diff --git a/2021/44xxx/CVE-2021-44866.json b/2021/44xxx/CVE-2021-44866.json index 6f499469c73..0602c3cce49 100644 --- a/2021/44xxx/CVE-2021-44866.json +++ b/2021/44xxx/CVE-2021-44866.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-44866", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-44866", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Online-Movie-Ticket-Booking-System 1.0. The file about.php does not perform input validation on the 'id' paramter. An attacker can append SQL queries to the input to extract sensitive information from the database." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6", + "refsource": "MISC", + "name": "https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6" } ] } diff --git a/2021/45xxx/CVE-2021-45897.json b/2021/45xxx/CVE-2021-45897.json index 337f8dfb608..8ce9e8325df 100644 --- a/2021/45xxx/CVE-2021-45897.json +++ b/2021/45xxx/CVE-2021-45897.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://docs.suitecrm.com/admin/releases/7.12.x/", "url": "https://docs.suitecrm.com/admin/releases/7.12.x/" + }, + { + "refsource": "MISC", + "name": "https://github.com/manuelz120/CVE-2021-45897", + "url": "https://github.com/manuelz120/CVE-2021-45897" } ] } diff --git a/2022/0xxx/CVE-2022-0483.json b/2022/0xxx/CVE-2022-0483.json new file mode 100644 index 00000000000..a249fa13706 --- /dev/null +++ b/2022/0xxx/CVE-2022-0483.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0483", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21725.json b/2022/21xxx/CVE-2022-21725.json index e6a4c21a56c..99b9d681c44 100644 --- a/2022/21xxx/CVE-2022-21725.json +++ b/2022/21xxx/CVE-2022-21725.json @@ -12,24 +12,18 @@ "product": { "product_data": [ { - "product_name": "tensorflow", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": ">= 2.7.0, < 2.7.1" - }, - { - "version_value": ">= 2.6.0, < 2.6.3" - }, - { - "version_value": "< 2.5.3" + "version_value": "n/a" } ] } } ] }, - "vendor_name": "tensorflow" + "vendor_name": "n/a" } ] } @@ -67,7 +61,7 @@ "description": [ { "lang": "eng", - "value": "CWE-369: Divide By Zero" + "value": "n/a" } ] } diff --git a/2022/21xxx/CVE-2022-21729.json b/2022/21xxx/CVE-2022-21729.json index a0d4744902f..a0fd921b564 100644 --- a/2022/21xxx/CVE-2022-21729.json +++ b/2022/21xxx/CVE-2022-21729.json @@ -12,24 +12,18 @@ "product": { "product_data": [ { - "product_name": "tensorflow", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": ">= 2.7.0, < 2.7.1" - }, - { - "version_value": ">= 2.6.0, < 2.6.3" - }, - { - "version_value": "< 2.5.3" + "version_value": "n/a" } ] } } ] }, - "vendor_name": "tensorflow" + "vendor_name": "n/a" } ] } @@ -67,7 +61,7 @@ "description": [ { "lang": "eng", - "value": "CWE-190: Integer Overflow or Wraparound" + "value": "n/a" } ] } diff --git a/2022/21xxx/CVE-2022-21734.json b/2022/21xxx/CVE-2022-21734.json index 59ca026164d..4773e19c570 100644 --- a/2022/21xxx/CVE-2022-21734.json +++ b/2022/21xxx/CVE-2022-21734.json @@ -12,24 +12,18 @@ "product": { "product_data": [ { - "product_name": "tensorflow", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": ">= 2.7.0, < 2.7.1" - }, - { - "version_value": ">= 2.6.0, < 2.6.3" - }, - { - "version_value": "< 2.5.3" + "version_value": "n/a" } ] } } ] }, - "vendor_name": "tensorflow" + "vendor_name": "n/a" } ] } @@ -67,7 +61,7 @@ "description": [ { "lang": "eng", - "value": "CWE-617: Reachable Assertion" + "value": "n/a" } ] } diff --git a/2022/21xxx/CVE-2022-21735.json b/2022/21xxx/CVE-2022-21735.json index f70d34d079f..89bd49163e9 100644 --- a/2022/21xxx/CVE-2022-21735.json +++ b/2022/21xxx/CVE-2022-21735.json @@ -12,24 +12,18 @@ "product": { "product_data": [ { - "product_name": "tensorflow", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": ">= 2.7.0, < 2.7.1" - }, - { - "version_value": ">= 2.6.0, < 2.6.3" - }, - { - "version_value": "< 2.5.3" + "version_value": "n/a" } ] } } ] }, - "vendor_name": "tensorflow" + "vendor_name": "n/a" } ] } @@ -67,7 +61,7 @@ "description": [ { "lang": "eng", - "value": "CWE-369: Divide By Zero" + "value": "n/a" } ] } diff --git a/2022/21xxx/CVE-2022-21738.json b/2022/21xxx/CVE-2022-21738.json index 7d9fb622cab..26c8b7a058a 100644 --- a/2022/21xxx/CVE-2022-21738.json +++ b/2022/21xxx/CVE-2022-21738.json @@ -75,6 +75,11 @@ }, "references": { "reference_data": [ + { + "name": "https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273", + "refsource": "MISC", + "url": "https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273" + }, { "name": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4qx-4fjv-hmw6", "refsource": "CONFIRM", @@ -84,11 +89,6 @@ "name": "https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a", "refsource": "MISC", "url": "https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a" - }, - { - "name": "https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273", - "refsource": "MISC", - "url": "https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273" } ] }, diff --git a/2022/23xxx/CVE-2022-23569.json b/2022/23xxx/CVE-2022-23569.json index eedfc2f0337..fc6705542c1 100644 --- a/2022/23xxx/CVE-2022-23569.json +++ b/2022/23xxx/CVE-2022-23569.json @@ -12,24 +12,18 @@ "product": { "product_data": [ { - "product_name": "tensorflow", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": ">= 2.7.0, < 2.7.1" - }, - { - "version_value": ">= 2.6.0, < 2.6.3" - }, - { - "version_value": "< 2.5.3" + "version_value": "n/a" } ] } } ] }, - "vendor_name": "tensorflow" + "vendor_name": "n/a" } ] } @@ -67,7 +61,7 @@ "description": [ { "lang": "eng", - "value": "CWE-617: Reachable Assertion" + "value": "n/a" } ] }