Auto-Update: 2024-02-29T03:01:13.735060+00:00

This commit is contained in:
cad-safe-bot 2024-02-29 03:01:19 +00:00
parent a2dd6a89f7
commit 367235be40
2804 changed files with 17700 additions and 7762 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2005-10002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-29T15:15:42.073",
"lastModified": "2023-11-07T20:37:51.413",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-29T01:05:55.423",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2006-10001",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T21:15:09.693",
"lastModified": "2023-11-07T01:58:29.653",
"lastModified": "2024-02-29T01:06:38.930",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2007-10001",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T12:15:09.040",
"lastModified": "2023-11-07T02:00:16.863",
"lastModified": "2024-02-29T01:07:49.400",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2007-10002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T10:15:10.950",
"lastModified": "2023-11-07T02:00:17.043",
"lastModified": "2024-02-29T01:07:49.513",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2007-10003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-29T18:15:38.687",
"lastModified": "2023-11-07T20:39:37.933",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-29T01:07:49.613",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2008-10002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T02:15:58.877",
"lastModified": "2023-11-07T02:01:51.037",
"lastModified": "2024-02-29T01:08:54.710",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2008-10003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T02:15:58.983",
"lastModified": "2023-11-07T02:01:51.203",
"lastModified": "2024-02-29T01:08:54.813",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2008-10004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T23:15:10.123",
"lastModified": "2023-11-07T02:01:51.383",
"lastModified": "2024-02-29T01:08:54.893",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2009-10001",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T18:15:08.750",
"lastModified": "2023-11-07T02:03:47.383",
"lastModified": "2024-02-29T01:10:01.770",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2009-10002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T18:15:10.333",
"lastModified": "2023-11-07T02:03:47.563",
"lastModified": "2024-02-29T01:10:01.890",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2009-10003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-29T19:15:08.810",
"lastModified": "2023-11-07T02:03:47.733",
"lastModified": "2024-02-29T01:10:01.967",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2009-10004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T00:15:08.113",
"lastModified": "2023-11-07T02:03:48.023",
"lastModified": "2024-02-29T01:10:02.070",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2010-10002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T17:15:09.963",
"lastModified": "2023-11-07T02:05:11.980",
"lastModified": "2024-02-29T01:10:48.450",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2010-10003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T10:15:09.577",
"lastModified": "2023-11-07T02:05:12.173",
"lastModified": "2024-02-29T01:10:48.553",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in gesellix titlelink on Joomla. Affected by this vulnerability is an unknown functionality of the file plugin_content_title.php. The manipulation of the argument phrase leads to sql injection. The patch is named b4604e523853965fa981a4e79aef4b554a535db0. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217351."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en gesellix titlelink en Joomla y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo plugin_content_title.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n de la frase argumental conduce a la inyecci\u00f3n de SQL. El parche se llama b4604e523853965fa981a4e79aef4b554a535db0. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217351."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2010-10004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T08:15:10.683",
"lastModified": "2023-11-07T02:05:12.337",
"lastModified": "2024-02-29T01:10:48.633",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2010-10006",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T00:15:11.420",
"lastModified": "2023-11-07T02:05:12.610",
"lastModified": "2024-02-29T01:10:48.717",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2010-10007",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T06:15:11.023",
"lastModified": "2023-11-07T02:05:12.783",
"lastModified": "2024-02-29T01:10:48.810",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in lierdakil click-reminder. It has been rated as critical. This issue affects the function db_query of the file src/backend/include/BaseAction.php. The manipulation leads to sql injection. The identifier of the patch is 41213b660e8eb01b22c8074f06208f59a73ca8dc. It is recommended to apply a patch to fix this issue. The identifier VDB-218465 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
},
{
"lang": "es",
"value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Se encontr\u00f3 una vulnerabilidad en lierdakil click-reminder. Ha sido declarada como cr\u00edtica. Este problema afecta la funci\u00f3n db_query del archivo src/backend/include/BaseAction.php. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El identificador del parche es 41213b660e8eb01b22c8074f06208f59a73ca8dc. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-218465. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2010-10008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T08:15:10.063",
