Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit 508f43e

Browse files
committed
"-Synchronized-Data."
1 parent c6fb002 commit 508f43e

22 files changed

+591
-12
lines changed

2021/22xxx/CVE-2021-22930.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,11 @@
6868
"refsource": "MLIST",
6969
"name": "[debian-lts-announce] 20221005 [SECURITY] [DLA 3137-1] nodejs security update",
7070
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html"
71+
},
72+
{
73+
"refsource": "GENTOO",
74+
"name": "GLSA-202401-02",
75+
"url": "https://security.gentoo.org/glsa/202401-02"
7176
}
7277
]
7378
},

2021/22xxx/CVE-2021-22931.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,11 @@
8383
"url": "https://www.oracle.com/security-alerts/cpujul2022.html",
8484
"refsource": "MISC",
8585
"name": "https://www.oracle.com/security-alerts/cpujul2022.html"
86+
},
87+
{
88+
"refsource": "GENTOO",
89+
"name": "GLSA-202401-02",
90+
"url": "https://security.gentoo.org/glsa/202401-02"
8691
}
8792
]
8893
},

2021/22xxx/CVE-2021-22939.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,11 @@
8383
"refsource": "MLIST",
8484
"name": "[debian-lts-announce] 20221005 [SECURITY] [DLA 3137-1] nodejs security update",
8585
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html"
86+
},
87+
{
88+
"refsource": "GENTOO",
89+
"name": "GLSA-202401-02",
90+
"url": "https://security.gentoo.org/glsa/202401-02"
8691
}
8792
]
8893
},

2021/22xxx/CVE-2021-22940.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,11 @@
8383
"refsource": "MLIST",
8484
"name": "[debian-lts-announce] 20221005 [SECURITY] [DLA 3137-1] nodejs security update",
8585
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html"
86+
},
87+
{
88+
"refsource": "GENTOO",
89+
"name": "GLSA-202401-02",
90+
"url": "https://security.gentoo.org/glsa/202401-02"
8691
}
8792
]
8893
},

2021/3xxx/CVE-2021-3672.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,11 @@
6363
"url": "https://www.oracle.com/security-alerts/cpujul2022.html",
6464
"refsource": "MISC",
6565
"name": "https://www.oracle.com/security-alerts/cpujul2022.html"
66+
},
67+
{
68+
"refsource": "GENTOO",
69+
"name": "GLSA-202401-02",
70+
"url": "https://security.gentoo.org/glsa/202401-02"
6671
}
6772
]
6873
},

2022/46xxx/CVE-2022-46839.json

Lines changed: 109 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,122 @@
11
{
2+
"data_version": "4.0",
23
"data_type": "CVE",
34
"data_format": "MITRE",
4-
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2022-46839",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
99
},
1010
"description": {
1111
"description_data": [
1212
{
1313
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
14+
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in JS Help Desk JS Help Desk \u2013 Best Help Desk & Support Plugin.This issue affects JS Help Desk \u2013 Best Help Desk & Support Plugin: from n/a through 2.7.1.\n\n"
15+
}
16+
]
17+
},
18+
"problemtype": {
19+
"problemtype_data": [
20+
{
21+
"description": [
22+
{
23+
"lang": "eng",
24+
"value": "CWE-434 Unrestricted Upload of File with Dangerous Type",
25+
"cweId": "CWE-434"
26+
}
27+
]
28+
}
29+
]
30+
},
31+
"affects": {
32+
"vendor": {
33+
"vendor_data": [
34+
{
35+
"vendor_name": "JS Help Desk",
36+
"product": {
37+
"product_data": [
38+
{
39+
"product_name": "JS Help Desk \u2013 Best Help Desk & Support Plugin",
40+
"version": {
41+
"version_data": [
42+
{
43+
"version_value": "not down converted",
44+
"x_cve_json_5_version_data": {
45+
"versions": [
46+
{
47+
"changes": [
48+
{
49+
"at": "2.7.2",
50+
"status": "unaffected"
51+
}
52+
],
53+
"lessThanOrEqual": "2.7.1",
54+
"status": "affected",
55+
"version": "n/a",
56+
"versionType": "custom"
57+
}
58+
],
59+
"defaultStatus": "unaffected"
60+
}
61+
}
62+
]
63+
}
64+
}
65+
]
66+
}
67+
}
68+
]
69+
}
70+
},
71+
"references": {
72+
"reference_data": [
73+
{
74+
"url": "https://patchstack.com/database/vulnerability/js-support-ticket/wordpress-js-help-desk-plugin-2-7-1-arbitrary-file-upload-vulnerability?_s_id=cve",
75+
"refsource": "MISC",
76+
"name": "https://patchstack.com/database/vulnerability/js-support-ticket/wordpress-js-help-desk-plugin-2-7-1-arbitrary-file-upload-vulnerability?_s_id=cve"
77+
}
78+
]
79+
},
80+
"generator": {
81+
"engine": "Vulnogram 0.1.0-dev"
82+
},
83+
"source": {
84+
"discovery": "EXTERNAL"
85+
},
86+
"solution": [
87+
{
88+
"lang": "en",
89+
"supportingMedia": [
90+
{
91+
"base64": false,
92+
"type": "text/html",
93+
"value": "Update to 2.7.2 or a higher version."
94+
}
95+
],
96+
"value": "Update to\u00a02.7.2 or a higher version."
97+
}
98+
],
99+
"credits": [
100+
{
101+
"lang": "en",
102+
"value": "FearZzZz (Patchstack Alliance)"
103+
}
104+
],
105+
"impact": {
106+
"cvss": [
107+
{
108+
"attackComplexity": "LOW",
109+
"attackVector": "NETWORK",
110+
"availabilityImpact": "HIGH",
111+
"baseScore": 10,
112+
"baseSeverity": "CRITICAL",
113+
"confidentialityImpact": "HIGH",
114+
"integrityImpact": "HIGH",
115+
"privilegesRequired": "NONE",
116+
"scope": "CHANGED",
117+
"userInteraction": "NONE",
118+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
119+
"version": "3.1"
15120
}
16121
]
17122
}

