"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-09-28 04:00:35 +00:00
parent 515783d516
commit effa22d917
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
11 changed files with 38 additions and 23 deletions

View File

@ -91,6 +91,11 @@
"url": "https://www.oracle.com/security-alerts/cpujul2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5239",
"url": "https://www.debian.org/security/2022/dsa-5239"
}
]
}

View File

@ -38,7 +38,7 @@
"description_data": [
{
"lang": "eng",
"value": "Armoury Crate Services logging function has insufficient validation to check if the log file is a symbolic link. A physical attacker with general user privilege can modify the log file property to a symbolic link that points to arbitrary system file, causing the logging function to overwrite the system file and disrupt the system."
"value": "Armoury Crate Service\u2019s logging function has insufficient validation to check if the log file is a symbolic link. A physical attacker with general user privilege can modify the log file property to a symbolic link that points to arbitrary system file, causing the logging function to overwrite the system file and disrupt the system."
}
]
},
@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6522-4eacb-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6522-4eacb-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6522-4eacb-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6566-3805b-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6566-3805b-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6566-3805b-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6567-01fa3-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6567-01fa3-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6567-01fa3-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6568-331c1-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6568-331c1-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6568-331c1-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6569-9fcf4-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6569-9fcf4-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6569-9fcf4-1.html"
}
]
},

View File

@ -38,7 +38,7 @@
"description_data": [
{
"lang": "eng",
"value": "Smart eVisions file acquisition function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication, access restricted paths to download and delete arbitrary system files to disrupt service."
"value": "Smart eVision\u2019s file acquisition function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication, access restricted paths to download and delete arbitrary system files to disrupt service."
}
]
},
@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6570-9c632-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6570-9c632-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6570-9c632-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6571-fc930-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6571-fc930-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6571-fc930-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6572-5c2c8-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6572-5c2c8-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6572-5c2c8-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6523-d4c60-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6523-d4c60-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6523-d4c60-1.html"
}
]
},

View File

@ -76,8 +76,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.twcert.org.tw/tw/cp-132-6524-74530-1.html"
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6524-74530-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6524-74530-1.html"
}
]
},
@ -91,4 +92,4 @@
"advisory": "TVN-202209010",
"discovery": "EXTERNAL"
}
}
}