From 01e5e01e7c049d2dbd489d327c0c026b0697710a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 24 Feb 2022 15:02:06 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/27xxx/CVE-2020-27339.json | 5 + 2020/5xxx/CVE-2020-5953.json | 5 + 2021/33xxx/CVE-2021-33625.json | 5 + 2021/33xxx/CVE-2021-33626.json | 5 + 2021/33xxx/CVE-2021-33627.json | 5 + 2021/3xxx/CVE-2021-3673.json | 10 ++ 2021/41xxx/CVE-2021-41837.json | 5 + 2021/41xxx/CVE-2021-41838.json | 5 + 2021/41xxx/CVE-2021-41840.json | 5 + 2021/42xxx/CVE-2021-42060.json | 5 + 2021/42xxx/CVE-2021-42113.json | 5 + 2021/42xxx/CVE-2021-42554.json | 5 + 2021/43xxx/CVE-2021-43522.json | 5 + 2021/43xxx/CVE-2021-43615.json | 5 + 2021/44xxx/CVE-2021-44565.json | 66 ++++++++++-- 2021/44xxx/CVE-2021-44566.json | 66 ++++++++++-- 2021/45xxx/CVE-2021-45444.json | 5 + 2021/45xxx/CVE-2021-45969.json | 5 + 2021/45xxx/CVE-2021-45970.json | 5 + 2021/45xxx/CVE-2021-45971.json | 5 + 2022/0xxx/CVE-2022-0173.json | 176 +++++++++++++++++--------------- 2022/0xxx/CVE-2022-0419.json | 178 +++++++++++++++++---------------- 2022/0xxx/CVE-2022-0629.json | 5 + 2022/0xxx/CVE-2022-0676.json | 2 +- 2022/0xxx/CVE-2022-0714.json | 168 +++++++++++++++---------------- 2022/0xxx/CVE-2022-0717.json | 101 +++---------------- 2022/0xxx/CVE-2022-0718.json | 18 ++++ 2022/0xxx/CVE-2022-0719.json | 101 +++---------------- 2022/0xxx/CVE-2022-0720.json | 18 ++++ 2022/0xxx/CVE-2022-0721.json | 101 +++---------------- 2022/21xxx/CVE-2022-21124.json | 18 ++++ 2022/21xxx/CVE-2022-21219.json | 18 ++++ 2022/23xxx/CVE-2022-23652.json | 2 +- 2022/23xxx/CVE-2022-23654.json | 2 +- 2022/24xxx/CVE-2022-24030.json | 5 + 2022/24xxx/CVE-2022-24031.json | 5 + 2022/24xxx/CVE-2022-24069.json | 5 + 2022/25xxx/CVE-2022-25230.json | 18 ++++ 2022/25xxx/CVE-2022-25234.json | 18 ++++ 2022/25xxx/CVE-2022-25325.json | 18 ++++ 2022/25xxx/CVE-2022-25633.json | 18 ++++ 2022/25xxx/CVE-2022-25634.json | 18 ++++ 2022/25xxx/CVE-2022-25635.json | 18 ++++ 2022/25xxx/CVE-2022-25636.json | 72 +++++++++++++ 2022/25xxx/CVE-2022-25637.json | 18 ++++ 2022/25xxx/CVE-2022-25638.json | 18 ++++ 2022/25xxx/CVE-2022-25639.json | 18 ++++ 2022/25xxx/CVE-2022-25640.json | 18 ++++ 2022/25xxx/CVE-2022-25641.json | 18 ++++ 2022/25xxx/CVE-2022-25642.json | 18 ++++ 2022/25xxx/CVE-2022-25643.json | 18 ++++ 2022/25xxx/CVE-2022-25650.json | 18 ++++ 2022/25xxx/CVE-2022-25768.json | 18 ++++ 2022/25xxx/CVE-2022-25769.json | 18 ++++ 2022/25xxx/CVE-2022-25770.json | 18 ++++ 2022/25xxx/CVE-2022-25771.json | 18 ++++ 2022/25xxx/CVE-2022-25772.json | 18 ++++ 2022/25xxx/CVE-2022-25773.json | 18 ++++ 2022/25xxx/CVE-2022-25774.json | 18 ++++ 2022/25xxx/CVE-2022-25775.json | 18 ++++ 2022/25xxx/CVE-2022-25776.json | 18 ++++ 2022/25xxx/CVE-2022-25777.json | 18 ++++ 2022/25xxx/CVE-2022-25778.json | 18 ++++ 2022/25xxx/CVE-2022-25779.json | 18 ++++ 2022/25xxx/CVE-2022-25780.json | 18 ++++ 2022/25xxx/CVE-2022-25781.json | 18 ++++ 2022/25xxx/CVE-2022-25782.json | 18 ++++ 2022/25xxx/CVE-2022-25783.json | 18 ++++ 2022/25xxx/CVE-2022-25784.json | 18 ++++ 2022/25xxx/CVE-2022-25785.json | 18 ++++ 2022/25xxx/CVE-2022-25786.json | 18 ++++ 2022/25xxx/CVE-2022-25787.json | 18 ++++ 72 files changed, 1310 insertions(+), 524 deletions(-) create mode 100644 2022/0xxx/CVE-2022-0718.json create mode 100644 2022/0xxx/CVE-2022-0720.json create mode 100644 2022/21xxx/CVE-2022-21124.json create mode 100644 2022/21xxx/CVE-2022-21219.json create mode 100644 2022/25xxx/CVE-2022-25230.json create mode 100644 2022/25xxx/CVE-2022-25234.json create mode 100644 2022/25xxx/CVE-2022-25325.json create mode 100644 2022/25xxx/CVE-2022-25633.json create mode 100644 2022/25xxx/CVE-2022-25634.json create mode 100644 2022/25xxx/CVE-2022-25635.json create mode 100644 2022/25xxx/CVE-2022-25636.json create mode 100644 2022/25xxx/CVE-2022-25637.json create mode 100644 2022/25xxx/CVE-2022-25638.json create mode 100644 2022/25xxx/CVE-2022-25639.json create mode 100644 2022/25xxx/CVE-2022-25640.json create mode 100644 2022/25xxx/CVE-2022-25641.json create mode 100644 2022/25xxx/CVE-2022-25642.json create mode 100644 2022/25xxx/CVE-2022-25643.json create mode 100644 2022/25xxx/CVE-2022-25650.json create mode 100644 2022/25xxx/CVE-2022-25768.json create mode 100644 2022/25xxx/CVE-2022-25769.json create mode 100644 2022/25xxx/CVE-2022-25770.json create mode 100644 2022/25xxx/CVE-2022-25771.json create mode 100644 2022/25xxx/CVE-2022-25772.json create mode 100644 2022/25xxx/CVE-2022-25773.json create mode 100644 2022/25xxx/CVE-2022-25774.json create mode 100644 2022/25xxx/CVE-2022-25775.json create mode 100644 2022/25xxx/CVE-2022-25776.json create mode 100644 2022/25xxx/CVE-2022-25777.json create mode 100644 2022/25xxx/CVE-2022-25778.json create mode 100644 2022/25xxx/CVE-2022-25779.json create mode 100644 2022/25xxx/CVE-2022-25780.json create mode 100644 2022/25xxx/CVE-2022-25781.json create mode 100644 2022/25xxx/CVE-2022-25782.json create mode 100644 2022/25xxx/CVE-2022-25783.json create mode 100644 2022/25xxx/CVE-2022-25784.json create mode 100644 2022/25xxx/CVE-2022-25785.json create mode 100644 2022/25xxx/CVE-2022-25786.json create mode 100644 2022/25xxx/CVE-2022-25787.json diff --git a/2020/27xxx/CVE-2020-27339.json b/2020/27xxx/CVE-2020-27339.json index 3c42304389e..ca33abc8d14 100644 --- a/2020/27xxx/CVE-2020-27339.json +++ b/2020/27xxx/CVE-2020-27339.