From 24ae360bd5b30063f9802217114e824a64a03586 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 10 Mar 2022 17:24:47 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2016/5xxx/CVE-2016-5195.json | 5 ++ 2020/14xxx/CVE-2020-14111.json | 50 +++++++++++++++-- 2020/14xxx/CVE-2020-14115.json | 50 +++++++++++++++-- 2021/27xxx/CVE-2021-27035.json | 10 ++++ 2021/27xxx/CVE-2021-27036.json | 30 +++++++++++ 2021/27xxx/CVE-2021-27037.json | 5 ++ 2021/27xxx/CVE-2021-27040.json | 5 ++ 2021/27xxx/CVE-2021-27041.json | 5 ++ 2021/27xxx/CVE-2021-27042.json | 5 ++ 2021/27xxx/CVE-2021-27043.json | 5 ++ 2021/32xxx/CVE-2021-32005.json | 90 ++++++++++++++++++++++++++++--- 2021/32xxx/CVE-2021-32006.json | 98 +++++++++++++++++++++++++++++++--- 2021/3xxx/CVE-2021-3733.json | 70 ++++++++++++++++++++++-- 2021/3xxx/CVE-2021-3739.json | 70 ++++++++++++++++++++++-- 2021/40xxx/CVE-2021-40158.json | 70 ++++++++++++++++++++++++ 2021/40xxx/CVE-2021-40160.json | 5 ++ 2022/0xxx/CVE-2022-0865.json | 84 +++++++++++++++++++++++++++-- 2022/23xxx/CVE-2022-23383.json | 66 ++++++++++++++++++++--- 2022/23xxx/CVE-2022-23852.json | 5 ++ 2022/25xxx/CVE-2022-25236.json | 5 ++ 2022/25xxx/CVE-2022-25313.json | 5 ++ 2022/25xxx/CVE-2022-25315.json | 5 ++ 2022/25xxx/CVE-2022-25922.json | 94 +++++++++++++++++++++++++++++--- 2022/26xxx/CVE-2022-26131.json | 94 +++++++++++++++++++++++++++++--- 2022/26xxx/CVE-2022-26567.json | 18 +++++++ 2022/26xxx/CVE-2022-26568.json | 18 +++++++ 2022/26xxx/CVE-2022-26569.json | 18 +++++++ 2022/26xxx/CVE-2022-26570.json | 18 +++++++ 2022/26xxx/CVE-2022-26571.json | 18 +++++++ 2022/26xxx/CVE-2022-26572.json | 18 +++++++ 2022/26xxx/CVE-2022-26573.json | 18 +++++++ 2022/26xxx/CVE-2022-26574.json | 18 +++++++ 2022/26xxx/CVE-2022-26575.json | 18 +++++++ 2022/26xxx/CVE-2022-26576.json | 18 +++++++ 2022/26xxx/CVE-2022-26577.json | 18 +++++++ 2022/26xxx/CVE-2022-26578.json | 18 +++++++ 2022/26xxx/CVE-2022-26579.json | 18 +++++++ 2022/26xxx/CVE-2022-26580.json | 18 +++++++ 2022/26xxx/CVE-2022-26581.json | 18 +++++++ 2022/26xxx/CVE-2022-26582.json | 18 +++++++ 2022/26xxx/CVE-2022-26583.json | 18 +++++++ 2022/26xxx/CVE-2022-26584.json | 18 +++++++ 2022/26xxx/CVE-2022-26585.json | 18 +++++++ 2022/26xxx/CVE-2022-26586.json | 18 +++++++ 2022/26xxx/CVE-2022-26587.json | 18 +++++++ 2022/26xxx/CVE-2022-26588.json | 18 +++++++ 2022/26xxx/CVE-2022-26589.json | 18 +++++++ 2022/26xxx/CVE-2022-26590.json | 18 +++++++ 2022/26xxx/CVE-2022-26591.json | 18 +++++++ 2022/26xxx/CVE-2022-26592.json | 18 +++++++ 2022/26xxx/CVE-2022-26593.json | 18 +++++++ 2022/26xxx/CVE-2022-26594.json | 18 +++++++ 2022/26xxx/CVE-2022-26595.json | 18 +++++++ 2022/26xxx/CVE-2022-26596.json | 18 +++++++ 2022/26xxx/CVE-2022-26597.json | 18 +++++++ 2022/26xxx/CVE-2022-26598.json | 18 +++++++ 2022/26xxx/CVE-2022-26599.json | 18 +++++++ 2022/26xxx/CVE-2022-26600.json | 18 +++++++ 2022/26xxx/CVE-2022-26601.json | 18 +++++++ 2022/26xxx/CVE-2022-26602.json | 18 +++++++ 2022/26xxx/CVE-2022-26603.json | 18 +++++++ 2022/26xxx/CVE-2022-26604.json | 18 +++++++ 2022/26xxx/CVE-2022-26605.json | 18 +++++++ 2022/26xxx/CVE-2022-26606.json | 18 +++++++ 2022/26xxx/CVE-2022-26607.json | 18 +++++++ 2022/26xxx/CVE-2022-26608.json | 18 +++++++ 2022/26xxx/CVE-2022-26609.json | 18 +++++++ 2022/26xxx/CVE-2022-26610.json | 18 +++++++ 2022/26xxx/CVE-2022-26611.json | 18 +++++++ 2022/26xxx/CVE-2022-26613.json | 18 +++++++ 2022/26xxx/CVE-2022-26614.json | 18 +++++++ 2022/26xxx/CVE-2022-26615.json | 18 +++++++ 2022/26xxx/CVE-2022-26616.json | 18 +++++++ 2022/26xxx/CVE-2022-26617.json | 18 +++++++ 74 files changed, 1783 insertions(+), 48 deletions(-) create mode 100644 2022/26xxx/CVE-2022-26567.json create mode 100644 2022/26xxx/CVE-2022-26568.json create mode 100644 2022/26xxx/CVE-2022-26569.json create mode 100644 2022/26xxx/CVE-2022-26570.json create mode 100644 2022/26xxx/CVE-2022-26571.json create mode 100644 2022/26xxx/CVE-2022-26572.json create mode 100644 2022/26xxx/CVE-2022-26573.json create mode 100644 2022/26xxx/CVE-2022-26574.json