From 03263379ea7f20c70e157066e619057c7f0a0224 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 May 2023 17:00:52 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/33xxx/CVE-2022-33633.json | 109 +++++++++++++++++---------------- 2022/33xxx/CVE-2022-33650.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33651.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33652.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33653.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33654.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33655.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33656.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33657.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33658.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33659.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33660.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33661.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33662.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33663.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33664.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33665.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33666.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33667.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33668.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33669.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33671.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33672.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33673.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33674.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33675.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33676.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33677.json | 72 ++++++++++++---------- 2022/33xxx/CVE-2022-33678.json | 72 ++++++++++++---------- 2023/2xxx/CVE-2023-2768.json | 96 +++++++++++++++++++++++++++-- 2023/2xxx/CVE-2023-2770.json | 18 ++++++ 2023/2xxx/CVE-2023-2771.json | 18 ++++++ 2023/2xxx/CVE-2023-2772.json | 18 ++++++ 2023/2xxx/CVE-2023-2773.json | 18 ++++++ 2023/2xxx/CVE-2023-2774.json | 18 ++++++ 2023/2xxx/CVE-2023-2775.json | 18 ++++++ 2023/2xxx/CVE-2023-2776.json | 18 ++++++ 37 files changed, 1337 insertions(+), 1010 deletions(-) create mode 100644 2023/2xxx/CVE-2023-2770.json create mode 100644 2023/2xxx/CVE-2023-2771.json create mode 100644 2023/2xxx/CVE-2023-2772.json create mode 100644 2023/2xxx/CVE-2023-2773.json create mode 100644 2023/2xxx/CVE-2023-2774.json create mode 100644 2023/2xxx/CVE-2023-2775.json create mode 100644 2023/2xxx/CVE-2023-2776.json diff --git a/2022/33xxx/CVE-2022-33633.json b/2022/33xxx/CVE-2022-33633.json index c0ad793644c..b2dc8156c2d 100644 --- a/2022/33xxx/CVE-2022-33633.json +++ b/2022/33xxx/CVE-2022-33633.json @@ -1,60 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33633", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Microsoft Lync Server 2013 CU10", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Skype for Business Server 2015 CU12", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - }, - { - "product_name": "Skype for Business Server 2019 CU6", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Skype for Business and Lync Remote Code Execution Vulnerability." + "value": "Skype for Business and Lync Remote Code Execution Vulnerability" } ] }, @@ -70,21 +27,65 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Microsoft Lync Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "8308.0", + "version_value": "8308.1198" + } + ] + } + }, + { + "product_name": "Skype for Business Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9319.0", + "version_value": "9319.634" + }, + { + "version_affected": "<", + "version_name": "2046.0", + "version_value": "2046.404" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33633", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33633", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33633" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33633" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", - "baseScore": "7.2", - "temporalScore": "6.3", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 7.2, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33650.json b/2022/33xxx/CVE-2022-33650.json index 9567a41500e..93240032e23 100644 --- a/2022/33xxx/CVE-2022-33650.json +++ b/2022/33xxx/CVE-2022-33650.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33650", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33650", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33650", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33650" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33650" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", - "baseScore": "4.9", - "temporalScore": "4.4", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 4.9, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33651.json b/2022/33xxx/CVE-2022-33651.json index d9205499eb9..806d703ca7a 100644 --- a/2022/33xxx/CVE-2022-33651.json +++ b/2022/33xxx/CVE-2022-33651.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33651", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33651", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33651", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33651" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33651" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", - "baseScore": "4.9", - "temporalScore": "4.4", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 4.9, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33652.json b/2022/33xxx/CVE-2022-33652.json index c93e748f0ab..e59e3d7c2f7 100644 --- a/2022/33xxx/CVE-2022-33652.json +++ b/2022/33xxx/CVE-2022-33652.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33652", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33652", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33652", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33652" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33652" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", - "baseScore": "4.4", - "temporalScore": "4.0", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 4.9, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33653.json b/2022/33xxx/CVE-2022-33653.json index c84139e7b6b..5feb32f2b1e 100644 --- a/2022/33xxx/CVE-2022-33653.json +++ b/2022/33xxx/CVE-2022-33653.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33653", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33653", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33653", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33653" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33653" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", - "baseScore": "4.9", - "temporalScore": "4.4", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 4.9, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33654.json b/2022/33xxx/CVE-2022-33654.json index 08312785f34..5ee69329db0 100644 --- a/2022/33xxx/CVE-2022-33654.json +++ b/2022/33xxx/CVE-2022-33654.