Skip to content

Commit

Permalink
Update CVE and NVD data
Browse files Browse the repository at this point in the history
  • Loading branch information
GSD-automation committed Apr 16, 2024
1 parent 2e8eee7 commit abded61
Show file tree
Hide file tree
Showing 609 changed files with 44,216 additions and 1,099 deletions.
71 changes: 69 additions & 2 deletions 2020/22xxx/GSD-2020-22539.json
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,7 @@
"aliases": [
"CVE-2020-22539"
],
"details": "An arbitrary file upload vulnerability in the Add Category function of Codoforum v4.9 allows attackers to execute arbitrary code via uploading a crafted file.",
"id": "GSD-2020-22539",
"modified": "2023-12-13T01:21:59.545055Z",
"schema_version": "1.4.0"
Expand All @@ -24,7 +25,30 @@
"CVE_data_meta": {
"ASSIGNER": "[email protected]",
"ID": "CVE-2020-22539",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
Expand All @@ -33,9 +57,52 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An arbitrary file upload vulnerability in the Add Category function of Codoforum v4.9 allows attackers to execute arbitrary code via uploading a crafted file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gist.github.com/s4fv4n/320f536a684650c6948433de8d53713c",
"refsource": "MISC",
"url": "https://gist.github.com/s4fv4n/320f536a684650c6948433de8d53713c"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the Add Category function of Codoforum v4.9 allows attackers to execute arbitrary code via uploading a crafted file."
}
],
"id": "CVE-2020-22539",
"lastModified": "2024-04-15T22:15:07.620",
"metrics": {},
"published": "2024-04-15T22:15:07.620",
"references": [
{
"source": "[email protected]",
"url": "https://gist.github.com/s4fv4n/320f536a684650c6948433de8d53713c"
}
],
"sourceIdentifier": "[email protected]",
"vulnStatus": "Received"
}
}
}
Expand Down
71 changes: 69 additions & 2 deletions 2020/22xxx/GSD-2020-22540.json
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,7 @@
"aliases": [
"CVE-2020-22540"
],
"details": "Stored Cross-Site Scripting (XSS) vulnerability in Codoforum v4.9, allows attackers to execute arbitrary code and obtain sensitive information via crafted payload to Category name component.",
"id": "GSD-2020-22540",
"modified": "2023-12-13T01:21:59.240702Z",
"schema_version": "1.4.0"
Expand All @@ -24,7 +25,30 @@
"CVE_data_meta": {
"ASSIGNER": "[email protected]",
"ID": "CVE-2020-22540",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
Expand All @@ -33,9 +57,52 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Stored Cross-Site Scripting (XSS) vulnerability in Codoforum v4.9, allows attackers to execute arbitrary code and obtain sensitive information via crafted payload to Category name component."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gist.github.com/s4fv4n/0d7a5093886cf41d9c478166e4aeec64",
"refsource": "MISC",
"url": "https://gist.github.com/s4fv4n/0d7a5093886cf41d9c478166e4aeec64"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "Stored Cross-Site Scripting (XSS) vulnerability in Codoforum v4.9, allows attackers to execute arbitrary code and obtain sensitive information via crafted payload to Category name component."
}
],
"id": "CVE-2020-22540",
"lastModified": "2024-04-15T23:15:06.730",
"metrics": {},
"published": "2024-04-15T23:15:06.730",
"references": [
{
"source": "[email protected]",
"url": "https://gist.github.com/s4fv4n/0d7a5093886cf41d9c478166e4aeec64"
}
],
"sourceIdentifier": "[email protected]",
"vulnStatus": "Received"
}
}
}
Expand Down
105 changes: 6 additions & 99 deletions 2021/47xxx/GSD-2021-47213.json
Original file line number Diff line number Diff line change
Expand Up @@ -21,62 +21,7 @@
"CVE_data_meta": {
"ASSIGNER": "[email protected]",
"ID": "CVE-2021-47213",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "d1c263a031e8",
"version_value": "10c22d9519f3"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"status": "affected",
"version": "5.11"
},
{
"lessThan": "5.11",
"status": "unaffected",
"version": "0",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.5",
"versionType": "custom"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "5.16",
"versionType": "original_commit_for_fix"
}
]
}
}
]
}
}
]
},
"vendor_name": "Linux"
}
]
}
"STATE": "REJECT"
},
"data_format": "MITRE",
"data_type": "CVE",
Expand All @@ -85,36 +30,7 @@
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Fix exposure in nfsd4_decode_bitmap()\n\n[email protected] reports:\n> nfsd4_decode_bitmap4() will write beyond bmval[bmlen-1] if the RPC\n> directs it to do so. This can cause nfsd4_decode_state_protect4_a()\n> to write client-supplied data beyond the end of\n> nfsd4_exchange_id.spo_must_allow[] when called by\n> nfsd4_decode_exchange_id().\n\nRewrite the loops so nfsd4_decode_bitmap() cannot iterate beyond\n@bmlen.\n\nReported by: [email protected]"
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/stable/c/10c22d9519f3f5939de61a1500aa3a926b778d3a",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/10c22d9519f3f5939de61a1500aa3a926b778d3a"
},
{
"name": "https://git.kernel.org/stable/c/c0019b7db1d7ac62c711cda6b357a659d46428fe",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/c0019b7db1d7ac62c711cda6b357a659d46428fe"
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}
Expand All @@ -124,25 +40,16 @@
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Fix exposure in nfsd4_decode_bitmap()\n\n[email protected] reports:\n> nfsd4_decode_bitmap4() will write beyond bmval[bmlen-1] if the RPC\n> directs it to do so. This can cause nfsd4_decode_state_protect4_a()\n> to write client-supplied data beyond the end of\n> nfsd4_exchange_id.spo_must_allow[] when called by\n> nfsd4_decode_exchange_id().\n\nRewrite the loops so nfsd4_decode_bitmap() cannot iterate beyond\n@bmlen.\n\nReported by: [email protected]"
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"id": "CVE-2021-47213",
"lastModified": "2024-04-10T19:49:51.183",
"lastModified": "2024-04-15T09:15:07.570",
"metrics": {},
"published": "2024-04-10T19:15:48.640",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/10c22d9519f3f5939de61a1500aa3a926b778d3a"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/c0019b7db1d7ac62c711cda6b357a659d46428fe"
}
],
"references": [],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
"vulnStatus": "Rejected"
}
}
}
Expand Down
5 changes: 5 additions & 0 deletions 2022/23xxx/GSD-2022-23087.json
Original file line number Diff line number Diff line change
Expand Up @@ -104,6 +104,11 @@
"name": "https://security.freebsd.org/advisories/FreeBSD-SA-22:05.bhyve.asc",
"refsource": "MISC",
"url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:05.bhyve.asc"
},
{
"name": "https://security.netapp.com/advisory/ntap-20240415-0005/",
"refsource": "MISC",
"url": "https://security.netapp.com/advisory/ntap-20240415-0005/"
}
]
},
Expand Down
5 changes: 5 additions & 0 deletions 2022/23xxx/GSD-2022-23089.json
Original file line number Diff line number Diff line change
Expand Up @@ -100,6 +100,11 @@
"name": "https://security.freebsd.org/advisories/FreeBSD-SA-22:09.elf.asc",
"refsource": "MISC",
"url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:09.elf.asc"
},
{
"name": "https://security.netapp.com/advisory/ntap-20240415-0006/",
"refsource": "MISC",
"url": "https://security.netapp.com/advisory/ntap-20240415-0006/"
}
]
},
Expand Down
5 changes: 5 additions & 0 deletions 2022/23xxx/GSD-2022-23090.json
Original file line number Diff line number Diff line change
Expand Up @@ -100,6 +100,11 @@
"name": "https://security.freebsd.org/advisories/FreeBSD-SA-22:10.aio.asc",
"refsource": "MISC",
"url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:10.aio.asc"
},
{
"name": "https://security.netapp.com/advisory/ntap-20240415-0007/",
"refsource": "MISC",
"url": "https://security.netapp.com/advisory/ntap-20240415-0007/"
}
]
},
Expand Down
5 changes: 5 additions & 0 deletions 2022/23xxx/GSD-2022-23091.json
Original file line number Diff line number Diff line change
Expand Up @@ -100,6 +100,11 @@
"name": "https://security.freebsd.org/advisories/FreeBSD-SA-22:11.vm.asc",
"refsource": "MISC",
"url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:11.vm.asc"
},
{
"name": "https://security.netapp.com/advisory/ntap-20240415-0008/",
"refsource": "MISC",
"url": "https://security.netapp.com/advisory/ntap-20240415-0008/"
}
]
},
Expand Down
5 changes: 5 additions & 0 deletions 2022/23xxx/GSD-2022-23092.json
Original file line number Diff line number Diff line change
Expand Up @@ -95,6 +95,11 @@
"name": "https://security.freebsd.org/advisories/FreeBSD-SA-22:12.lib9p.asc",
"refsource": "MISC",
"url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:12.lib9p.asc"
},
{
"name": "https://security.netapp.com/advisory/ntap-20240415-0009/",
"refsource": "MISC",
"url": "https://security.netapp.com/advisory/ntap-20240415-0009/"
}
]
},
Expand Down
Loading

0 comments on commit abded61

Please sign in to comment.