create mode 100644 2022/26xxx/CVE-2022-26575.json create mode 100644 2022/26xxx/CVE-2022-26576.json create mode 100644 2022/26xxx/CVE-2022-26577.json create mode 100644 2022/26xxx/CVE-2022-26578.json create mode 100644 2022/26xxx/CVE-2022-26579.json create mode 100644 2022/26xxx/CVE-2022-26580.json create mode 100644 2022/26xxx/CVE-2022-26581.json create mode 100644 2022/26xxx/CVE-2022-26582.json create mode 100644 2022/26xxx/CVE-2022-26583.json create mode 100644 2022/26xxx/CVE-2022-26584.json create mode 100644 2022/26xxx/CVE-2022-26585.json create mode 100644 2022/26xxx/CVE-2022-26586.json create mode 100644 2022/26xxx/CVE-2022-26587.json create mode 100644 2022/26xxx/CVE-2022-26588.json create mode 100644 2022/26xxx/CVE-2022-26589.json create mode 100644 2022/26xxx/CVE-2022-26590.json create mode 100644 2022/26xxx/CVE-2022-26591.json create mode 100644 2022/26xxx/CVE-2022-26592.json create mode 100644 2022/26xxx/CVE-2022-26593.json create mode 100644 2022/26xxx/CVE-2022-26594.json create mode 100644 2022/26xxx/CVE-2022-26595.json create mode 100644 2022/26xxx/CVE-2022-26596.json create mode 100644 2022/26xxx/CVE-2022-26597.json create mode 100644 2022/26xxx/CVE-2022-26598.json create mode 100644 2022/26xxx/CVE-2022-26599.json create mode 100644 2022/26xxx/CVE-2022-26600.json create mode 100644 2022/26xxx/CVE-2022-26601.json create mode 100644 2022/26xxx/CVE-2022-26602.json create mode 100644 2022/26xxx/CVE-2022-26603.json create mode 100644 2022/26xxx/CVE-2022-26604.json create mode 100644 2022/26xxx/CVE-2022-26605.json create mode 100644 2022/26xxx/CVE-2022-26606.json create mode 100644 2022/26xxx/CVE-2022-26607.json create mode 100644 2022/26xxx/CVE-2022-26608.json create mode 100644 2022/26xxx/CVE-2022-26609.json create mode 100644 2022/26xxx/CVE-2022-26610.json create mode 100644 2022/26xxx/CVE-2022-26611.json create mode 100644 2022/26xxx/CVE-2022-26613.json create mode 100644 2022/26xxx/CVE-2022-26614.json create mode 100644 2022/26xxx/CVE-2022-26615.json create mode 100644 2022/26xxx/CVE-2022-26616.json create mode 100644 2022/26xxx/CVE-2022-26617.json diff --git a/2016/5xxx/CVE-2016-5195.json b/2016/5xxx/CVE-2016-5195.json index 24f23b4fbef..310e53a92c1 100644 --- a/2016/5xxx/CVE-2016-5195.json +++ b/2016/5xxx/CVE-2016-5195.json @@ -646,6 +646,11 @@ "refsource": "MISC", "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files", + "url": "http://www.openwall.com/lists/oss-security/2022/03/07/1" } ] } diff --git a/2020/14xxx/CVE-2020-14111.json b/2020/14xxx/CVE-2020-14111.json index 175383770ca..c3f4cd957cd 100644 --- a/2020/14xxx/CVE-2020-14111.json +++ b/2020/14xxx/CVE-2020-14111.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-14111", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@xiaomi.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Xiaomi Router Router AX3600", + "version": { + "version_data": [ + { + "version_value": "Xiaomi Router AX3600 version <1.1.15" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=18", + "url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=18" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A command injection vulnerability exists in the Xiaomi Router AX3600. The vulnerability is caused by a lack of inspection for incoming data detection. Attackers can exploit this vulnerability to execute code." } ] } diff --git a/2020/14xxx/CVE-2020-14115.json b/2020/14xxx/CVE-2020-14115.json index dbaa500ca56..2cbbdfae97a 100644 --- a/2020/14xxx/CVE-2020-14115.json +++ b/2020/14xxx/CVE-2020-14115.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-14115", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@xiaomi.