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220216-0005/", "url": "https://security.netapp.com/advisory/ntap-20220216-0005/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2020/5xxx/CVE-2020-5953.json b/2020/5xxx/CVE-2020-5953.json index c0b1a280fc6..0297211ee45 100644 --- a/2020/5xxx/CVE-2020-5953.json +++ b/2020/5xxx/CVE-2020-5953.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.insyde.com/security-pledge", "url": "https://www.insyde.com/security-pledge" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2021/33xxx/CVE-2021-33625.json b/2021/33xxx/CVE-2021-33625.json index 948642bccf7..1f29a0c7158 100644 --- a/2021/33xxx/CVE-2021-33625.json +++ b/2021/33xxx/CVE-2021-33625.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.insyde.com/security-pledge/SA-2022014", "url": "https://www.insyde.com/security-pledge/SA-2022014" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2021/33xxx/CVE-2021-33626.json b/2021/33xxx/CVE-2021-33626.json index ded53735b4f..810b7b105e8 100644 --- a/2021/33xxx/CVE-2021-33626.json +++ b/2021/33xxx/CVE-2021-33626.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220216-0006/", "url": "https://security.netapp.com/advisory/ntap-20220216-0006/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] }, diff --git a/2021/33xxx/CVE-2021-33627.json b/2021/33xxx/CVE-2021-33627.json index 79443234c51..b770e786dbc 100644 --- a/2021/33xxx/CVE-2021-33627.json +++ b/2021/33xxx/CVE-2021-33627.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.insyde.com/security-pledge/SA-2022022", "url": "https://www.insyde.com/security-pledge/SA-2022022" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2021/3xxx/CVE-2021-3673.json b/2021/3xxx/CVE-2021-3673.json index 984ed4ef7f8..094d7167351 100644 --- a/2021/3xxx/CVE-2021-3673.json +++ b/2021/3xxx/CVE-2021-3673.json @@ -63,6 +63,16 @@ "refsource": "FEDORA", "name": "FEDORA-2021-d206891379", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGOU2EFE7YK2YDRNFV6QFUWW2SL2GGQA/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-ba3248e596", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-3fc85cd09c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/" } ] }, diff --git a/2021/41xxx/CVE-2021-41837.json b/2021/41xxx/CVE-2021-41837.json index 30fb861d935..003daf4e8bc 100644 --- a/2021/41xxx/CVE-2021-41837.json +++ b/2021/41xxx/CVE-2021-41837.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.insyde.com/security-pledge/SA-2022024", "url": "https://www.insyde.com/security-pledge/SA-2022024" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2021/41xxx/CVE-2021-41838.json b/2021/41xxx/CVE-2021-41838.json index de3c278d04f..78a31290ce1 100644 --- a/2021/41xxx/CVE-2021-41838.json +++ b/2021/41xxx/CVE-2021-41838.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.insyde.com/security-pledge/SA-2022023", "url": "https://www.insyde.com/security-pledge/SA-2022023" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2021/41xxx/CVE-2021-41840.json b/2021/41xxx/CVE-2021-41840.json index 2a27d8f19c1..e40e2ac45e4 100644 --- a/2021/41xxx/CVE-2021-41840.json +++ b/2021/41xxx/CVE-2021-41840.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220217-0014/", "url": "https://security.netapp.com/advisory/ntap-20220217-0014/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2021/42xxx/CVE-2021-42060.json b/2021/42xxx/CVE-2021-42060.json index 21c6f4d345d..ae8b989fdd5 100644 --- a/2021/42xxx/CVE-2021-42060.json +++ b/2021/42xxx/CVE-2021-42060.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220217-0015/", "url": "https://security.netapp.com/advisory/ntap-20220217-0015/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2021/42xxx/CVE-2021-42113.json b/2021/42xxx/CVE-2021-42113.json index b68b9422c1c..4f88d71c7e0 100644 --- a/2021/42xxx/CVE-2021-42113.json +++ b/2021/42xxx/CVE-2021-42113.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220216-0012/", "url": "https://security.netapp.com/advisory/ntap-20220216-0012/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2021/42xxx/CVE-2021-42554.json b/2021/42xxx/CVE-2021-42554.json index 327ae3be40e..cedc2a71dc9 100644 --- a/2021/42xxx/CVE-2021-42554.json +++ b/2021/42xxx/CVE-2021-42554.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220216-0007/", "url": "https://security.netapp.com/advisory/ntap-20220216-0007/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2021/43xxx/CVE-2021-43522.json b/2021/43xxx/CVE-2021-43522.json index 1ba69209b3f..783a922e510 100644 --- a/2021/43xxx/CVE-2021-43522.json +++ b/2021/43xxx/CVE-2021-43522.