"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-05-23 12:01:43 +00:00
parent 2a863099c0
commit e977c801a6
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
3 changed files with 157 additions and 144 deletions

View File

@ -49,7 +49,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A vulnerability, which was classified as problematic, has been found in Zoo Management System 1.0. Affected by this issue is \/zoo\/admin\/public_html\/view_accounts?type=zookeeper of the content module. The manipulation of the argument admin_name with the input <script>alert(1)<\/script> leads to an authenticated cross site scripting. Exploit details have been disclosed to the public." "value": "A vulnerability, which was classified as problematic, has been found in Zoo Management System 1.0. Affected by this issue is /zoo/admin/public_html/view_accounts?type=zookeeper of the content module. The manipulation of the argument admin_name with the input <script>alert(1)</script> leads to an authenticated cross site scripting. Exploit details have been disclosed to the public."
} }
] ]
}, },
@ -57,16 +57,20 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "3.5", "baseScore": "3.5",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/github.com\/Xor-Gerke\/webray.com.cn\/blob\/main\/cve\/Zoo-Management-System\/Zoo-Management-System(XSS).md" "url": "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Zoo-Management-System/Zoo-Management-System(XSS).md",
"refsource": "MISC",
"name": "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Zoo-Management-System/Zoo-Management-System(XSS).md"
}, },
{ {
"url": "https:\/\/vuldb.com\/?id.200558" "url": "https://vuldb.com/?id.200558",
"refsource": "MISC",
"name": "https://vuldb.com/?id.200558"
} }
] ]
} }

View File

@ -22,7 +22,7 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "n\/a" "version_value": "n/a"
} }
] ]
} }
@ -49,7 +49,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A vulnerability, which was classified as problematic, was found in Badminton Center Management System. This affects the userlist module at \/bcms\/admin\/?page=user\/list. The manipulation of the argument username with the input <\/td><img src=\"\" onerror=\"alert(1)\"><td>1 leads to an authenticated cross site scripting. Exploit details have been disclosed to the public." "value": "A vulnerability, which was classified as problematic, was found in Badminton Center Management System. This affects the userlist module at /bcms/admin/?page=user/list. The manipulation of the argument username with the input </td><img src=\"\" onerror=\"alert(1)\"><td>1 leads to an authenticated cross site scripting. Exploit details have been disclosed to the public."
} }
] ]
}, },
@ -57,16 +57,20 @@
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "3.5", "baseScore": "3.5",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/github.com\/ch0ing\/vul\/blob\/main\/WebRay.com.cn\/Badminton%20Center%20Management%20System(XSS).md" "url": "https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Badminton%20Center%20Management%20System(XSS).md",
"refsource": "MISC",
"name": "https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Badminton%20Center%20Management%20System(XSS).md"
}, },
{ {
"url": "https:\/\/vuldb.com\/?id.200559" "url": "https://vuldb.com/?id.200559",
"refsource": "MISC",
"name": "https://vuldb.com/?id.200559"
} }
] ]
} }

View File

@ -70,6 +70,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/apache/maven-shared-utils/pull/40", "url": "https://github.com/apache/maven-shared-utils/pull/40",
"name": "https://github.com/apache/maven-shared-utils/pull/40" "name": "https://github.com/apache/maven-shared-utils/pull/40"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220523 CVE-2022-29599: Apache Maven: Commandline class shell injection vulnerabilities",
"url": "http://www.openwall.com/lists/oss-security/2022/05/23/3"
} }
] ]
}, },