"lastModified": "2023-11-07T02:05:13.047",
"lastModified": "2024-02-29T01:10:48.893",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2010-10009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T21:15:10.160",
"lastModified": "2023-11-07T02:05:13.230",
"lastModified": "2024-02-29T01:10:48.973",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2010-10010",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-01T05:15:09.503",
"lastModified": "2024-02-14T01:17:43.863",
"lastModified": "2024-02-29T01:10:49.057",
"vulnStatus": "Modified",
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2010-10011",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-12T20:15:46.833",
"lastModified": "2024-01-22T16:41:48.287",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-29T01:10:49.153",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2011-10001",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T16:15:10.617",
"lastModified": "2023-11-07T02:06:54.740",
"lastModified": "2024-02-29T01:11:40.270",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2011-10002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-07T17:15:09.180",
"lastModified": "2023-11-07T02:06:54.953",
"lastModified": "2024-02-29T01:11:40.360",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2011-10003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-07T21:15:08.917",
"lastModified": "2023-11-07T02:06:55.127",
"lastModified": "2024-02-29T01:11:40.460",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2011-10004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-17T00:15:10.500",
"lastModified": "2023-11-07T02:06:55.280",
"lastModified": "2024-02-29T01:11:40.540",
"vulnStatus": "Modified",
"descriptions": [
{
@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -85,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2011-10005",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-16T08:15:07.933",
"lastModified": "2024-01-22T21:14:22.763",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-29T01:11:40.630",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-03T09:15:09.463",
"lastModified": "2023-11-07T02:10:08.783",
"lastModified": "2024-02-29T01:12:27.267",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-03T12:15:10.117",
"lastModified": "2023-11-07T02:10:08.997",
"lastModified": "2024-02-29T01:12:27.347",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T07:15:09.917",
"lastModified": "2023-11-07T02:10:09.273",
"lastModified": "2024-02-29T01:12:27.423",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10005",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-12T16:15:09.257",
"lastModified": "2023-11-07T02:10:09.453",
"lastModified": "2024-02-29T01:12:27.513",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10006",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T16:15:10.743",
"lastModified": "2023-11-07T02:10:09.633",
"lastModified": "2024-02-29T01:12:27.593",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10007",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-19T16:15:16.357",
"lastModified": "2023-11-07T02:10:09.817",
"lastModified": "2024-02-29T01:12:27.670",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T07:15:21.817",
"lastModified": "2023-11-07T02:10:10.020",
"lastModified": "2024-02-29T01:12:27.757",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-21T00:15:10.163",
"lastModified": "2023-11-07T02:10:10.217",
"lastModified": "2024-02-29T01:12:27.843",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10010",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-09T06:15:10.303",
"lastModified": "2023-11-07T02:10:10.400",
"lastModified": "2024-02-29T01:12:27.933",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10011",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-09T22:15:07.007",
"lastModified": "2023-11-07T02:10:10.567",
"lastModified": "2024-02-29T01:12:28.013",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10012",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T00:15:08.190",
"lastModified": "2023-11-07T02:10:10.737",
"lastModified": "2024-02-29T01:12:28.093",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10013",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-24T18:15:08.783",
"lastModified": "2023-11-07T02:10:10.903",
"lastModified": "2024-02-29T01:12:28.170",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10014",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-24T18:15:08.867",
"lastModified": "2023-11-07T02:10:11.093",
"lastModified": "2024-02-29T01:12:28.260",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T00:15:09.417",
"lastModified": "2023-11-07T02:10:11.260",
"lastModified": "2024-02-29T01:12:28.333",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-10016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-17T00:15:10.603",
"lastModified": "2023-11-07T02:10:11.430",
"lastModified": "2024-02-29T01:12:28.427",
"vulnStatus": "Modified",
"descriptions": [
{
@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -95,7 +95,7 @@
]
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2012-10017",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-26T10:15:07.483",
"lastModified": "2024-01-04T02:51:03.117",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-29T01:12:28.510",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10006",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T17:15:10.090",
"lastModified": "2023-11-07T02:14:33.513",
"lastModified": "2024-02-29T01:13:22.877",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10007",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-03T11:15:09.987",