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220216-0003/", "url": "https://security.netapp.com/advisory/ntap-20220216-0003/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2021/43xxx/CVE-2021-43615.json b/2021/43xxx/CVE-2021-43615.json index 4226076e3d3..8dac5d3d748 100644 --- a/2021/43xxx/CVE-2021-43615.json +++ b/2021/43xxx/CVE-2021-43615.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220216-0010/", "url": "https://security.netapp.com/advisory/ntap-20220216-0010/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2021/44xxx/CVE-2021-44565.json b/2021/44xxx/CVE-2021-44565.json index 70f01e951b8..60b0ca57c7c 100644 --- a/2021/44xxx/CVE-2021-44565.json +++ b/2021/44xxx/CVE-2021-44565.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-44565", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-44565", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Cross Site Scripting (XSS) vulnerabilty exits in RosarioSIS before 7.6.1 via the xss_clean function in classes/Security.php, which allows remote malicious users to inject arbitrary JaveScript of HTML.An example of affected components are all Markdown input fields." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitlab.com/francoisjacquet/rosariosis/-/issues/307", + "refsource": "MISC", + "name": "https://gitlab.com/francoisjacquet/rosariosis/-/issues/307" + }, + { + "url": "https://gitlab.com/francoisjacquet/rosariosis/-/commit/0f5d1f1d193bc6b711d1644f172579d498ec1636", + "refsource": "MISC", + "name": "https://gitlab.com/francoisjacquet/rosariosis/-/commit/0f5d1f1d193bc6b711d1644f172579d498ec1636" + }, + { + "url": "https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761", + "refsource": "MISC", + "name": "https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761" } ] } diff --git a/2021/44xxx/CVE-2021-44566.json b/2021/44xxx/CVE-2021-44566.json index fc9db4cdb6f..abae386e817 100644 --- a/2021/44xxx/CVE-2021-44566.json +++ b/2021/44xxx/CVE-2021-44566.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-44566", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-44566", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Cross Site Scripting vulnerability exists RosarioSIS before 4.3 via the SanitizeMarkDown function in ProgramFunctions/MarkDownHTML.fnc.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitlab.com/francoisjacquet/rosariosis/-/issues/259", + "refsource": "MISC", + "name": "https://gitlab.com/francoisjacquet/rosariosis/-/issues/259" + }, + { + "url": "https://gitlab.com/francoisjacquet/rosariosis/-/commit/81886abb45a32e802151660de674f084afaef3aa", + "refsource": "MISC", + "name": "https://gitlab.com/francoisjacquet/rosariosis/-/commit/81886abb45a32e802151660de674f084afaef3aa" + }, + { + "url": "https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES_V3_4.md#changes-in-43", + "refsource": "MISC", + "name": "https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES_V3_4.md#changes-in-43" } ] } diff --git a/2021/45xxx/CVE-2021-45444.json b/2021/45xxx/CVE-2021-45444.json index dc53fd98fe9..1d3e67af15a 100644 --- a/2021/45xxx/CVE-2021-45444.json +++ b/2021/45xxx/CVE-2021-45444.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20220218 [SECURITY] [DLA 2926-1] zsh security update", "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-0a06987c3c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWF3EXNBX5SVFDBL4ZFOD4GJBWFUKWN4/" } ] } diff --git a/2021/45xxx/CVE-2021-45969.json b/2021/45xxx/CVE-2021-45969.json index 0d920d85db0..83a0084d4f5 100644 --- a/2021/45xxx/CVE-2021-45969.json +++ b/2021/45xxx/CVE-2021-45969.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220216-0004/", "url": "https://security.netapp.com/advisory/ntap-20220216-0004/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2021/45xxx/CVE-2021-45970.json b/2021/45xxx/CVE-2021-45970.json index f55a7580969..a454395a14d 100644 --- a/2021/45xxx/CVE-2021-45970.json +++ b/2021/45xxx/CVE-2021-45970.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220216-0004/", "url": "https://security.netapp.com/advisory/ntap-20220216-0004/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2021/45xxx/CVE-2021-45971.json b/2021/45xxx/CVE-2021-45971.json index d718db71a80..edde34b44bd 100644 --- a/2021/45xxx/CVE-2021-45971.json +++ b/2021/45xxx/CVE-2021-45971.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220216-0004/", "url": "https://security.netapp.com/advisory/ntap-20220216-0004/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2022/0xxx/CVE-2022-0173.json b/2022/0xxx/CVE-2022-0173.json index 367efce7534..19b7c2fd35b 100644 --- a/2022/0xxx/CVE-2022-0173.json +++ b/2022/0xxx/CVE-2022-0173.json @@ -1,89 +1,99 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@huntr.dev", - "ID": "CVE-2022-0173", - "STATE": "PUBLIC", - "TITLE": "Out-of-bounds Read in radareorg/radare2" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "radareorg/radare2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "Will be fixed in the upcoming r2-5.6.0" - } - ] + "CVE_data_meta": { + "ASSIGNER": "security@huntr.dev", + "ID": "CVE-2022-0173", + "STATE": "PUBLIC", + "TITLE": "Out-of-bounds Read in