diff --git a/2021/43xxx/CVE-2021-43129.json b/2021/43xxx/CVE-2021-43129.json index d597f6aa09d..efbcc02eb19 100644 --- a/2021/43xxx/CVE-2021-43129.json +++ b/2021/43xxx/CVE-2021-43129.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An Access Control vulnerability exists in Desire2Learn/D2L Learning Management System (LMS) 20.21.7 via the quizzing feature, which allows a remote malicious user to disable the Disable right click control." + "value": "A bypass exists for Desire2Learn/D2L Brightspace\u2019s \u201cDisable Right Click\u201d option in the quizzing feature, which allows a quiz-taker to access print and copy functionality via the browser\u2019s right click menu even when \u201cDisable Right Click\u201d is enabled on the quiz." } ] }, diff --git a/2021/43xxx/CVE-2021-43774.json b/2021/43xxx/CVE-2021-43774.json index a44daf207e5..db891fd9861 100644 --- a/2021/43xxx/CVE-2021-43774.json +++ b/2021/43xxx/CVE-2021-43774.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.fujifilm.com/fbglobal/eng/company/news/notice/2022/0302_addressbook_announce.html", "url": "https://www.fujifilm.com/fbglobal/eng/company/news/notice/2022/0302_addressbook_announce.html" + }, + { + "refsource": "MISC", + "name": "https://www.foregenix.com/blogs-new-2021/dude-its-just-a-printer", + "url": "https://www.foregenix.com/blogs-new-2021/dude-its-just-a-printer" } ] } diff --git a/2022/25xxx/CVE-2022-25570.json b/2022/25xxx/CVE-2022-25570.json index c4e956c27a7..e630a7a2862 100644 --- a/2022/25xxx/CVE-2022-25570.json +++ b/2022/25xxx/CVE-2022-25570.json @@ -52,6 +52,11 @@ }, "references": { "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.clickstudios.com.au/passwordstate-changelog.aspx", + "url": "https://www.clickstudios.com.au/passwordstate-changelog.aspx" + }, { "refsource": "MISC", "name": "https://sysadms.de/2022/03/cve-2022-25570-standard-berechtigungsmodell-im-passwortmanager-passwordstate-ermoeglicht-rechteausweitung/", diff --git a/2022/29xxx/CVE-2022-29280.json b/2022/29xxx/CVE-2022-29280.json index 0d3ce8b0daa..73a3431ee74 100644 --- a/2022/29xxx/CVE-2022-29280.json +++ b/2022/29xxx/CVE-2022-29280.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2022-29280", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-28366. Reason: This candidate is a reservation duplicate of CVE-2022-28366. Notes: All CVE users should reference CVE-2022-28366 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2022/29xxx/CVE-2022-29567.json b/2022/29xxx/CVE-2022-29567.json new file mode 100644 index 00000000000..b225bf60694 --- /dev/null +++ b/2022/29xxx/CVE-2022-29567.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29567", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29568.json b/2022/29xxx/CVE-2022-29568.json new file mode 100644 index 00000000000..d6f042d2598 --- /dev/null +++ b/2022/29xxx/CVE-2022-29568.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29568", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29569.json b/2022/29xxx/CVE-2022-29569.json new file mode 100644 index 00000000000..b984dc73c17 --- /dev/null +++ b/2022/29xxx/CVE-2022-29569.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29569", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29570.json b/2022/29xxx/CVE-2022-29570.json new file mode 100644 index 00000000000..dfed1c4c99d --- /dev/null +++ b/2022/29xxx/CVE-2022-29570.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29570", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29571.json b/2022/29xxx/CVE-2022-29571.json new file mode 100644 index 00000000000..0d78d1664ae --- /dev/null +++ b/2022/29xxx/CVE-2022-29571.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29571", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29572.json b/2022/29xxx/CVE-2022-29572.json new file mode 100644 index 00000000000..cc3585dfeb2 --- /dev/null +++ b/2022/29xxx/CVE-2022-29572.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29572", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29573.json b/2022/29xxx/CVE-2022-29573.json new file mode 100644 index 00000000000..849408d1f1c --- /dev/null +++ b/2022/29xxx/CVE-2022-29573.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29573", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29574.json b/2022/29xxx/CVE-2022-29574.json new file mode 100644 index 00000000000..8dfbdc5187a --- /dev/null +++ b/2022/29xxx/CVE-2022-29574.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29574", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29575.json b/2022/29xxx/CVE-2022-29575.json new file mode 100644 index 00000000000..fe7aa5e155f --- /dev/null +++ b/2022/29xxx/CVE-2022-29575.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29575", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29576.json b/2022/29xxx/CVE-2022-29576.json new file mode 100644 index 00000000000..0586bdac429 --- /dev/null +++ b/2022/29xxx/CVE-2022-29576.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29576", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file