"lastModified": "2023-11-07T02:14:33.710",
"lastModified": "2024-02-29T01:13:22.977",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2013-10008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T22:15:08.900",
"lastModified": "2023-11-07T02:14:33.880",
"lastModified": "2024-02-29T01:13:23.067",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in sheilazpy eShop. It has been classified as critical. Affected is an unknown function. The manipulation leads to sql injection. The name of the patch is e096c5849c4dc09e1074104531014a62a5413884. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217572."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en sheilazpy eShop. Ha sido clasificada como cr\u00edtica. Una funci\u00f3n desconocida es afectada por esta funci\u00f3n. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El nombre del parche es e096c5849c4dc09e1074104531014a62a5413884. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-217572."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T20:15:08.887",
"lastModified": "2023-11-07T02:14:34.053",
"lastModified": "2024-02-29T01:13:23.150",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10010",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T16:15:09.510",
"lastModified": "2023-11-07T02:14:34.220",
"lastModified": "2024-02-29T01:13:23.230",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10011",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-12T16:15:09.347",
"lastModified": "2023-11-07T02:14:34.390",
"lastModified": "2024-02-29T01:13:23.323",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2013-10012",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T11:15:10.037",
"lastModified": "2023-11-07T02:14:34.597",
"lastModified": "2024-02-29T01:13:23.410",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in antonbolling clan7ups. Affected is an unknown function of the component Login/Session. The manipulation leads to sql injection. The name of the patch is 25afad571c488291033958d845830ba0a1710764. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218388."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en antonbolling clan7ups y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del componente Login/Session es afectada por esta funci\u00f3n. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El nombre del parche es 25afad571c488291033958d845830ba0a1710764. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-218388."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10013",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T16:15:16.060",
"lastModified": "2023-11-07T02:14:34.793",
"lastModified": "2024-02-29T01:13:23.497",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10014",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-19T10:15:10.483",
"lastModified": "2023-11-07T02:14:34.970",
"lastModified": "2024-02-29T01:13:23.583",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-03T20:15:09.340",
"lastModified": "2023-11-07T02:14:35.130",
"lastModified": "2024-02-29T01:13:23.667",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-03T20:15:09.913",
"lastModified": "2023-11-07T02:14:35.320",
"lastModified": "2024-02-29T01:13:23.763",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10017",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T00:15:08.660",
"lastModified": "2023-11-07T02:14:35.487",
"lastModified": "2024-02-29T01:13:23.840",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10018",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T00:15:08.830",
"lastModified": "2023-11-07T02:14:35.657",
"lastModified": "2024-02-29T01:13:23.920",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10019",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T07:15:22.357",
"lastModified": "2023-11-07T02:14:35.820",
"lastModified": "2024-02-29T01:13:24.000",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10020",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-10T01:15:11.693",
"lastModified": "2023-11-07T02:14:35.997",
"lastModified": "2024-02-29T01:13:24.120",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10021",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-11T21:15:09.247",
"lastModified": "2023-11-07T02:14:36.180",
"lastModified": "2024-02-29T01:13:24.223",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10022",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T13:15:06.830",
"lastModified": "2023-11-07T02:14:36.390",
"lastModified": "2024-02-29T01:13:24.327",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10023",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T09:15:07.000",
"lastModified": "2023-11-07T02:14:36.587",
"lastModified": "2024-02-29T01:13:24.417",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10024",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T17:15:06.920",
"lastModified": "2023-11-07T02:14:36.760",
"lastModified": "2024-02-29T01:13:24.497",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10025",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T17:15:06.987",
"lastModified": "2023-11-07T02:14:36.940",
"lastModified": "2024-02-29T01:13:24.573",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10026",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T02:15:27.267",
"lastModified": "2023-11-07T02:14:37.107",
"lastModified": "2024-02-29T01:13:24.653",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10027",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-04T14:15:09.397",
"lastModified": "2023-11-07T02:14:37.290",
"lastModified": "2024-02-29T01:13:24.743",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10028",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-04T19:15:09.620",