radareorg/radare2" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "radareorg/radare2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "Will be fixed in the upcoming r2-5.6.0" + } + ] + } + } + ] + }, + "vendor_name": "radareorg" } - } ] - }, - "vendor_name": "radareorg" } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "radare2 is vulnerable to Out-of-bounds Read" - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 9.6, - "baseSeverity": "CRITICAL", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "NONE", - "scope": "CHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-125 Out-of-bounds Read" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "radare2 is vulnerable to Out-of-bounds Read" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5", - "refsource": "CONFIRM", - "url": "https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5" - }, - { - "name": "https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c", - "refsource": "MISC", - "url": "https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c" - } - ] - }, - "source": { - "advisory": "727d8600-88bc-4dde-8dea-ee3d192600e5", - "discovery": "EXTERNAL" - } + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125 Out-of-bounds Read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5", + "refsource": "CONFIRM", + "url": "https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5" + }, + { + "name": "https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c", + "refsource": "MISC", + "url": "https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-ba3248e596", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-3fc85cd09c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/" + } + ] + }, + "source": { + "advisory": "727d8600-88bc-4dde-8dea-ee3d192600e5", + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0419.json b/2022/0xxx/CVE-2022-0419.json index 7147776b286..6b6983b8f8d 100644 --- a/2022/0xxx/CVE-2022-0419.json +++ b/2022/0xxx/CVE-2022-0419.json @@ -1,89 +1,99 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@huntr.dev", - "ID": "CVE-2022-0419", - "STATE": "PUBLIC", - "TITLE": "NULL Pointer Dereference in radareorg/radare2" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "radareorg/radare2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "5.6.0" - } - ] + "CVE_data_meta": { + "ASSIGNER": "security@huntr.dev", + "ID": "CVE-2022-0419", + "STATE": "PUBLIC", + "TITLE": "NULL Pointer Dereference in radareorg/radare2" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "radareorg/radare2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "5.6.0" + } + ] + } + } + ] + }, + "vendor_name": "radareorg" } - } ] - }, - "vendor_name": "radareorg" } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "LOW", - "baseScore": 5.9, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-476 NULL Pointer Dereference" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa", - "refsource": "CONFIRM", - "url": "https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa" - }, - { - "name": "https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6", - "refsource": "MISC", - "url": "https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6" - } - ] - }, - "source": { - "advisory": "1f84e79d-70e7-4b29-8b48-a108f81c89aa", - "discovery": "EXTERNAL" - } -} + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476 NULL Pointer Dereference" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa", + "refsource": "CONFIRM", + "url": "https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa" + }, + { + "name": "https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6", + "refsource": "MISC", + "url": "https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-ba3248e596", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-3fc85cd09c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/" + } + ] + }, + "source": { + "advisory": "1f84e79d-70e7-4b29-8b48-a108f81c89aa", + "discovery": "EXTERNAL" + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0629.json b/2022/0xxx/CVE-2022-0629.json index d4f9951b5ed..24c1344b4ef 100644 --- a/2022/0xxx/CVE-2022-0629.json +++ b/2022/0xxx/CVE-2022-0629.json @@ -79,6 +79,11 @@ "name": "https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc", "refsource": "MISC", "url": "https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-8622ebdebb", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/" } ] }, diff --git a/2022/0xxx/CVE-2022-0676.json b/2022/0xxx/CVE-2022-0676.json index 41089c9a4e8..8879ad506b4 100644 --- a/2022/0xxx/CVE-2022-0676.json +++ b/2022/0xxx/CVE-2022-0676.