Added |
CVSS V2 |
|
NIST (AV:N/AC:M/Au:S/C:N/I:P/A:N)
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:a:vendure:vendure:0.1.0:alpha10:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha11:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha12:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha13:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha14:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha15:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha16:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha18:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha2:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha3:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha4:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha5:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha6:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha7:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha8:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:0.1.0:alpha9:*:*:*:*:*:*
*cpe:2.3:a:vendure:vendure:*:*:*:*:*:*:*:* versions from (including) 0.1.2 up to (including) 1.5.1
|
Changed |
Reference Type |
https://github.com/vendure-ecommerce/vendure/commit/69a44869112c0a5b836e2ddd3969ea9b533f51f0 No Types Assigned
|
https://github.com/vendure-ecommerce/vendure/commit/69a44869112c0a5b836e2ddd3969ea9b533f51f0 Patch, Third Party Advisory
|
Changed |
Reference Type |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23065 No Types Assigned
|
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23065 Exploit, Third Party Advisory
|
Added |
CVSS V2 Metadata |
|
Victim must voluntarily interact with attack mechanism
|