"lastModified": "2023-11-07T02:14:37.477",
"lastModified": "2024-02-29T01:13:24.833",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10029",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T21:15:09.250",
"lastModified": "2023-11-07T02:14:37.657",
"lastModified": "2024-02-29T01:13:24.910",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-10030",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T22:15:09.260",
"lastModified": "2023-11-07T02:14:37.853",
"lastModified": "2024-02-29T01:13:24.997",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125027",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T16:15:08.650",
"lastModified": "2023-11-07T02:18:32.803",
"lastModified": "2024-02-29T01:14:30.970",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Yuna Scatari TBDev up to 2.1.17 and classified as problematic. Affected by this vulnerability is the function get_user_icons of the file usersearch.php. The manipulation of the argument n/r/r2/em/ip/co/ma/d/d2/ul/ul2/ls/ls2/dl/dl2 leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.1.18 is able to address this issue. The patch is named 0ba3fd4be29dd48fa4455c236a9403b3149a4fd4. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217147."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Yuna Scatari TBDev hasta 2.1.17 y clasificada como problem\u00e1tica. La funci\u00f3n get_user_icons del archivo usersearch.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento n/r/r2/em/ip/co/ma/d/d2/ul/ul2/ls/ls2/dl/dl2 conduce a cross-site scripting. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 2.1.18 puede solucionar este problema. El nombre del parche es 0ba3fd4be29dd48fa4455c236a9403b3149a4fd4. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-217147."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125028",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T20:15:08.507",
"lastModified": "2023-11-07T02:18:32.983",
"lastModified": "2024-02-29T01:14:31.073",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in valtech IDP Test Client and classified as problematic. Affected by this issue is some unknown functionality of the file python-flask/main.py. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The name of the patch is f1e7b3d431c8681ec46445557125890c14fa295f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217148."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en valtech IDP Test Client y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo python-flask/main.py es afectada por este problema. La manipulaci\u00f3n conduce a la Cross-Site Request Forgery (CSRF). El ataque puede lanzarse de forma remota. El nombre del parche es f1e7b3d431c8681ec46445557125890c14fa295f. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-217148."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125029",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T22:15:08.637",
"lastModified": "2023-11-07T02:18:33.177",
"lastModified": "2024-02-29T01:14:31.167",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -91,7 +91,7 @@
]
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125030",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T09:15:09.463",
"lastModified": "2023-11-07T02:18:33.357",
"lastModified": "2024-02-29T01:14:31.253",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -91,7 +91,7 @@
]
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125031",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T08:15:09.583",
"lastModified": "2023-11-07T02:18:33.580",
"lastModified": "2024-02-29T01:14:31.360",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125032",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T08:15:09.827",
"lastModified": "2023-11-07T02:18:33.780",
"lastModified": "2024-02-29T01:14:31.460",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125033",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T08:15:09.930",
"lastModified": "2023-11-07T02:18:33.947",
"lastModified": "2024-02-29T01:14:31.557",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -91,7 +91,7 @@
]
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125034",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T11:15:09.963",
"lastModified": "2023-11-07T02:18:34.110",
"lastModified": "2024-02-29T01:14:31.653",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125035",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T16:15:10.330",
"lastModified": "2023-11-07T02:18:34.273",
"lastModified": "2024-02-29T01:14:31.743",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125036",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T19:15:10.280",
"lastModified": "2023-11-07T02:18:34.510",
"lastModified": "2024-02-29T01:14:31.830",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -91,7 +91,7 @@
]
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125037",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T18:15:18.787",
"lastModified": "2023-11-07T02:18:34.703",
"lastModified": "2024-02-29T01:14:31.923",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125038",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T18:15:18.913",
"lastModified": "2023-11-07T02:18:34.883",
"lastModified": "2024-02-29T01:14:32.020",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125039",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T10:15:10.100",
"lastModified": "2023-11-07T02:18:35.070",
