"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-09-21 12:00:39 +00:00
parent 938160de8b
commit f3c145913a
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
9 changed files with 55 additions and 86 deletions

View File

@ -113,6 +113,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2022-72213986b8",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220921 big ints in python: CVE-2020-10735",
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/1"
}
]
},

View File

@ -103,6 +103,11 @@
"name": "https://kb.isc.org/docs/cve-2022-2795",
"refsource": "CONFIRM",
"url": "https://kb.isc.org/docs/cve-2022-2795"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)",
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
}
]
},

View File

@ -86,6 +86,11 @@
"name": "https://kb.isc.org/docs/cve-2022-2881",
"refsource": "CONFIRM",
"url": "https://kb.isc.org/docs/cve-2022-2881"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)",
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
}
]
},

View File

@ -86,6 +86,11 @@
"name": "https://kb.isc.org/docs/cve-2022-2906",
"refsource": "CONFIRM",
"url": "https://kb.isc.org/docs/cve-2022-2906"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)",
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
}
]
},

View File

@ -81,6 +81,11 @@
"refsource": "MLIST",
"name": "[oss-security] 20220902 Re: CVE-2022-38170: Apache Airflow: Overly permissive umask for deamons",
"url": "http://www.openwall.com/lists/oss-security/2022/09/02/12"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220920 Re: CVE-2022-38170: Apache Airflow: Overly permissive umask for deamons",
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/2"
}
]
},

View File

@ -90,6 +90,11 @@
"name": "https://kb.isc.org/docs/cve-2022-38177",
"refsource": "CONFIRM",
"url": "https://kb.isc.org/docs/cve-2022-38177"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)",
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
}
]
},

View File

@ -106,6 +106,11 @@
"name": "https://kb.isc.org/docs/cve-2022-38178",
"refsource": "CONFIRM",
"url": "https://kb.isc.org/docs/cve-2022-38178"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)",
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
}
]
},

View File

@ -99,6 +99,11 @@
"name": "https://kb.isc.org/docs/cve-2022-3080",
"refsource": "CONFIRM",
"url": "https://kb.isc.org/docs/cve-2022-3080"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)",
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
}
]
},

View File

@ -1,89 +1,18 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-3255",
"STATE": "PUBLIC",
"TITLE": "Cross-site Scripting (XSS) - Reflected in pimcore/pimcore"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "pimcore/pimcore",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "10.5.7"
}
]
}
}
]
},
"vendor_name": "pimcore"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can:\n\nPerform any action within the application that the user can perform.\nView any information that the user is able to view.\nModify any information that the user is able to modify.\nInitiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3255",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/0ea45cf9-b256-454c-9031-2435294c0902",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/0ea45cf9-b256-454c-9031-2435294c0902"
},
{
"name": "https://github.com/pimcore/pimcore/commit/1e916e7d668c9e47b217e20cc0ea4812f466201b",
"refsource": "MISC",
"url": "https://github.com/pimcore/pimcore/commit/1e916e7d668c9e47b217e20cc0ea4812f466201b"
}
]
},
"source": {
"advisory": "0ea45cf9-b256-454c-9031-2435294c0902",
"discovery": "EXTERNAL"
}
}
}