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33654", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33654", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33654", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33654" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33654" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", - "baseScore": "4.9", - "temporalScore": "4.4", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 4.9, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33655.json b/2022/33xxx/CVE-2022-33655.json index e0c7f1abc0f..c6dcda2b66a 100644 --- a/2022/33xxx/CVE-2022-33655.json +++ b/2022/33xxx/CVE-2022-33655.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33655", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33655", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33655", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33655" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33655" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", - "baseScore": "6.5", - "temporalScore": "5.9", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 6.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33656.json b/2022/33xxx/CVE-2022-33656.json index 5963d25805b..7baa6503166 100644 --- a/2022/33xxx/CVE-2022-33656.json +++ b/2022/33xxx/CVE-2022-33656.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33656", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33656", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33656", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33656" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33656" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", - "baseScore": "6.5", - "temporalScore": "5.9", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 6.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33657.json b/2022/33xxx/CVE-2022-33657.json index 5b9b6eccea3..8a67ba751fe 100644 --- a/2022/33xxx/CVE-2022-33657.json +++ b/2022/33xxx/CVE-2022-33657.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33657", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33657", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33657", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33657" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33657" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", - "baseScore": "6.5", - "temporalScore": "5.9", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 6.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33658.json b/2022/33xxx/CVE-2022-33658.json index e66d3440db7..ce30de63060 100644 --- a/2022/33xxx/CVE-2022-33658.json +++ b/2022/33xxx/CVE-2022-33658.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33658", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33658", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33658", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33658" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33658" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", - "baseScore": "4.4", - "temporalScore": "4.0", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 4.9, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33659.json b/2022/33xxx/CVE-2022-33659.json index e9ebcb7fb68..5892442dcc0 100644 --- a/2022/33xxx/CVE-2022-33659.json +++ b/2022/33xxx/CVE-2022-33659.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33659", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33659", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33659", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33659" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33659" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", - "baseScore": "4.9", - "temporalScore": "4.4", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 4.9, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33660.json b/2022/33xxx/CVE-2022-33660.json index 563a5c78047..5f713076f02 100644 --- a/2022/33xxx/CVE-2022-33660.json +++ b/2022/33xxx/CVE-2022-33660.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33660", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33660", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33660", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33660" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33660" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", - "baseScore": "4.9", - "temporalScore": "4.4", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 4.9, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33661.json b/2022/33xxx/CVE-2022-33661.json index 2b82129f678..da5343328aa 100644 --- a/2022/33xxx/CVE-2022-33661.json +++ b/2022/33xxx/CVE-2022-33661.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33661", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33661", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33661", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33661" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33661" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", - "baseScore": "6.5", - "temporalScore": "5.9", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 6.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33662.json b/2022/33xxx/CVE-2022-33662.json index 775c71600af..456fe6a081e 100644 --- a/2022/33xxx/CVE-2022-33662.json +++ b/2022/33xxx/CVE-2022-33662.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33662", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33662", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33662", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33662" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33662" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", - "baseScore": "6.5", - "temporalScore": "5.9", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 6.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33663.json b/2022/33xxx/CVE-2022-33663.json index 2c7f796c912..17dd96d6a92 100644 --- a/2022/33xxx/CVE-2022-33663.json +++ b/2022/33xxx/CVE-2022-33663.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33663", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33663", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33663", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33663" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33663" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", - "baseScore": "6.5", - "temporalScore": "5.9", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 6.