"lastModified": "2024-02-29T01:14:32.110",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in kkokko NeoXplora. Affected by this issue is some unknown functionality of the component Trainer Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is dce1aecd6ee050a29f953ffd8f02f21c7c13f1e6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217352."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en kkokko NeoXplora y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del componente Trainer Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede lanzarse de forma remota. El nombre del parche es dce1aecd6ee050a29f953ffd8f02f21c7c13f1e6. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-217352."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125040",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T14:15:08.517",
"lastModified": "2023-11-07T02:18:35.240",
"lastModified": "2024-02-29T01:14:32.197",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125041",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T15:15:10.177",
"lastModified": "2023-11-07T02:18:35.420",
"lastModified": "2024-02-29T01:14:32.313",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125044",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T20:15:18.150",
"lastModified": "2023-11-07T02:18:35.653",
"lastModified": "2024-02-29T01:14:32.413",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -91,7 +91,7 @@
]
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125045",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T22:15:08.700",
"lastModified": "2023-11-07T02:18:35.843",
"lastModified": "2024-02-29T01:14:32.507",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125046",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T10:15:09.437",
"lastModified": "2023-11-07T02:18:36.007",
"lastModified": "2024-02-29T01:14:32.607",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125047",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T12:15:08.657",
"lastModified": "2023-11-07T02:18:36.170",
"lastModified": "2024-02-29T01:14:32.693",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in tbezman school-store. This affects an unknown part. The manipulation leads to sql injection. The identifier of the patch is 2957fc97054216d3a393f1775efd01ae2b072001. It is recommended to apply a patch to fix this issue. The identifier VDB-217557 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en la tienda de la escuela de tbezman y clasificada como cr\u00edtica. Esto afecta a una parte desconocida. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El identificador del parche es 2957fc97054216d3a393f1775efd01ae2b072001. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217557."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125048",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T13:15:09.670",
"lastModified": "2023-11-07T02:18:36.327",
"lastModified": "2024-02-29T01:14:32.787",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in kassi xingwall. This issue affects some unknown processing of the file app/controllers/oauth.js. The manipulation leads to session fixiation. The patch is named e9f0d509e1408743048e29d9c099d36e0e1f6ae7. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217559."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en kassi xingwall y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo app/controllers/oauth.js. La manipulaci\u00f3n conduce a la fijaci\u00f3n de la sesi\u00f3n. El parche se llama e9f0d509e1408743048e29d9c099d36e0e1f6ae7. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217559."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 2.5
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -91,7 +95,7 @@
]
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125049",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T13:15:09.750",
"lastModified": "2023-11-07T02:18:36.510",
"lastModified": "2024-02-29T01:14:32.877",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in typcn Blogile. Affected is the function getNav of the file server.js. The manipulation of the argument query leads to sql injection. The name of the patch is cfec31043b562ffefe29fe01af6d3c5ed1bf8f7d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217560. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
},
{
"lang": "es",
"value": "** NO SOPORTADO CUANDO ASIGNADO ** Una vulnerabilidad clasificada como cr\u00edtica fue encontrada en typcn Blogile. La funci\u00f3n getNav del archivo server.js es afectada por la vulnerabilidad. La manipulaci\u00f3n del argumento query conduce a la inyecci\u00f3n de SQL. El nombre del parche es cfec31043b562ffefe29fe01af6d3c5ed1bf8f7d. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-217560. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125050",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T17:15:08.870",
"lastModified": "2023-11-07T02:18:36.670",
"lastModified": "2024-02-29T01:14:32.963",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ScottTZhang voter-js and classified as critical. Affected by this issue is some unknown functionality of the file main.js. The manipulation leads to sql injection. The patch is identified as 6317c67a56061aeeaeed3cf9ec665fd9983d8044. It is recommended to apply a patch to fix this issue. VDB-217562 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en ScottTZhang voter-js y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo main.js es afectada por este problema. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El parche se identifica como 6317c67a56061aeaeed3cf9ec665fd9983d8044. Se recomienda aplicar un parche para solucionar este problema. VDB-217562 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125051",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T17:15:08.977",
"lastModified": "2023-11-07T02:18:36.830",