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "Heap-based Buffer Overflow in NPM radare2.js prior to 5.6.4." + "value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4." } ] }, diff --git a/2022/0xxx/CVE-2022-0714.json b/2022/0xxx/CVE-2022-0714.json index 9decd34c8e2..687797e3c26 100644 --- a/2022/0xxx/CVE-2022-0714.json +++ b/2022/0xxx/CVE-2022-0714.json @@ -1,89 +1,89 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@huntr.dev", - "ID": "CVE-2022-0714", - "STATE": "PUBLIC", - "TITLE": "Heap-based Buffer Overflow in vim/vim" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "vim/vim", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "8.2.4436" - } - ] + "CVE_data_meta": { + "ASSIGNER": "security@huntr.dev", + "ID": "CVE-2022-0714", + "STATE": "PUBLIC", + "TITLE": "Heap-based Buffer Overflow in vim/vim" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "vim/vim", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.2" + } + ] + } + } + ] + }, + "vendor_name": "vim" } - } ] - }, - "vendor_name": "vim" } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 8.4, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-122 Heap-based Buffer Overflow" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3", - "refsource": "CONFIRM", - "url": "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3" - }, - { - "name": "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa", - "refsource": "MISC", - "url": "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa" - } - ] - }, - "source": { - "advisory": "db70e8db-f309-4f3c-986c-e69d2415c3b3", - "discovery": "EXTERNAL" - } -} + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-122 Heap-based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3", + "refsource": "CONFIRM", + "url": "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3" + }, + { + "name": "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa", + "refsource": "MISC", + "url": "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa" + } + ] + }, + "source": { + "advisory": "db70e8db-f309-4f3c-986c-e69d2415c3b3", + "discovery": "EXTERNAL" + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0717.json b/2022/0xxx/CVE-2022-0717.json index 0b72c4ef33d..de5bf515ec6 100644 --- a/2022/0xxx/CVE-2022-0717.json +++ b/2022/0xxx/CVE-2022-0717.json @@ -1,89 +1,18 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@huntr.dev", - "ID": "CVE-2022-0717", - "STATE": "PUBLIC", - "TITLE": "Out-of-bounds Read in mruby/mruby" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "mruby/mruby", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "3.2" - } - ] - } - } - ] - }, - "vendor_name": "mruby" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 6.8, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-125 Out-of-bounds Read" - } + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0717", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://huntr.dev/bounties/27a851a5-7ebf-409b-854f-b2614771e8f9", - "refsource": "CONFIRM", - "url": "https://huntr.dev/bounties/27a851a5-7ebf-409b-854f-b2614771e8f9" - }, - { - "name": "https://github.com/mruby/mruby/commit/f72315575f78a9a773adbce0ee7d3ec33434cb76", - "refsource": "MISC", - "url": "https://github.com/mruby/mruby/commit/f72315575f78a9a773adbce0ee7d3ec33434cb76" - } - ] - }, - "source": { - "advisory": "27a851a5-7ebf-409b-854f-b2614771e8f9", - "discovery": "EXTERNAL" - } + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0718.json b/2022/0xxx/CVE-2022-0718.json new file mode 100644 index 00000000000..bdfd98fbb00 --- /dev/null +++ b/2022/0xxx/CVE-2022-0718.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0718", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0719.json b/2022/0xxx/CVE-2022-0719.json index 1bb6c913028..81194e0c13f 100644 --- a/2022/0xxx/CVE-2022-0719.json +++ b/2022/0xxx/CVE-2022-0719.json @@ -1,89 +1,18 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@huntr.dev", - "ID": "CVE-2022-0719", - "STATE": "PUBLIC", - "TITLE": "Cross-site Scripting (XSS) - Reflected in microweber/microweber" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "microweber/microweber", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "1.3" - } - ] - } - } - ] - }, - "vendor_name": "microweber" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.3." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 7.6, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "LOW", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" - } + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0719", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://huntr.dev/bounties/bcdce15b-7f40-4971-a061-c25c6053c312", - "refsource": "CONFIRM", - "url": "https://huntr.dev/bounties/bcdce15b-7f40-4971-a061-c25c6053c312" - }, - { - "name": "https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a", - "refsource": "MISC", - "url": "https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a" - } - ] - }, - "source": { - "advisory": "bcdce15b-7f40-4971-a061-c25c6053c312", - "discovery": "EXTERNAL" - } + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0720.json b/2022/0xxx/CVE-2022-0720.json new file mode 100644 index 00000000000..ebd6a1c2638 --- /dev/null +++ b/2022/0xxx/CVE-2022-0720.