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33664.json b/2022/33xxx/CVE-2022-33664.json index 694af476a0d..c4c08cdde77 100644 --- a/2022/33xxx/CVE-2022-33664.json +++ b/2022/33xxx/CVE-2022-33664.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33664", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33664", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33664", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33664" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33664" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", - "baseScore": "4.9", - "temporalScore": "4.4", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 4.9, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33665.json b/2022/33xxx/CVE-2022-33665.json index 0abe1c0585d..585b5a60a40 100644 --- a/2022/33xxx/CVE-2022-33665.json +++ b/2022/33xxx/CVE-2022-33665.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33665", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33665", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33665", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33665" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33665" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", - "baseScore": "6.5", - "temporalScore": "5.9", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 6.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33666.json b/2022/33xxx/CVE-2022-33666.json index 41e44be33bc..d7bf8b22e51 100644 --- a/2022/33xxx/CVE-2022-33666.json +++ b/2022/33xxx/CVE-2022-33666.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33666", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33666", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33666", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33666" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33666" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", - "baseScore": "6.5", - "temporalScore": "5.9", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 6.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33667.json b/2022/33xxx/CVE-2022-33667.json index 280d6ab7982..8a42c61f4cc 100644 --- a/2022/33xxx/CVE-2022-33667.json +++ b/2022/33xxx/CVE-2022-33667.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33667", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33667", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33667", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33667" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33667" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", - "baseScore": "6.5", - "temporalScore": "5.9", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 6.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33668.json b/2022/33xxx/CVE-2022-33668.json index 5d0e6e77c5a..8dbb7f25483 100644 --- a/2022/33xxx/CVE-2022-33668.json +++ b/2022/33xxx/CVE-2022-33668.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33668", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33668", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33668", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33668" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33668" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", - "baseScore": "4.9", - "temporalScore": "4.4", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 4.9, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33669.json b/2022/33xxx/CVE-2022-33669.json index 65e460f98f2..f600e90180e 100644 --- a/2022/33xxx/CVE-2022-33669.json +++ b/2022/33xxx/CVE-2022-33669.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33669", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33669", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33669", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33669" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33669" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", - "baseScore": "4.9", - "temporalScore": "4.4", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 4.9, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33671.json b/2022/33xxx/CVE-2022-33671.json index 2cfc3e00cc6..0cfa8303aa8 100644 --- a/2022/33xxx/CVE-2022-33671.json +++ b/2022/33xxx/CVE-2022-33671.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33671", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33671", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33671", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33671" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33671" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", - "baseScore": "4.9", - "temporalScore": "4.4", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 4.9, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33672.json b/2022/33xxx/CVE-2022-33672.json index eaec5945d5d..d2195e0ac3c 100644 --- a/2022/33xxx/CVE-2022-33672.json +++ b/2022/33xxx/CVE-2022-33672.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33672", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33672", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33672", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33672" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33672" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", - "baseScore": "6.5", - "temporalScore": "5.9", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 6.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33673.json b/2022/33xxx/CVE-2022-33673.json index 89625b7bb9e..6c3f709ee7a 100644 --- a/2022/33xxx/CVE-2022-33673.json +++ b/2022/33xxx/CVE-2022-33673.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33673", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33673", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33673", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33673" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33673" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", - "baseScore": "6.5", - "temporalScore": "5.9", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 6.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33674.json b/2022/33xxx/CVE-2022-33674.json index a9676f19140..07e6ea82174 100644 --- a/2022/33xxx/CVE-2022-33674.json +++ b/2022/33xxx/CVE-2022-33674.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33674", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33675, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33674", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33674", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33674" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33674" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C", - "baseScore": "8.3", - "temporalScore": "7.5", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 8.3, + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33675.json b/2022/33xxx/CVE-2022-33675.json index 3c08d5a8976..3f0c63bfe42 100644 --- a/2022/33xxx/CVE-2022-33675.json +++ b/2022/33xxx/CVE-2022-33675.