"lastModified": "2024-02-29T01:14:33.050",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in himiklab yii2-jqgrid-widget up to 1.0.7. It has been declared as critical. This vulnerability affects the function addSearchOptionsRecursively of the file JqGridAction.php. The manipulation leads to sql injection. Upgrading to version 1.0.8 is able to address this issue. The name of the patch is a117e0f2df729e3ff726968794d9a5ac40e660b9. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217564."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en himiklab yii2-jqgrid-widget hasta 1.0.7. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n addSearchOptionsRecursively del archivo JqGridAction.php. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. La actualizaci\u00f3n a la versi\u00f3n 1.0.8 puede solucionar este problema. El nombre del parche es a117e0f2df729e3ff726968794d9a5ac40e660b9. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-217564."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125052",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T21:15:09.060",
"lastModified": "2023-11-07T02:18:36.990",
"lastModified": "2024-02-29T01:14:33.137",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in JervenBolleman sparql-identifiers and classified as critical. This issue affects some unknown processing of the file src/main/java/org/identifiers/db/RegistryDao.java. The manipulation leads to sql injection. The patch is named 44bb0db91c064e305b192fc73521d1dfd25bde52. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217571."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en JervenBolleman sparql-identifiers y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo src/main/java/org/identifiers/db/RegistryDao.java. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El parche se llama 44bb0db91c064e305b192fc73521d1dfd25bde52. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217571."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125053",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T23:15:09.483",
"lastModified": "2023-11-07T02:18:37.150",
"lastModified": "2024-02-29T01:14:33.217",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Piwigo-Guest-Book up to 1.3.0. It has been declared as critical. This vulnerability affects unknown code of the file include/guestbook.inc.php of the component Navigation Bar. The manipulation of the argument start leads to sql injection. Upgrading to version 1.3.1 is able to address this issue. The patch is identified as 0cdd1c388edf15089c3a7541cefe7756e560581d. It is recommended to upgrade the affected component. VDB-217582 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Piwigo-Guest-Book hasta 1.3.0. Ha sido declarada cr\u00edtica. Una vulnerabilidad desconocida afecta a un c\u00f3digo desconocido del archivo include/guestbook.inc.php del componente Navigation Bar. La manipulaci\u00f3n del argumento start conduce a la inyecci\u00f3n de SQL. La actualizaci\u00f3n a la versi\u00f3n 1.3.1 puede solucionar este problema. El parche se identifica como 0cdd1c388edf15089c3a7541cefe7756e560581d. Se recomienda actualizar el componente afectado. VDB-217582 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125054",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T09:15:21.197",
"lastModified": "2023-11-07T02:18:37.317",
"lastModified": "2024-02-29T01:14:33.300",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in koroket RedditOnRails. This vulnerability affects unknown code of the component Vote Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The patch is identified as 7f3c7407d95d532fcc342b00d68d0ea09ca71030. It is recommended to apply a patch to fix this issue. VDB-217594 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en koroket RedditOnRails y clasificada como cr\u00edtica. C\u00f3digo desconocido del componente Vote Handler es afectado por esta vulnerabilidad. La manipulaci\u00f3n conduce a controles de acceso inadecuados. El ataque se puede iniciar de forma remota. El parche se identifica como 7f3c7407d95d532fcc342b00d68d0ea09ca71030. Se recomienda aplicar un parche para solucionar este problema. VDB-217594 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125055",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T09:15:21.470",
"lastModified": "2023-11-07T02:18:37.480",
"lastModified": "2024-02-29T01:14:33.390",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in agnivade easy-scrypt. Affected is the function VerifyPassphrase of the file scrypt.go. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 477c10cf3b144ddf96526aa09f5fdea613f21812. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217596."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en agnivade easy-scrypt y clasificada como problem\u00e1tica. La funci\u00f3n VerifyPassphrase del archivo scrypt.go es afectada por la vulnerabilidad. La manipulaci\u00f3n conduce a una discrepancia temporal observable. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. La actualizaci\u00f3n a la versi\u00f3n 1.0.0 puede solucionar este problema. El nombre del parche es 477c10cf3b144ddf96526aa09f5fdea613f21812. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-217596."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125056",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T10:15:08.753",
"lastModified": "2023-11-07T02:18:37.647",
