diff --git a/2022/21xxx/CVE-2022-21659.json b/2022/21xxx/CVE-2022-21659.json index 180599b78ff..41dadd1622d 100644 --- a/2022/21xxx/CVE-2022-21659.json +++ b/2022/21xxx/CVE-2022-21659.json @@ -12,18 +12,18 @@ "product": { "product_data": [ { - "product_name": "Flask-AppBuilder", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "< 3.4.4" + "version_value": "n/a" } ] } } ] }, - "vendor_name": "dpgaspar" + "vendor_name": "n/a" } ] } @@ -61,7 +61,7 @@ "description": [ { "lang": "eng", - "value": "CWE-203: Observable Discrepancy" + "value": "n/a" } ] } diff --git a/2022/23xxx/CVE-2022-23872.json b/2022/23xxx/CVE-2022-23872.json index ef343e8b407..25d1a7587ea 100644 --- a/2022/23xxx/CVE-2022-23872.json +++ b/2022/23xxx/CVE-2022-23872.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-23872", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-23872", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Emlog pro v1.1.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the component /admin/configure.php via the parameter footer_info." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/truonghuuphuc/CVE", + "refsource": "MISC", + "name": "https://github.com/truonghuuphuc/CVE" + }, + { + "url": "https://github.com/emlog/emlog/issues/147", + "refsource": "MISC", + "name": "https://github.com/emlog/emlog/issues/147" } ] } diff --git a/2022/24xxx/CVE-2022-24263.json b/2022/24xxx/CVE-2022-24263.json index 1c93d27226b..1dc67e907e8 100644 --- a/2022/24xxx/CVE-2022-24263.json +++ b/2022/24xxx/CVE-2022-24263.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24263", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24263", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hospital Management System v4.0 was discovered to contain a SQL injection vulnerability in /Hospital-Management-System-master/func.php via the email parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/truonghuuphuc/CVE", + "refsource": "MISC", + "name": "https://github.com/truonghuuphuc/CVE" + }, + { + "url": "https://github.com/kishan0725/Hospital-Management-System/issues/17", + "refsource": "MISC", + "name": "https://github.com/kishan0725/Hospital-Management-System/issues/17" } ] } diff --git a/2022/24xxx/CVE-2022-24264.json b/2022/24xxx/CVE-2022-24264.json index 6adda3931b9..441f1633e8e 100644 --- a/2022/24xxx/CVE-2022-24264.json +++ b/2022/24xxx/CVE-2022-24264.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24264", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24264", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/table_manager/ via the search_word parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/truonghuuphuc/CVE", + "refsource": "MISC", + "name": "https://github.com/truonghuuphuc/CVE" + }, + { + "url": "https://github.com/CuppaCMS/CuppaCMS/issues/13", + "refsource": "MISC", + "name": "https://github.com/CuppaCMS/CuppaCMS/issues/13" } ] } diff --git a/2022/24xxx/CVE-2022-24265.json b/2022/24xxx/CVE-2022-24265.json index ef9df096435..c77947b8ce4 100644 --- a/2022/24xxx/CVE-2022-24265.json +++ b/2022/24xxx/CVE-2022-24265.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24265", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24265", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/menu/ via the path=component/menu/&menu_filter=3 parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/truonghuuphuc/CVE", + "refsource": "MISC", + "name": "https://github.com/truonghuuphuc/CVE" + }, + { + "url": "https://github.com/CuppaCMS/CuppaCMS/issues/14", + "refsource": "MISC", + "name": "https://github.com/CuppaCMS/CuppaCMS/issues/14" } ] } diff --git a/2022/24xxx/CVE-2022-24266.json b/2022/24xxx/CVE-2022-24266.json index 4eeca5433e6..0a5ee2137d0 100644 --- a/2022/24xxx/CVE-2022-24266.json +++ b/2022/24xxx/CVE-2022-24266.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24266", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24266", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/table_manager/ via the order_by parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/truonghuuphuc/CVE", + "refsource": "MISC", + "name": "https://github.com/truonghuuphuc/CVE" + }, + { + "url": "https://github.com/CuppaCMS/CuppaCMS/issues/17", + "refsource": "MISC", + "name": "https://github.com/CuppaCMS/CuppaCMS/issues/17" } ] }