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0720", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0721.json b/2022/0xxx/CVE-2022-0721.json index d878e33486b..13259e4b832 100644 --- a/2022/0xxx/CVE-2022-0721.json +++ b/2022/0xxx/CVE-2022-0721.json @@ -1,89 +1,18 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@huntr.dev", - "ID": "CVE-2022-0721", - "STATE": "PUBLIC", - "TITLE": "Insertion of Sensitive Information Into Debugging Code in microweber/microweber" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "microweber/microweber", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "1.3" - } - ] - } - } - ] - }, - "vendor_name": "microweber" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Insertion of Sensitive Information Into Debugging Code in GitHub repository microweber/microweber prior to 1.3." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-215 Insertion of Sensitive Information Into Debugging Code" - } + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0721", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://huntr.dev/bounties/ae267d39-9750-4c69-be8b-4f915da089fb", - "refsource": "CONFIRM", - "url": "https://huntr.dev/bounties/ae267d39-9750-4c69-be8b-4f915da089fb" - }, - { - "name": "https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec", - "refsource": "MISC", - "url": "https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec" - } - ] - }, - "source": { - "advisory": "ae267d39-9750-4c69-be8b-4f915da089fb", - "discovery": "EXTERNAL" - } + } } \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21124.json b/2022/21xxx/CVE-2022-21124.json new file mode 100644 index 00000000000..47d9b0dec39 --- /dev/null +++ b/2022/21xxx/CVE-2022-21124.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21124", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21219.json b/2022/21xxx/CVE-2022-21219.json new file mode 100644 index 00000000000..7fb4516b4bb --- /dev/null +++ b/2022/21xxx/CVE-2022-21219.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-21219", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23652.json b/2022/23xxx/CVE-2022-23652.json index 505fb2d76ab..23c10f1dc54 100644 --- a/2022/23xxx/CVE-2022-23652.json +++ b/2022/23xxx/CVE-2022-23652.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "capsule-proxy is a reverse proxy for Capsule Operator which provides multi-tenancy in Kubernetes. In versions prior to 0.2.1 an attacker with a proper authentication mechanism may use a malicious `Connection` header to start a privilege escalation attack towards the Kubernetes API Server. This vulnerability allows for an exploit of the `cluster-admin` Role bound to `capsule-proxy`. There are no known workarounds for this issue.\n" + "value": "capsule-proxy is a reverse proxy for Capsule Operator which provides multi-tenancy in Kubernetes. In versions prior to 0.2.1 an attacker with a proper authentication mechanism may use a malicious `Connection` header to start a privilege escalation attack towards the Kubernetes API Server. This vulnerability allows for an exploit of the `cluster-admin` Role bound to `capsule-proxy`. There are no known workarounds for this issue." } ] }, diff --git a/2022/23xxx/CVE-2022-23654.json b/2022/23xxx/CVE-2022-23654.json index 56e9b72bab8..b9b402e641f 100644 --- a/2022/23xxx/CVE-2022-23654.json +++ b/2022/23xxx/CVE-2022-23654.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": " Wiki.js is a wiki app built on Node.js. In affected versions an authenticated user with write access on a restricted set of paths can update a page outside the allowed paths by specifying a different target page ID while keeping the path intact. The access control incorrectly check the path access against the user-provided values instead of the actual path associated to the page ID. Commit https://github.com/Requarks/wiki/commit/411802ec2f654bb5ed1126c307575b81e2361c6b fixes this vulnerability by checking access control on the path associated with the page ID instead of the user-provided value. When the path is different than the current value, a second access control check is then performed on the user-provided path before the move operation." + "value": "Wiki.js is a wiki app built on Node.js. In affected versions an authenticated user with write access on a restricted set of paths can update a page outside the allowed paths by specifying a different target page ID while keeping the path intact. The access control incorrectly check the path access against the user-provided values instead of the actual path associated to the page ID. Commit https://github.com/Requarks/wiki/commit/411802ec2f654bb5ed1126c307575b81e2361c6b fixes this vulnerability by checking access control on the path associated with the page ID instead of the user-provided value. When the path is different than the current value, a second access control check is then performed on the user-provided path before the move operation." } ] }, diff --git a/2022/24xxx/CVE-2022-24030.json b/2022/24xxx/CVE-2022-24030.json index 05e227a528e..945ef93e6ca 100644 --- a/2022/24xxx/CVE-2022-24030.json +++ b/2022/24xxx/CVE-2022-24030.