"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-03-31 20:00:32 +00:00
parent ca908d4c8c
commit ed3936af86
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
8 changed files with 459 additions and 21 deletions

View File

@ -59,6 +59,16 @@
"name": "https://github.com/hapijs/cryptiles/issues/34",
"refsource": "CONFIRM",
"url": "https://github.com/hapijs/cryptiles/issues/34"
},
{
"refsource": "MISC",
"name": "https://github.com/hapijs/cryptiles/issues/35",
"url": "https://github.com/hapijs/cryptiles/issues/35"
},
{
"refsource": "MISC",
"name": "https://github.com/hapijs/cryptiles/issues/34",
"url": "https://github.com/hapijs/cryptiles/issues/34"
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-4899",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "zstd",
"version": {
"version_data": [
{
"version_value": "zstd 1.5.4"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/facebook/zstd/issues/3200",
"url": "https://github.com/facebook/zstd/issues/3200"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun."
}
]
}

View File

@ -0,0 +1,106 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-1784",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in jeecg-boot 3.5.0 and classified as critical. This issue affects some unknown processing of the component API Documentation. The manipulation leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224699."
},
{
"lang": "deu",
"value": "Eine kritische Schwachstelle wurde in jeecg-boot 3.5.0 gefunden. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Komponente API Documentation. Mit der Manipulation mit unbekannten Daten kann eine improper authentication-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-287 Improper Authentication",
"cweId": "CWE-287"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "jeecg-boot",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "3.5.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.224699",
"refsource": "MISC",
"name": "https://vuldb.com/?id.224699"
},
{
"url": "https://vuldb.com/?ctiid.224699",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.224699"
},
{
"url": "https://note.youdao.com/ynoteshare/index.html?id=7eb8fc804ea3544d8add43749a09173e",
"refsource": "MISC",
"name": "https://note.youdao.com/ynoteshare/index.html?id=7eb8fc804ea3544d8add43749a09173e"
}
]
},
"credits": [
{
"lang": "en",
"value": "t1nk3rl94e (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 5.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseSeverity": "MEDIUM"
}
]
}
}

View File

@ -0,0 +1,106 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-1785",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in SourceCodester Earnings and Expense Tracker App 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-224700."
},
{
"lang": "deu",
"value": "Es wurde eine kritische Schwachstelle in SourceCodester Earnings and Expense Tracker App 1.0 ausgemacht. Es betrifft eine unbekannte Funktion der Datei manage_user.php. Durch die Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SourceCodester",
"product": {
"product_data": [
{
"product_name": "Earnings and Expense Tracker App",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.224700",
"refsource": "MISC",
"name": "https://vuldb.com/?id.224700"
},
{
"url": "https://vuldb.com/?ctiid.224700",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.224700"
},
{
"url": "https://github.com/web-zxl/img/blob/main/4.png",
"refsource": "MISC",
"name": "https://github.com/web-zxl/img/blob/main/4.png"
}
]
},
"credits": [
{
"lang": "en",
"value": "aallll (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseSeverity": "MEDIUM"
}
]
}
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-26858",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-26858",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "SQL injection vulnerability found in PrestaSHp faqs v.3.1.6 allows a remote attacker to escalate privileges via the faqsBudgetModuleFrontController::displayAjaxGenerateBudget component."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://addons.prestashop.com/en/faq-frequently-asked-questions/16036-frequently-asked-questions-faq-page.html",
"refsource": "MISC",
"name": "https://addons.prestashop.com/en/faq-frequently-asked-questions/16036-frequently-asked-questions-faq-page.html"
},
{
"refsource": "MISC",
"name": "https://friends-of-presta.github.io/security-advisories/modules/2023/03/28/faqs.html",
"url": "https://friends-of-presta.github.io/security-advisories/modules/2023/03/28/faqs.html"
}
]
}

View File

@ -1,17 +1,76 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27162",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-27162",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "openapi-generator up to v6.4.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/gen/clients/{language}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://openapi-generator.com",
"refsource": "MISC",
"name": "http://openapi-generator.com"
},
{
"url": "https://github.com/OpenAPITools/openapi-generator",
"refsource": "MISC",
"name": "https://github.com/OpenAPITools/openapi-generator"
},
{
"url": "https://notes.sjtu.edu.cn/s/2_yki_2Xq",
"refsource": "MISC",
"name": "https://notes.sjtu.edu.cn/s/2_yki_2Xq"
},
{
"refsource": "MISC",
"name": "https://gist.github.com/b33t1e/6121210ebd9efd4f693c73b830d8ab08",
"url": "https://gist.github.com/b33t1e/6121210ebd9efd4f693c73b830d8ab08"
}
]
}

View File

@ -1,17 +1,76 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27163",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-27163",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://notes.sjtu.edu.cn/s/MUUhEymt7",
"refsource": "MISC",
"name": "https://notes.sjtu.edu.cn/s/MUUhEymt7"
},
{
"url": "http://request-baskets.com",
"refsource": "MISC",
"name": "http://request-baskets.com"
},
{
"url": "https://github.com/darklynx/request-baskets",
"refsource": "MISC",
"name": "https://github.com/darklynx/request-baskets"
},
{
"refsource": "MISC",
"name": "https://gist.github.com/b33t1e/3079c10c88cad379fb166c389ce3b7b3",
"url": "https://gist.github.com/b33t1e/3079c10c88cad379fb166c389ce3b7b3"
}
]
}

View File

@ -66,6 +66,11 @@
"url": "https://notes.sjtu.edu.cn/s/s5oEvs-p5",
"refsource": "MISC",
"name": "https://notes.sjtu.edu.cn/s/s5oEvs-p5"
},
{
"refsource": "MISC",
"name": "https://gist.github.com/b33t1e/a1a0d81b1173d0d00de8f4e7958dd867",
"url": "https://gist.github.com/b33t1e/a1a0d81b1173d0d00de8f4e7958dd867"
}
]
}