From 22cb06743b3cd72eb59911cb206224f29c109815 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 10 Feb 2022 23:01:19 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/44xxx/CVE-2021-44969.json | 56 ++++++++++++++++++++++++++++++---- 2021/44xxx/CVE-2021-44970.json | 56 ++++++++++++++++++++++++++++++---- 2022/20xxx/CVE-2022-20630.json | 4 +-- 2022/24xxx/CVE-2022-24646.json | 56 ++++++++++++++++++++++++++++++---- 2022/24xxx/CVE-2022-24647.json | 56 ++++++++++++++++++++++++++++++---- 2022/24xxx/CVE-2022-24911.json | 18 +++++++++++ 2022/24xxx/CVE-2022-24936.json | 18 +++++++++++ 2022/24xxx/CVE-2022-24937.json | 18 +++++++++++ 2022/24xxx/CVE-2022-24938.json | 18 +++++++++++ 2022/24xxx/CVE-2022-24939.json | 18 +++++++++++ 2022/24xxx/CVE-2022-24940.json | 18 +++++++++++ 2022/24xxx/CVE-2022-24941.json | 18 +++++++++++ 2022/24xxx/CVE-2022-24942.json | 18 +++++++++++ 2022/24xxx/CVE-2022-24943.json | 18 +++++++++++ 2022/24xxx/CVE-2022-24944.json | 18 +++++++++++ 2022/24xxx/CVE-2022-24945.json | 18 +++++++++++ 2022/24xxx/CVE-2022-24946.json | 18 +++++++++++ 17 files changed, 418 insertions(+), 26 deletions(-) create mode 100644 2022/24xxx/CVE-2022-24911.json create mode 100644 2022/24xxx/CVE-2022-24936.json create mode 100644 2022/24xxx/CVE-2022-24937.json create mode 100644 2022/24xxx/CVE-2022-24938.json create mode 100644 2022/24xxx/CVE-2022-24939.json create mode 100644 2022/24xxx/CVE-2022-24940.json create mode 100644 2022/24xxx/CVE-2022-24941.json create mode 100644 2022/24xxx/CVE-2022-24942.json create mode 100644 2022/24xxx/CVE-2022-24943.json create mode 100644 2022/24xxx/CVE-2022-24944.json create mode 100644 2022/24xxx/CVE-2022-24945.json create mode 100644 2022/24xxx/CVE-2022-24946.json diff --git a/2021/44xxx/CVE-2021-44969.json b/2021/44xxx/CVE-2021-44969.json index b38ad85e0ff..e40c1196942 100644 --- a/2021/44xxx/CVE-2021-44969.json +++ b/2021/44xxx/CVE-2021-44969.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-44969", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-44969", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Taocms v3.0.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the Management Column component." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/taogogo/taocms/issues/9", + "refsource": "MISC", + "name": "https://github.com/taogogo/taocms/issues/9" } ] } diff --git a/2021/44xxx/CVE-2021-44970.json b/2021/44xxx/CVE-2021-44970.json index d716d322810..6ec8b9c03c5 100644 --- a/2021/44xxx/CVE-2021-44970.json +++ b/2021/44xxx/CVE-2021-44970.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-44970", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-44970", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "MiniCMS v1.11 was discovered to contain a cross-site scripting (XSS) vulnerability via /mc-admin/page-edit.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/bg5sbk/MiniCMS/issues/43", + "refsource": "MISC", + "name": "https://github.com/bg5sbk/MiniCMS/issues/43" } ] } diff --git a/2022/20xxx/CVE-2022-20630.json b/2022/20xxx/CVE-2022-20630.json index f152d492e13..ec2a046a0e2 100644 --- a/2022/20xxx/CVE-2022-20630.json +++ b/2022/20xxx/CVE-2022-20630.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "\r A vulnerability in the audit log of Cisco DNA Center could allow an authenticated, local attacker to view sensitive information in clear text. \r This vulnerability is due to the unsecured logging of sensitive information on an affected system. An attacker with administrative privileges could exploit this vulnerability by accessing the audit logs through the CLI. A successful exploit could allow the attacker to retrieve sensitive information that includes user credentials.\r " + "value": "A vulnerability in the audit log of Cisco DNA Center could allow an authenticated, local attacker to view sensitive information in clear text. This vulnerability is due to the unsecured logging of sensitive information on an affected system. An attacker with administrative privileges could exploit this vulnerability by accessing the audit logs through the CLI. A successful exploit could allow the attacker to retrieve sensitive information that includes user credentials." } ] }, @@ -83,4 +83,4 @@ ], "discovery": "INTERNAL" } -} +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24646.json b/2022/24xxx/CVE-2022-24646.json index e5efb1c0f66..72a13799e18 100644 --- a/2022/24xxx/CVE-2022-24646.json +++ b/2022/24xxx/CVE-2022-24646.