mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
142 lines
4.7 KiB
JSON
142 lines
4.7 KiB
JSON
{
|
|
"id": "CVE-2022-35148",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2022-08-17T21:15:09.563",
|
|
"lastModified": "2022-08-24T19:53:16.463",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "maccms10 v2021.1000.1081 to v2022.1000.3031 was discovered to contain a SQL injection vulnerability via the table parameter at database/columns.html."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se ha detectado que maccms10 versiones v2021.1000.1081 a v2022.1000.3031, contienen una vulnerabilidad de inyecci\u00f3n SQL por medio del par\u00e1metro table en el archivo database/columns.html."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-89"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2021.1000.1081:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A7049FDA-9118-418C-9816-E2627C341D8F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.1099:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E3AD4C3-5452-4A33-B426-B0CBF2D56EAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3001:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6FF6ADDF-1480-4A46-938E-C17BD227BEAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3002:*:*:*:*:*:*",
|
|
"matchCriteriaId": "41E368B4-0B48-418B-923D-8368E3DC2372"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3004:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7CDE0C52-4110-4A3B-BDF4-09D860C0F96F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3005:*:*:*:*:*:*",
|
|
"matchCriteriaId": "24CB165C-5EF3-4555-8907-80411877364D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3025:*:*:*:*:*:*",
|
|
"matchCriteriaId": "23181A63-9B13-42CF-A557-46CC4170CA35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3026:*:*:*:*:*:*",
|
|
"matchCriteriaId": "72466714-0BC2-4225-9A1D-FCF1698F6B52"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3027:*:*:*:*:*:*",
|
|
"matchCriteriaId": "370FB13E-4AFD-4A8D-A7F3-D9DB76C15FBC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3028:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F7CACDA-7E15-4C09-A872-06DBDD5100B4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3029:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7B355B68-FF2D-4638-9818-E93D5308B6A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3030:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A8C9537-F79F-4D75-8934-C5E2B55F88F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3031:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8920192D-D202-4B0A-B035-0D3B81727CE0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/magicblack/maccms10/issues/931",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Issue Tracking",
|
|
"Patch",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |