-
Notifications
You must be signed in to change notification settings - Fork 58
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
GSD-automation
committed
Apr 16, 2024
1 parent
2e8eee7
commit abded61
Showing
609 changed files
with
44,216 additions
and
1,099 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -14,6 +14,7 @@ | |
"aliases": [ | ||
"CVE-2020-22539" | ||
], | ||
"details": "An arbitrary file upload vulnerability in the Add Category function of Codoforum v4.9 allows attackers to execute arbitrary code via uploading a crafted file.", | ||
"id": "GSD-2020-22539", | ||
"modified": "2023-12-13T01:21:59.545055Z", | ||
"schema_version": "1.4.0" | ||
|
@@ -24,7 +25,30 @@ | |
"CVE_data_meta": { | ||
"ASSIGNER": "[email protected]", | ||
"ID": "CVE-2020-22539", | ||
"STATE": "RESERVED" | ||
"STATE": "PUBLIC" | ||
}, | ||
"affects": { | ||
"vendor": { | ||
"vendor_data": [ | ||
{ | ||
"product": { | ||
"product_data": [ | ||
{ | ||
"product_name": "n/a", | ||
"version": { | ||
"version_data": [ | ||
{ | ||
"version_value": "n/a" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"vendor_name": "n/a" | ||
} | ||
] | ||
} | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
|
@@ -33,9 +57,52 @@ | |
"description_data": [ | ||
{ | ||
"lang": "eng", | ||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." | ||
"value": "An arbitrary file upload vulnerability in the Add Category function of Codoforum v4.9 allows attackers to execute arbitrary code via uploading a crafted file." | ||
} | ||
] | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "eng", | ||
"value": "n/a" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"name": "https://gist.github.com/s4fv4n/320f536a684650c6948433de8d53713c", | ||
"refsource": "MISC", | ||
"url": "https://gist.github.com/s4fv4n/320f536a684650c6948433de8d53713c" | ||
} | ||
] | ||
} | ||
}, | ||
"nvd.nist.gov": { | ||
"cve": { | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "An arbitrary file upload vulnerability in the Add Category function of Codoforum v4.9 allows attackers to execute arbitrary code via uploading a crafted file." | ||
} | ||
], | ||
"id": "CVE-2020-22539", | ||
"lastModified": "2024-04-15T22:15:07.620", | ||
"metrics": {}, | ||
"published": "2024-04-15T22:15:07.620", | ||
"references": [ | ||
{ | ||
"source": "[email protected]", | ||
"url": "https://gist.github.com/s4fv4n/320f536a684650c6948433de8d53713c" | ||
} | ||
], | ||
"sourceIdentifier": "[email protected]", | ||
"vulnStatus": "Received" | ||
} | ||
} | ||
} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -14,6 +14,7 @@ | |
"aliases": [ | ||
"CVE-2020-22540" | ||
], | ||
"details": "Stored Cross-Site Scripting (XSS) vulnerability in Codoforum v4.9, allows attackers to execute arbitrary code and obtain sensitive information via crafted payload to Category name component.", | ||
"id": "GSD-2020-22540", | ||
"modified": "2023-12-13T01:21:59.240702Z", | ||
"schema_version": "1.4.0" | ||
|
@@ -24,7 +25,30 @@ | |
"CVE_data_meta": { | ||
"ASSIGNER": "[email protected]", | ||
"ID": "CVE-2020-22540", | ||
"STATE": "RESERVED" | ||
"STATE": "PUBLIC" | ||
}, | ||
"affects": { | ||
"vendor": { | ||
"vendor_data": [ | ||
{ | ||
"product": { | ||
"product_data": [ | ||
{ | ||
"product_name": "n/a", | ||
"version": { | ||
"version_data": [ | ||
{ | ||
"version_value": "n/a" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"vendor_name": "n/a" | ||
} | ||
] | ||
} | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
|
@@ -33,9 +57,52 @@ | |
"description_data": [ | ||
{ | ||
"lang": "eng", | ||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." | ||
"value": "Stored Cross-Site Scripting (XSS) vulnerability in Codoforum v4.9, allows attackers to execute arbitrary code and obtain sensitive information via crafted payload to Category name component." | ||
} | ||
] | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "eng", | ||
"value": "n/a" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"name": "https://gist.github.com/s4fv4n/0d7a5093886cf41d9c478166e4aeec64", | ||
"refsource": "MISC", | ||
"url": "https://gist.github.com/s4fv4n/0d7a5093886cf41d9c478166e4aeec64" | ||
} | ||
] | ||
} | ||
}, | ||
"nvd.nist.gov": { | ||
"cve": { | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "Stored Cross-Site Scripting (XSS) vulnerability in Codoforum v4.9, allows attackers to execute arbitrary code and obtain sensitive information via crafted payload to Category name component." | ||