"lastModified": "2024-02-29T01:14:33.487",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Pylons horus and classified as problematic. Affected by this issue is some unknown functionality of the file horus/flows/local/services.py. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitation is known to be difficult. The patch is identified as fd56ccb62ce3cbdab0484fe4f9c25c4eda6c57ec. It is recommended to apply a patch to fix this issue. VDB-217598 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Pylons horus y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo horus/flows/local/services.py es afectada por este problema. La manipulaci\u00f3n conduce a una discrepancia temporal observable. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. El parche se identifica como fd56ccb62ce3cbdab0484fe4f9c25c4eda6c57ec. Se recomienda aplicar un parche para solucionar este problema. VDB-217598 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125057",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T10:15:09.260",
"lastModified": "2023-11-07T02:18:37.807",
"lastModified": "2024-02-29T01:14:33.570",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in mrobit robitailletheknot. It has been classified as problematic. This affects an unknown part of the file app/filters.php of the component CSRF Token Handler. The manipulation of the argument _token leads to incorrect comparison. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6b2813696ccb88d0576dfb305122ee880eb36197. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217599."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en mrobit robitailletheknot. Ha sido clasificada como problem\u00e1tica. Una parte desconocida del archivo app/filters.php del componente CSRF Token Handler afecta a una parte desconocida. La manipulaci\u00f3n del argumento _token conduce a una comparaci\u00f3n incorrecta. Es posible iniciar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. El parche se llama 6b2813696ccb88d0576dfb305122ee880eb36197. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217599."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -91,7 +95,7 @@
]
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125058",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T11:15:08.787",
"lastModified": "2023-11-07T02:18:37.983",
"lastModified": "2024-02-29T01:14:33.660",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in LearnMeSomeCodes project3 and classified as critical. This issue affects the function search_first_name of the file search.rb. The manipulation leads to sql injection. The patch is named d3efa17ae9f6b2fc25a6bbcf165cefed17c7035e. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217607. NOTE: Maintainer is aware of this issue as remarked in the source code."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en LearnMeSomeCodes project3 y clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n search_first_name del archivo search.rb. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El parche se llama d3efa17ae9f6b2fc25a6bbcf165cefed17c7035e. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217607. NOTA: El fabricante es consciente de este problema como se indica en el c\u00f3digo fuente."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125059",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.040",
"lastModified": "2023-11-07T02:18:38.150",
"lastModified": "2024-02-29T01:14:33.767",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in sternenseemann sternenblog. This issue affects the function blog_index of the file main.c. The manipulation of the argument post_path leads to file inclusion. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 0.1.0 is able to address this issue. The identifier of the patch is cf715d911d8ce17969a7926dea651e930c27e71a. It is recommended to upgrade the affected component. The identifier VDB-217613 was assigned to this vulnerability. NOTE: This case is rather theoretical and probably won't happen. Maybe only on obscure Web servers."
},
{
"lang": "es",
"value": "Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en sternenseemann sternenblog. Este problema afecta la funci\u00f3n blog_index del archivo main.c. La manipulaci\u00f3n del argumento post_path conduce a la inclusi\u00f3n del archivo. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. La actualizaci\u00f3n a la versi\u00f3n 0.1.0 puede solucionar este problema. El identificador del parche es cf715d911d8ce17969a7926dea651e930c27e71a. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217613. NOTA: Este caso es bastante te\u00f3rico y probablemente no suceder\u00e1. Quiz\u00e1s s\u00f3lo en servidores web oscuros."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-125060",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.127",
"lastModified": "2023-11-07T02:18:38.347",
"lastModified": "2024-02-29T01:14:33.870",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in holdennb CollabCal. Affected is the function handleGet of the file calenderServer.cpp. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The patch is identified as b80f6d1893607c99e5113967592417d0fe310ce6. It is recommended to apply a patch to fix this issue. VDB-217614 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Holdennb CollabCal y clasificada como cr\u00edtica. La funci\u00f3n handleGet del archivo calenderServer.cpp es afectada por la vulnerabilidad. La manipulaci\u00f3n conduce a una autenticaci\u00f3n incorrecta. Es posible lanzar el ataque de forma remota. El parche se identifica como b80f6d1893607c99e5113967592417d0fe310ce6. Se recomienda aplicar un parche para solucionar este problema. VDB-217614 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-125061",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.210",
"lastModified": "2023-11-07T02:18:38.680",
"lastModified": "2024-02-29T01:14:33.963",
"vulnStatus": "Modified",
"descriptions": [
{
@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -81,7 +81,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{

Some files were not shown because too many files have changed in this diff Show More