mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
515783d516
commit
effa22d917
@ -91,6 +91,11 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujul2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5239",
|
||||
"url": "https://www.debian.org/security/2022/dsa-5239"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -38,7 +38,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Armoury Crate Service’s logging function has insufficient validation to check if the log file is a symbolic link. A physical attacker with general user privilege can modify the log file property to a symbolic link that points to arbitrary system file, causing the logging function to overwrite the system file and disrupt the system."
|
||||
"value": "Armoury Crate Service\u2019s logging function has insufficient validation to check if the log file is a symbolic link. A physical attacker with general user privilege can modify the log file property to a symbolic link that points to arbitrary system file, causing the logging function to overwrite the system file and disrupt the system."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -76,8 +76,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6522-4eacb-1.html"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6522-4eacb-1.html",
|
||||
"name": "https://www.twcert.org.tw/tw/cp-132-6522-4eacb-1.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -76,8 +76,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6566-3805b-1.html"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6566-3805b-1.html",
|
||||
"name": "https://www.twcert.org.tw/tw/cp-132-6566-3805b-1.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -76,8 +76,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6567-01fa3-1.html"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6567-01fa3-1.html",
|
||||
"name": "https://www.twcert.org.tw/tw/cp-132-6567-01fa3-1.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -76,8 +76,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6568-331c1-1.html"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6568-331c1-1.html",
|
||||
"name": "https://www.twcert.org.tw/tw/cp-132-6568-331c1-1.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -76,8 +76,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6569-9fcf4-1.html"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6569-9fcf4-1.html",
|
||||
"name": "https://www.twcert.org.tw/tw/cp-132-6569-9fcf4-1.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -38,7 +38,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Smart eVision’s file acquisition function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication, access restricted paths to download and delete arbitrary system files to disrupt service."
|
||||
"value": "Smart eVision\u2019s file acquisition function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication, access restricted paths to download and delete arbitrary system files to disrupt service."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -76,8 +76,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6570-9c632-1.html"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6570-9c632-1.html",
|
||||
"name": "https://www.twcert.org.tw/tw/cp-132-6570-9c632-1.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -76,8 +76,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6571-fc930-1.html"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6571-fc930-1.html",
|
||||
"name": "https://www.twcert.org.tw/tw/cp-132-6571-fc930-1.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -76,8 +76,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6572-5c2c8-1.html"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6572-5c2c8-1.html",
|
||||
"name": "https://www.twcert.org.tw/tw/cp-132-6572-5c2c8-1.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -76,8 +76,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6523-d4c60-1.html"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6523-d4c60-1.html",
|
||||
"name": "https://www.twcert.org.tw/tw/cp-132-6523-d4c60-1.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -76,8 +76,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6524-74530-1.html"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-6524-74530-1.html",
|
||||
"name": "https://www.twcert.org.tw/tw/cp-132-6524-74530-1.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -91,4 +92,4 @@
|
||||
"advisory": "TVN-202209010",
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user