mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
938160de8b
commit
f3c145913a
@ -113,6 +113,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2022-72213986b8",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220921 big ints in python: CVE-2020-10735",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/1"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -103,6 +103,11 @@
|
||||
"name": "https://kb.isc.org/docs/cve-2022-2795",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.isc.org/docs/cve-2022-2795"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -86,6 +86,11 @@
|
||||
"name": "https://kb.isc.org/docs/cve-2022-2881",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.isc.org/docs/cve-2022-2881"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -86,6 +86,11 @@
|
||||
"name": "https://kb.isc.org/docs/cve-2022-2906",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.isc.org/docs/cve-2022-2906"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220902 Re: CVE-2022-38170: Apache Airflow: Overly permissive umask for deamons",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/09/02/12"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220920 Re: CVE-2022-38170: Apache Airflow: Overly permissive umask for deamons",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/2"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -90,6 +90,11 @@
|
||||
"name": "https://kb.isc.org/docs/cve-2022-38177",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.isc.org/docs/cve-2022-38177"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -106,6 +106,11 @@
|
||||
"name": "https://kb.isc.org/docs/cve-2022-38178",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.isc.org/docs/cve-2022-38178"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -99,6 +99,11 @@
|
||||
"name": "https://kb.isc.org/docs/cve-2022-3080",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.isc.org/docs/cve-2022-3080"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,89 +1,18 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@huntr.dev",
|
||||
"ID": "CVE-2022-3255",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Cross-site Scripting (XSS) - Reflected in pimcore/pimcore"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "pimcore/pimcore",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "10.5.7"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "pimcore"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can:\n\nPerform any action within the application that the user can perform.\nView any information that the user is able to view.\nModify any information that the user is able to modify.\nInitiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user."
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"attackComplexity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "REQUIRED",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
|
||||
}
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3255",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://huntr.dev/bounties/0ea45cf9-b256-454c-9031-2435294c0902",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://huntr.dev/bounties/0ea45cf9-b256-454c-9031-2435294c0902"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/pimcore/pimcore/commit/1e916e7d668c9e47b217e20cc0ea4812f466201b",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/pimcore/pimcore/commit/1e916e7d668c9e47b217e20cc0ea4812f466201b"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"advisory": "0ea45cf9-b256-454c-9031-2435294c0902",
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user