"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-01-08 18:00:38 +00:00
parent eba54b8356
commit fe62811d5f
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
28 changed files with 931 additions and 107 deletions

View File

@ -1,17 +1,118 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-2585",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@ubuntu.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-416",
"cweId": "CWE-416"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "The Linux Kernel Organization",
"product": {
"product_data": [
{
"product_name": "linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "6.0~rc1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://ubuntu.com/security/notices/USN-5566-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5566-1"
},
{
"url": "https://ubuntu.com/security/notices/USN-5564-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5564-1"
},
{
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585",
"refsource": "MISC",
"name": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585"
},
{
"url": "https://ubuntu.com/security/notices/USN-5567-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5567-1"
},
{
"url": "https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u",
"refsource": "MISC",
"name": "https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u"
},
{
"url": "https://www.openwall.com/lists/oss-security/2022/08/09/7",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2022/08/09/7"
},
{
"url": "https://ubuntu.com/security/notices/USN-5565-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5565-1"
}
]
},
"credits": [
{
"lang": "en",
"value": "An independent security researcher working with SSD Secure Disclosure"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
]
}

View File

@ -1,17 +1,148 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-2586",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@ubuntu.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-416",
"cweId": "CWE-416"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "The Linux Kernel Organization",
"product": {
"product_data": [
{
"product_name": "linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "6.0~rc1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://ubuntu.com/security/notices/USN-5564-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5564-1"
},
{
"url": "https://ubuntu.com/security/notices/USN-5560-2",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5560-2"
},
{
"url": "https://ubuntu.com/security/notices/USN-5582-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5582-1"
},
{
"url": "https://ubuntu.com/security/notices/USN-5567-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5567-1"
},
{
"url": "https://ubuntu.com/security/notices/USN-5560-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5560-1"
},
{
"url": "https://ubuntu.com/security/notices/USN-5566-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5566-1"
},
{
"url": "https://www.openwall.com/lists/oss-security/2022/08/09/5",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2022/08/09/5"
},
{
"url": "https://ubuntu.com/security/notices/USN-5565-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5565-1"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1118/",
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-22-1118/"
},
{
"url": "https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t",
"refsource": "MISC",
"name": "https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t"
},
{
"url": "https://ubuntu.com/security/notices/USN-5562-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5562-1"
},
{
"url": "https://ubuntu.com/security/notices/USN-5557-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5557-1"
},
{
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586",
"refsource": "MISC",
"name": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586"
}
]
},
"credits": [
{
"lang": "en",
"value": "Team Orca of Sea Security (@seasecresponse) working with Trend Micro's Zero Day Initiative"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
]
}

View File

@ -1,17 +1,158 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-2588",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@ubuntu.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-416",
"cweId": "CWE-416"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "The Linux Kernel Organization",
"product": {
"product_data": [
{
"product_name": "linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "6.0~rc1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://ubuntu.com/security/notices/USN-5565-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5565-1"
},
{
"url": "https://ubuntu.com/security/notices/USN-5562-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5562-1"
},
{
"url": "https://www.openwall.com/lists/oss-security/2022/08/09/6",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2022/08/09/6"
},
{
"url": "https://ubuntu.com/security/notices/USN-5582-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5582-1"
},
{
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588",
"refsource": "MISC",
"name": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588"
},
{
"url": "https://ubuntu.com/security/notices/USN-5564-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5564-1"
},
{
"url": "https://ubuntu.com/security/notices/USN-5566-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5566-1"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1117/",
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-22-1117/"
},
{
"url": "https://ubuntu.com/security/notices/USN-5588-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5588-1"
},
{
"url": "https://ubuntu.com/security/notices/USN-5560-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5560-1"
},
{
"url": "https://github.com/Markakd/CVE-2022-2588",
"refsource": "MISC",
"name": "https://github.com/Markakd/CVE-2022-2588"
},
{
"url": "https://ubuntu.com/security/notices/USN-5567-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5567-1"
},
{
"url": "https://ubuntu.com/security/notices/USN-5560-2",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5560-2"
},
{
"url": "https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u",
"refsource": "MISC",
"name": "https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u"
},
{
"url": "https://ubuntu.com/security/notices/USN-5557-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5557-1"
}
]
},
"credits": [
{
"lang": "en",
"value": "Zhenpeng Lin working with Trend Micro's Zero Day Initiative"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
]
}