2022/4xxx/CVE-2022-4904.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,11 @@
5858
"refsource": "FEDORA",
5959
"name": "FEDORA-2023-30e81e5293",
6060
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/33LDNS6RPOPP36Z4MPWXALUQZXJCWJS2/"
61+
},
62+
{
63+
"refsource": "GENTOO",
64+
"name": "GLSA-202401-02",
65+
"url": "https://security.gentoo.org/glsa/202401-02"
6166
}
6267
]
6368
},

2023/51xxx/CVE-2023-51678.json

Lines changed: 109 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,122 @@
11
{
2+
"data_version": "4.0",
23
"data_type": "CVE",
34
"data_format": "MITRE",
4-
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2023-51678",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
99
},
1010
"description": {
1111
"description_data": [
1212
{
1313
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
14+
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Doofinder Doofinder WP & WooCommerce Search.This issue affects Doofinder WP & WooCommerce Search: from n/a through 2.0.33.\n\n"
15+
}
16+
]
17+
},
18+
"problemtype": {
19+
"problemtype_data": [
20+
{
21+
"description": [
22+
{
23+
"lang": "eng",
24+
"value": "CWE-352 Cross-Site Request Forgery (CSRF)",
25+
"cweId": "CWE-352"
26+
}
27+
]
28+
}
29+
]
30+
},
31+
"affects": {
32+
"vendor": {
33+
"vendor_data": [
34+
{
35+
"vendor_name": "Doofinder",
36+
"product": {
37+
"product_data": [
38+
{
39+
"product_name": "Doofinder WP & WooCommerce Search",
40+
"version": {
41+
"version_data": [
42+
{
43+
"version_value": "not down converted",
44+
"x_cve_json_5_version_data": {
45+
"versions": [
46+
{
47+
"changes": [
48+
{
49+
"at": "2.1.1",
50+
"status": "unaffected"
51+
}
52+
],
53+
"lessThanOrEqual": "2.0.33",
54+
"status": "affected",
55+
"version": "n/a",
56+
"versionType": "custom"
57+
}
58+
],
59+
"defaultStatus": "unaffected"
60+
}
61+
}
62+
]
63+
}
64+
}
65+
]
66+
}
67+
}
68+
]
69+
}
70+
},
71+
"references": {
72+
"reference_data": [
73+
{
74+
"url": "https://patchstack.com/database/vulnerability/doofinder-for-woocommerce/wordpress-doofinder-wp-woocommerce-search-plugin-2-0-33-broken-access-control-vulnerability?_s_id=cve",
75+
"refsource": "MISC",
76+
"name": "https://patchstack.com/database/vulnerability/doofinder-for-woocommerce/wordpress-doofinder-wp-woocommerce-search-plugin-2-0-33-broken-access-control-vulnerability?_s_id=cve"
77+
}
78+
]
79+
},
80+
"generator": {
81+
"engine": "Vulnogram 0.1.0-dev"
82+
},
83+
"source": {
84+
"discovery": "EXTERNAL"
85+
},
86+
"solution": [
87+
{
88+
"lang": "en",
89+
"supportingMedia": [
90+
{
91+
"base64": false,
92+
"type": "text/html",
93+
"value": "Update to 2.1.1 or a higher version."
94+
}
95+
],
96+
"value": "Update to\u00a02.1.1 or a higher version."
97+
}
98+
],
99+
"credits": [
100+
{
101+
"lang": "en",
102+
"value": "Abdi Pranata (Patchstack Alliance)"
103+
}
104+
],
105+
"impact": {
106+
"cvss": [
107+
{
108+
"attackComplexity": "LOW",
109+
"attackVector": "NETWORK",
110+
"availabilityImpact": "NONE",
111+
"baseScore": 4.3,
112+
"baseSeverity": "MEDIUM",
113+
"confidentialityImpact": "NONE",
114+
"integrityImpact": "LOW",
115+
"privilegesRequired": "NONE",
116+
"scope": "UNCHANGED",
117+
"userInteraction": "REQUIRED",
118+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
119+
"version": "3.1"
15120
}
16121
]
17122
}

0 commit comments

Comments
 (0)