} | ||
], | ||
"id": "CVE-2020-22540", | ||
"lastModified": "2024-04-15T23:15:06.730", | ||
"metrics": {}, | ||
"published": "2024-04-15T23:15:06.730", | ||
"references": [ | ||
{ | ||
"source": "[email protected]", | ||
"url": "https://gist.github.com/s4fv4n/0d7a5093886cf41d9c478166e4aeec64" | ||
} | ||
], | ||
"sourceIdentifier": "[email protected]", | ||
"vulnStatus": "Received" | ||
} | ||
} | ||
} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -21,62 +21,7 @@ | |
"CVE_data_meta": { | ||
"ASSIGNER": "[email protected]", | ||
"ID": "CVE-2021-47213", | ||
"STATE": "PUBLIC" | ||
}, | ||
"affects": { | ||
"vendor": { | ||
"vendor_data": [ | ||
{ | ||
"product": { | ||
"product_data": [ | ||
{ | ||
"product_name": "Linux", | ||
"version": { | ||
"version_data": [ | ||
{ | ||
"version_affected": "<", | ||
"version_name": "d1c263a031e8", | ||
"version_value": "10c22d9519f3" | ||
}, | ||
{ | ||
"version_value": "not down converted", | ||
"x_cve_json_5_version_data": { | ||
"defaultStatus": "affected", | ||
"versions": [ | ||
{ | ||
"status": "affected", | ||
"version": "5.11" | ||
}, | ||
{ | ||
"lessThan": "5.11", | ||
"status": "unaffected", | ||
"version": "0", | ||
"versionType": "custom" | ||
}, | ||
{ | ||
"lessThanOrEqual": "5.15.*", | ||
"status": "unaffected", | ||
"version": "5.15.5", | ||
"versionType": "custom" | ||
}, | ||
{ | ||
"lessThanOrEqual": "*", | ||
"status": "unaffected", | ||
"version": "5.16", | ||
"versionType": "original_commit_for_fix" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"vendor_name": "Linux" | ||
} | ||
] | ||
} | ||
"STATE": "REJECT" | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
|
@@ -85,36 +30,7 @@ | |
"description_data": [ | ||
{ | ||
"lang": "eng", | ||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Fix exposure in nfsd4_decode_bitmap()\n\n[email protected] reports:\n> nfsd4_decode_bitmap4() will write beyond bmval[bmlen-1] if the RPC\n> directs it to do so. This can cause nfsd4_decode_state_protect4_a()\n> to write client-supplied data beyond the end of\n> nfsd4_exchange_id.spo_must_allow[] when called by\n> nfsd4_decode_exchange_id().\n\nRewrite the loops so nfsd4_decode_bitmap() cannot iterate beyond\n@bmlen.\n\nReported by: [email protected]" | ||
} | ||
] | ||
}, | ||
"generator": { | ||
"engine": "bippy-d175d3acf727" | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "eng", | ||
"value": "n/a" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"name": "https://git.kernel.org/stable/c/10c22d9519f3f5939de61a1500aa3a926b778d3a", | ||
"refsource": "MISC", | ||
"url": "https://git.kernel.org/stable/c/10c22d9519f3f5939de61a1500aa3a926b778d3a" | ||
}, | ||
{ | ||
"name": "https://git.kernel.org/stable/c/c0019b7db1d7ac62c711cda6b357a659d46428fe", | ||
"refsource": "MISC", | ||
"url": "https://git.kernel.org/stable/c/c0019b7db1d7ac62c711cda6b357a659d46428fe" | ||
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." | ||
} | ||
] | ||
} | ||
|
@@ -124,25 +40,16 @@ | |
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Fix exposure in nfsd4_decode_bitmap()\n\n[email protected] reports:\n> nfsd4_decode_bitmap4() will write beyond bmval[bmlen-1] if the RPC\n> directs it to do so. This can cause nfsd4_decode_state_protect4_a()\n> to write client-supplied data beyond the end of\n> nfsd4_exchange_id.spo_must_allow[] when called by\n> nfsd4_decode_exchange_id().\n\nRewrite the loops so nfsd4_decode_bitmap() cannot iterate beyond\n@bmlen.\n\nReported by: [email protected]" | ||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." | ||
} | ||
], | ||
"id": "CVE-2021-47213", | ||
"lastModified": "2024-04-10T19:49:51.183", | ||
"lastModified": "2024-04-15T09:15:07.570", | ||
"metrics": {}, | ||
"published": "2024-04-10T19:15:48.640", | ||
"references": [ | ||
{ | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"url": "https://git.kernel.org/stable/c/10c22d9519f3f5939de61a1500aa3a926b778d3a" | ||
}, | ||
{ | ||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"url": "https://git.kernel.org/stable/c/c0019b7db1d7ac62c711cda6b357a659d46428fe" | ||
} | ||
], | ||
"references": [], | ||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", | ||
"vulnStatus": "Awaiting Analysis" | ||
"vulnStatus": "Rejected" | ||
} | ||
} | ||
} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.