View File

@ -1,17 +1,117 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-2602",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@ubuntu.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "io_uring UAF, Unix SCM garbage collection"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-416",
"cweId": "CWE-416"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "The Linux Kernel Organization",
"product": {
"product_data": [
{
"product_name": "linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "6.1~rc1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://ubuntu.com/security/notices/USN-5692-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5692-1"
},
{
"url": "https://ubuntu.com/security/notices/USN-5752-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5752-1"
},
{
"url": "https://ubuntu.com/security/notices/USN-5693-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5693-1"
},
{
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602",
"refsource": "MISC",
"name": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602"
},
{
"url": "https://ubuntu.com/security/notices/USN-5691-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5691-1"
},
{
"url": "https://ubuntu.com/security/notices/USN-5700-1",
"refsource": "MISC",
"name": "https://ubuntu.com/security/notices/USN-5700-1"
}
]
},
"credits": [
{
"lang": "en",
"value": "David Bouman"
},
{
"lang": "en",
"value": "Billy Jheng Bing Jhong working with Trend Micro's Zero Day Initiative"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
]
}

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1783",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1783"
}
]
},

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1783",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1783"
}
]
},

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1783",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1783"
}
]
},

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1785",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1785"
}
]
},

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1785",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1785"
}
]
},

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1785",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1785"
}
]
},

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1785",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1785"
}
]
},

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786"
}
]
},

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786"
}
]
},

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786"
}
]
},

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786"
}
]
},

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786"
}
]
},

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786"
}
]
},

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1789",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1789"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1789",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1789"
}
]
},

View File

@ -58,11 +58,6 @@
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1789",
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1789"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1789",
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1789"
}
]
},

View File

@ -1,17 +1,122 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-52215",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in UkrSolution Simple Inventory Management \u2013 just scan barcode to manage products and orders. For WooCommerce.This issue affects Simple Inventory Management \u2013 just scan barcode to manage products and orders. For WooCommerce: from n/a through 1.5.1.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "UkrSolution",
"product": {
"product_data": [
{
"product_name": "Simple Inventory Management \u2013 just scan barcode to manage products and orders. For WooCommerce",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "1.5.2",
"status": "unaffected"
}
],
"lessThanOrEqual": "1.5.1",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/wordpress-barcode-scanner-with-inventory-order-manager-plugin-1-5-1-unauthenticated-sql-injection-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/wordpress-barcode-scanner-with-inventory-order-manager-plugin-1-5-1-unauthenticated-sql-injection-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to&nbsp;1.5.2 or a higher version."
}
],
"value": "Update to\u00a01.5.2 or a higher version."
}
],
"credits": [
{
"lang": "en",
"value": "Rafie Muhammad (Patchstack)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,94 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-52218",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Deserialization of Untrusted Data vulnerability in Anton Bond Woocommerce Tranzila Payment Gateway.This issue affects Woocommerce Tranzila Payment Gateway: from n/a through 1.0.8.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-502 Deserialization of Untrusted Data",
"cweId": "CWE-502"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Anton Bond",
"product": {
"product_data": [
{
"product_name": "Woocommerce Tranzila Payment Gateway",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "n/a",
"version_value": "1.0.8"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/woo-tranzila-gateway/wordpress-woocommerce-tranzila-gateway-plugin-1-0-8-unauthenticated-php-object-injection-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/woo-tranzila-gateway/wordpress-woocommerce-tranzila-gateway-plugin-1-0-8-unauthenticated-php-object-injection-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Rafie Muhammad (Patchstack)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,94 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-52219",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Deserialization of Untrusted Data vulnerability in Gecka Gecka Terms Thumbnails.This issue affects Gecka Terms Thumbnails: from n/a through 1.1.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-502 Deserialization of Untrusted Data",
"cweId": "CWE-502"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Gecka",
"product": {
"product_data": [
{
"product_name": "Gecka Terms Thumbnails",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "n/a",
"version_value": "1.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/gecka-terms-thumbnails/wordpress-gecka-terms-thumbnails-plugin-1-1-php-object-injection-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/gecka-terms-thumbnails/wordpress-gecka-terms-thumbnails-plugin-1-1-php-object-injection-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Rafie Muhammad (Patchstack)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,94 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-52225",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Deserialization of Untrusted Data vulnerability in Tagbox Tagbox \u2013 UGC Galleries, Social Media Widgets, User Reviews & Analytics.This issue affects Tagbox \u2013 UGC Galleries, Social Media Widgets, User Reviews & Analytics: from n/a through 3.1.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-502 Deserialization of Untrusted Data",
"cweId": "CWE-502"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Tagbox",
"product": {
"product_data": [
{
"product_name": "Tagbox \u2013 UGC Galleries, Social Media Widgets, User Reviews & Analytics",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "n/a",
"version_value": "3.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/taggbox-widget/wordpress-tagbox-widget-plugin-3-1-unauthenticated-php-object-injection-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/taggbox-widget/wordpress-tagbox-widget-plugin-3-1-unauthenticated-php-object-injection-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Rafie Muhammad (Patchstack)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0325",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0326",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0327",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0328",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0329",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}