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220216-0011/", "url": "https://security.netapp.com/advisory/ntap-20220216-0011/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2022/24xxx/CVE-2022-24031.json b/2022/24xxx/CVE-2022-24031.json index 202928b3ba9..fbdf802a4d6 100644 --- a/2022/24xxx/CVE-2022-24031.json +++ b/2022/24xxx/CVE-2022-24031.json @@ -66,6 +66,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220216-0009/", "url": "https://security.netapp.com/advisory/ntap-20220216-0009/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2022/24xxx/CVE-2022-24069.json b/2022/24xxx/CVE-2022-24069.json index e8f5c1f06d5..dbdeda09665 100644 --- a/2022/24xxx/CVE-2022-24069.json +++ b/2022/24xxx/CVE-2022-24069.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220216-0002/", "url": "https://security.netapp.com/advisory/ntap-20220216-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } diff --git a/2022/25xxx/CVE-2022-25230.json b/2022/25xxx/CVE-2022-25230.json new file mode 100644 index 00000000000..85317b1513d --- /dev/null +++ b/2022/25xxx/CVE-2022-25230.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25230", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25234.json b/2022/25xxx/CVE-2022-25234.json new file mode 100644 index 00000000000..ff1d5fba80b --- /dev/null +++ b/2022/25xxx/CVE-2022-25234.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25234", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25325.json b/2022/25xxx/CVE-2022-25325.json new file mode 100644 index 00000000000..54118b35bbb --- /dev/null +++ b/2022/25xxx/CVE-2022-25325.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25325", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25633.json b/2022/25xxx/CVE-2022-25633.json new file mode 100644 index 00000000000..1d88ca845d5 --- /dev/null +++ b/2022/25xxx/CVE-2022-25633.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25633", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25634.json b/2022/25xxx/CVE-2022-25634.json new file mode 100644 index 00000000000..5c57c3e6d67 --- /dev/null +++ b/2022/25xxx/CVE-2022-25634.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25634", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25635.json b/2022/25xxx/CVE-2022-25635.json new file mode 100644 index 00000000000..d67a0977f73 --- /dev/null +++ b/2022/25xxx/CVE-2022-25635.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25635", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25636.json b/2022/25xxx/CVE-2022-25636.json new file mode 100644 index 00000000000..c08e68c867a --- /dev/null +++ b/2022/25xxx/CVE-2022-25636.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2022-25636", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.openwall.com/lists/oss-security/2022/02/21/2", + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2022/02/21/2" + }, + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20220222 Re: Linux kernel: heap out of bounds write in nf_dup_netdev.c since 5.4", + "url": "http://www.openwall.com/lists/oss-security/2022/02/22/1" + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25637.json b/2022/25xxx/CVE-2022-25637.json new file mode 100644 index 00000000000..dcea9f1566d --- /dev/null +++ b/2022/25xxx/CVE-2022-25637.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25637", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25638.json b/2022/25xxx/CVE-2022-25638.json new file mode 100644 index 00000000000..bb39ee366e4 --- /dev/null +++ b/2022/25xxx/CVE-2022-25638.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25638", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25639.json b/2022/25xxx/CVE-2022-25639.json new file mode 100644 index 00000000000..315b38fab35 --- /dev/null +++ b/2022/25xxx/CVE-2022-25639.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25639", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25640.json b/2022/25xxx/CVE-2022-25640.json new file mode 100644 index 00000000000..02cfe8a6aaf --- /dev/null +++ b/2022/25xxx/CVE-2022-25640.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25640", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25641.json b/2022/25xxx/CVE-2022-25641.json new file mode 100644 index 00000000000..1f4597f53cd --- /dev/null +++ b/2022/25xxx/CVE-2022-25641.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25641", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25642.json b/2022/25xxx/CVE-2022-25642.json new file mode 100644 index 00000000000..95ca6031313 --- /dev/null +++ b/2022/25xxx/CVE-2022-25642.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25642", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25643.json b/2022/25xxx/CVE-2022-25643.json new file mode 100644 index 00000000000..835e8f04b99 --- /dev/null +++ b/2022/25xxx/CVE-2022-25643.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25643", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25650.json b/2022/25xxx/CVE-2022-25650.json new file mode 100644 index 00000000000..32871d46eb7 --- /dev/null +++ b/2022/25xxx/CVE-2022-25650.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25650", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25768.json b/2022/25xxx/CVE-2022-25768.json new file mode 100644 index 00000000000..daee1a12ef4 --- /dev/null +++ b/2022/25xxx/CVE-2022-25768.