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33675", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33677." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33675", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33675", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33675" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33675" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", - "baseScore": "7.8", - "temporalScore": "7.0", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 7.8, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33676.json b/2022/33xxx/CVE-2022-33676.json index 4d5591c7373..5c915f6ecf6 100644 --- a/2022/33xxx/CVE-2022-33676.json +++ b/2022/33xxx/CVE-2022-33676.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33676", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-33678." + "value": "Azure Site Recovery Remote Code Execution Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33676", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33676", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33676" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33676" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", - "baseScore": "7.2", - "temporalScore": "6.5", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 7.2, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33677.json b/2022/33xxx/CVE-2022-33677.json index 7630d8d44d6..1ea84877c73 100644 --- a/2022/33xxx/CVE-2022-33677.json +++ b/2022/33xxx/CVE-2022-33677.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33677", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675." + "value": "Azure Site Recovery Elevation of Privilege Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33677", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33677", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33677" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33677" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", - "baseScore": "7.2", - "temporalScore": "6.3", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 7.2, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33678.json b/2022/33xxx/CVE-2022-33678.json index ae2dc8677a7..27e54122e00 100644 --- a/2022/33xxx/CVE-2022-33678.json +++ b/2022/33xxx/CVE-2022-33678.json @@ -1,40 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-33678", + "ASSIGNER": "secure@microsoft.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Azure Site Recovery VMWare to Azure", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - }, - "vendor_name": "Microsoft" - } - ] - } - }, "description": { "description_data": [ { "lang": "eng", - "value": "Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-33676." + "value": "Azure Site Recovery Remote Code Execution Vulnerability" } ] }, @@ -50,21 +27,48 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Azure Site Recovery VMWare to Azure", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.49" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33678", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33678", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33678" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33678" } ] }, "impact": { - "cvss": { - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", - "baseScore": "7.2", - "temporalScore": "6.3", - "version": "3.1" - } + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 7.2, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C" + } + ] } } \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2768.json b/2023/2xxx/CVE-2023-2768.json index 67d170cc2ca..f60627725f2 100644 --- a/2023/2xxx/CVE-2023-2768.json +++ b/2023/2xxx/CVE-2023-2768.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-2768", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Sucms 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file admin_ads.php?action=add. The manipulation of the argument intro leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-229274 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Eine problematische Schwachstelle wurde in Sucms 1.0 ausgemacht. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei admin_ads.php?action=add. Dank Manipulation des Arguments intro mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross Site Scripting", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Sucms", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.229274", + "refsource": "MISC", + "name": "https://vuldb.com/?id.229274" + }, + { + "url": "https://vuldb.com/?ctiid.229274", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.229274" + }, + { + "url": "https://github.com/Upgradeextension/Sucms-v1.0/blob/main/README.md", + "refsource": "MISC", + "name": "https://github.com/Upgradeextension/Sucms-v1.0/blob/main/README.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "komorebi (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.5, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/2xxx/CVE-2023-2770.json b/2023/2xxx/CVE-2023-2770.json new file mode 100644 index 00000000000..8f3c6c9d7df --- /dev/null +++ b/2023/2xxx/CVE-2023-2770.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2770", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2771.json b/2023/2xxx/CVE-2023-2771.json new file mode 100644 index 00000000000..bf2533660e3 --- /dev/null +++ b/2023/2xxx/CVE-2023-2771.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2771", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2772.json b/2023/2xxx/CVE-2023-2772.json new file mode 100644 index 00000000000..1015a639fd6 --- /dev/null +++ b/2023/2xxx/CVE-2023-2772.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2772", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2773.json b/2023/2xxx/CVE-2023-2773.json new file mode 100644 index 00000000000..d2ca92e6f6c --- /dev/null +++ b/2023/2xxx/CVE-2023-2773.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2773", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2774.json b/2023/2xxx/CVE-2023-2774.json new file mode 100644 index 00000000000..bca5c4a386c --- /dev/null +++ b/2023/2xxx/CVE-2023-2774.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2774", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2775.json b/2023/2xxx/CVE-2023-2775.json new file mode 100644 index 00000000000..8c800b4213a --- /dev/null +++ b/2023/2xxx/CVE-2023-2775.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2775", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2776.json b/2023/2xxx/CVE-2023-2776.json new file mode 100644 index 00000000000..4eae4b132ef --- /dev/null +++ b/2023/2xxx/CVE-2023-2776.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-2776", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file