGLAHXJVQMIZNNEEB72FHD/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221213 [SECURITY] [DLA 3239-1] git security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html"
}
]
},

View File

@ -127,6 +127,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2022-fb088df94c",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7B6JPKX5CGGLAHXJVQMIZNNEEB72FHD/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20221213 [SECURITY] [DLA 3239-1] git security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html"
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the Arm Mali GPU Kernel Driver. There is a use-after-free. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Midgard r4p0 through r32p0, Bifrost r1p0 through r40p0, and Valhall r19p0 through r40P0."
"value": "An issue was discovered in the Arm Mali GPU Kernel Driver. There is a use-after-free. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Valhall r29p0 through r40P0."
}
]
},