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25768", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25769.json b/2022/25xxx/CVE-2022-25769.json new file mode 100644 index 00000000000..846e2171a3c --- /dev/null +++ b/2022/25xxx/CVE-2022-25769.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25769", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25770.json b/2022/25xxx/CVE-2022-25770.json new file mode 100644 index 00000000000..612e467db1d --- /dev/null +++ b/2022/25xxx/CVE-2022-25770.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25770", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25771.json b/2022/25xxx/CVE-2022-25771.json new file mode 100644 index 00000000000..4250be578f5 --- /dev/null +++ b/2022/25xxx/CVE-2022-25771.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25771", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25772.json b/2022/25xxx/CVE-2022-25772.json new file mode 100644 index 00000000000..3b8e5206e29 --- /dev/null +++ b/2022/25xxx/CVE-2022-25772.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25772", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25773.json b/2022/25xxx/CVE-2022-25773.json new file mode 100644 index 00000000000..86e01859a5c --- /dev/null +++ b/2022/25xxx/CVE-2022-25773.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25773", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25774.json b/2022/25xxx/CVE-2022-25774.json new file mode 100644 index 00000000000..72a332c36b5 --- /dev/null +++ b/2022/25xxx/CVE-2022-25774.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25774", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25775.json b/2022/25xxx/CVE-2022-25775.json new file mode 100644 index 00000000000..051c244f588 --- /dev/null +++ b/2022/25xxx/CVE-2022-25775.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25775", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25776.json b/2022/25xxx/CVE-2022-25776.json new file mode 100644 index 00000000000..f955f0569b9 --- /dev/null +++ b/2022/25xxx/CVE-2022-25776.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25776", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25777.json b/2022/25xxx/CVE-2022-25777.json new file mode 100644 index 00000000000..a59a11f089e --- /dev/null +++ b/2022/25xxx/CVE-2022-25777.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25777", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25778.json b/2022/25xxx/CVE-2022-25778.json new file mode 100644 index 00000000000..6dedacec647 --- /dev/null +++ b/2022/25xxx/CVE-2022-25778.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25778", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25779.json b/2022/25xxx/CVE-2022-25779.json new file mode 100644 index 00000000000..cd0344e3927 --- /dev/null +++ b/2022/25xxx/CVE-2022-25779.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25779", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25780.json b/2022/25xxx/CVE-2022-25780.json new file mode 100644 index 00000000000..3195442bc65 --- /dev/null +++ b/2022/25xxx/CVE-2022-25780.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25780", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25781.json b/2022/25xxx/CVE-2022-25781.json new file mode 100644 index 00000000000..002ff18159f --- /dev/null +++ b/2022/25xxx/CVE-2022-25781.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25781", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25782.json b/2022/25xxx/CVE-2022-25782.json new file mode 100644 index 00000000000..3d49de39b6b --- /dev/null +++ b/2022/25xxx/CVE-2022-25782.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25782", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25783.json b/2022/25xxx/CVE-2022-25783.json new file mode 100644 index 00000000000..5fee4c831e1 --- /dev/null +++ b/2022/25xxx/CVE-2022-25783.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25783", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25784.json b/2022/25xxx/CVE-2022-25784.json new file mode 100644 index 00000000000..ad0814849f0 --- /dev/null +++ b/2022/25xxx/CVE-2022-25784.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25784", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25785.json b/2022/25xxx/CVE-2022-25785.json new file mode 100644 index 00000000000..a395a6670de --- /dev/null +++ b/2022/25xxx/CVE-2022-25785.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25785", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25786.json b/2022/25xxx/CVE-2022-25786.json new file mode 100644 index 00000000000..b75cec021da --- /dev/null +++ b/2022/25xxx/CVE-2022-25786.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25786", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/25xxx/CVE-2022-25787.json b/2022/25xxx/CVE-2022-25787.json new file mode 100644 index 00000000000..6285ec0dc45 --- /dev/null +++ b/2022/25xxx/CVE-2022-25787.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25787", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file