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24646", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24646", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hospital Management System v4.0 was discovered to contain a SQL injection vulnerability in /Hospital-Management-System-master/contact.php via the txtMsg parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/kishan0725/Hospital-Management-System/issues/18", + "refsource": "MISC", + "name": "https://github.com/kishan0725/Hospital-Management-System/issues/18" } ] } diff --git a/2022/24xxx/CVE-2022-24647.json b/2022/24xxx/CVE-2022-24647.json index 701fa9ca800..6b68ea74260 100644 --- a/2022/24xxx/CVE-2022-24647.json +++ b/2022/24xxx/CVE-2022-24647.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24647", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24647", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cuppa CMS v1.0 was discovered to contain an arbitrary file deletion vulnerability via the unlink() function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/CuppaCMS/CuppaCMS/issues/23", + "refsource": "MISC", + "name": "https://github.com/CuppaCMS/CuppaCMS/issues/23" } ] } diff --git a/2022/24xxx/CVE-2022-24911.json b/2022/24xxx/CVE-2022-24911.json new file mode 100644 index 00000000000..f7a4788a9b8 --- /dev/null +++ b/2022/24xxx/CVE-2022-24911.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24911", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24936.json b/2022/24xxx/CVE-2022-24936.json new file mode 100644 index 00000000000..19372a4a9a0 --- /dev/null +++ b/2022/24xxx/CVE-2022-24936.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24936", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24937.json b/2022/24xxx/CVE-2022-24937.json new file mode 100644 index 00000000000..976d77e0519 --- /dev/null +++ b/2022/24xxx/CVE-2022-24937.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24937", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24938.json b/2022/24xxx/CVE-2022-24938.json new file mode 100644 index 00000000000..f1b6bcf4209 --- /dev/null +++ b/2022/24xxx/CVE-2022-24938.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24938", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24939.json b/2022/24xxx/CVE-2022-24939.json new file mode 100644 index 00000000000..986722946e0 --- /dev/null +++ b/2022/24xxx/CVE-2022-24939.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24939", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24940.json b/2022/24xxx/CVE-2022-24940.json new file mode 100644 index 00000000000..b8d30efff87 --- /dev/null +++ b/2022/24xxx/CVE-2022-24940.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24940", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24941.json b/2022/24xxx/CVE-2022-24941.json new file mode 100644 index 00000000000..526f408c849 --- /dev/null +++ b/2022/24xxx/CVE-2022-24941.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24941", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24942.json b/2022/24xxx/CVE-2022-24942.json new file mode 100644 index 00000000000..49e694c92bc --- /dev/null +++ b/2022/24xxx/CVE-2022-24942.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24942", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24943.json b/2022/24xxx/CVE-2022-24943.json new file mode 100644 index 00000000000..b6eac050da6 --- /dev/null +++ b/2022/24xxx/CVE-2022-24943.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24943", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24944.json b/2022/24xxx/CVE-2022-24944.json new file mode 100644 index 00000000000..d58082a883f --- /dev/null +++ b/2022/24xxx/CVE-2022-24944.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24944", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24945.json b/2022/24xxx/CVE-2022-24945.json new file mode 100644 index 00000000000..1cceb56b716 --- /dev/null +++ b/2022/24xxx/CVE-2022-24945.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24945", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24946.json b/2022/24xxx/CVE-2022-24946.json new file mode 100644 index 00000000000..e03eacce07b --- /dev/null +++ b/2022/24xxx/CVE-2022-24946.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24946", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file