"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-11-14 07:00:31 +00:00
parent b44951627c
commit e5091aabed
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
3 changed files with 276 additions and 4 deletions

View File

@ -1,17 +1,130 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-31630",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@php.net",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In PHP versions prior to 7.4.33, 8.0.25 and 8.2.12, when using imageloadfont() function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with imagechar() function, the read outside allocated buffer will be used. This can lead to crashes or disclosure of confidential information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-131 Incorrect Calculation of Buffer Size",
"cweId": "CWE-131"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-190 Integer Overflow or Wraparound",
"cweId": "CWE-190"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PHP Group",
"product": {
"product_data": [
{
"product_name": "PHP",
"version": {
"version_data": [
{
"version_value": "7.4.x",
"version_affected": "="
},
{
"version_value": "8.0.x",
"version_affected": "="
},
{
"version_value": "8.1.x",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://bugs.php.net/bug.php?id=81739",
"refsource": "MISC",
"name": "https://bugs.php.net/bug.php?id=81739"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"defect": [
"https://bugs.php.net/bug.php?id=81739"
],
"discovery": "INTERNAL"
},
"configuration": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "gd extension"
}
],
"value": "gd extension"
}
],
"credits": [
{
"lang": "en",
"value": "cmb@php.net"
},
{
"lang": "en",
"value": "cmb@php.net"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
}
]
}

View File

@ -0,0 +1,82 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-45198",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Pillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplification)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/python-pillow/Pillow/commit/11918eac0628ec8ac0812670d9838361ead2d6a4",
"refsource": "MISC",
"name": "https://github.com/python-pillow/Pillow/commit/11918eac0628ec8ac0812670d9838361ead2d6a4"
},
{
"url": "https://github.com/python-pillow/Pillow/pull/6402",
"refsource": "MISC",
"name": "https://github.com/python-pillow/Pillow/pull/6402"
},
{
"url": "https://bugs.gentoo.org/855683",
"refsource": "MISC",
"name": "https://bugs.gentoo.org/855683"
},
{
"url": "https://github.com/python-pillow/Pillow/releases/tag/9.2.0",
"refsource": "MISC",
"name": "https://github.com/python-pillow/Pillow/releases/tag/9.2.0"
},
{
"url": "https://cwe.mitre.org/data/definitions/409.html",
"refsource": "MISC",
"name": "https://cwe.mitre.org/data/definitions/409.html"
}
]
}
}

View File

@ -0,0 +1,77 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-45199",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/python-pillow/Pillow/commit/2444cddab2f83f28687c7c20871574acbb6dbcf3",
"refsource": "MISC",
"name": "https://github.com/python-pillow/Pillow/commit/2444cddab2f83f28687c7c20871574acbb6dbcf3"
},
{
"url": "https://github.com/python-pillow/Pillow/pull/6700",
"refsource": "MISC",
"name": "https://github.com/python-pillow/Pillow/pull/6700"
},
{
"url": "https://bugs.gentoo.org/878769",
"refsource": "MISC",
"name": "https://bugs.gentoo.org/878769"
},
{
"url": "https://github.com/python-pillow/Pillow/releases/tag/9.3.0",
"refsource": "MISC",
"name": "https://github.com/python-pillow/Pillow/releases/tag/9.3.0"
}
]
}
}