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Xiaomi Router AX3600", + "version": { + "version_data": [ + { + "version_value": "Xiaomi Router AX3600 version < 1.0.67" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=37", + "url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=37" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A command injection vulnerability exists in the Xiaomi Router AX3600. The vulnerability is caused by a lack of inspection for incoming data detection. Attackers can exploit this vulnerability to execute code." } ] } diff --git a/2021/27xxx/CVE-2021-27035.json b/2021/27xxx/CVE-2021-27035.json index bdf322ef44b..47c886a8f5b 100644 --- a/2021/27xxx/CVE-2021-27035.json +++ b/2021/27xxx/CVE-2021-27035.json @@ -83,6 +83,16 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1134/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1134/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-481/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-481/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-480/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-480/" } ] }, diff --git a/2021/27xxx/CVE-2021-27036.json b/2021/27xxx/CVE-2021-27036.json index 83cf4bec9ca..385f1625dd8 100644 --- a/2021/27xxx/CVE-2021-27036.json +++ b/2021/27xxx/CVE-2021-27036.json @@ -68,6 +68,36 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1141/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1141/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-457/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-457/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-479/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-479/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-456/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-456/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-482/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-482/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-458/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-458/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-462/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-462/" } ] }, diff --git a/2021/27xxx/CVE-2021-27037.json b/2021/27xxx/CVE-2021-27037.json index 6c6accf80a9..e287caaabc0 100644 --- a/2021/27xxx/CVE-2021-27037.json +++ b/2021/27xxx/CVE-2021-27037.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-459/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-459/" } ] }, diff --git a/2021/27xxx/CVE-2021-27040.json b/2021/27xxx/CVE-2021-27040.json index 5bf5a73f003..392c7c1c111 100644 --- a/2021/27xxx/CVE-2021-27040.json +++ b/2021/27xxx/CVE-2021-27040.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-378/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-378/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-473/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-473/" } ] }, diff --git a/2021/27xxx/CVE-2021-27041.json b/2021/27xxx/CVE-2021-27041.json index 5effaa677c3..62cde91e89e 100644 --- a/2021/27xxx/CVE-2021-27041.json +++ b/2021/27xxx/CVE-2021-27041.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1237/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1237/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-478/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-478/" } ] }, diff --git a/2021/27xxx/CVE-2021-27042.json b/2021/27xxx/CVE-2021-27042.json index 5691dca4fae..e65cafd4889 100644 --- a/2021/27xxx/CVE-2021-27042.json +++ b/2021/27xxx/CVE-2021-27042.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-446/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-446/" } ] }, diff --git a/2021/27xxx/CVE-2021-27043.json b/2021/27xxx/CVE-2021-27043.json index 04665efcae3..4b9f4052242 100644 --- a/2021/27xxx/CVE-2021-27043.json +++ b/2021/27xxx/CVE-2021-27043.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-470/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-470/" } ] }, diff --git a/2021/32xxx/CVE-2021-32005.json b/2021/32xxx/CVE-2021-32005.json index ffd2fece8a7..6480cf676f6 100644 --- a/2021/32xxx/CVE-2021-32005.json +++ b/2021/32xxx/CVE-2021-32005.json @@ -1,18 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "VulnerabilityReporting@secomea.com", "ID": "CVE-2021-32005", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "SiteManager Log View XSS Issue" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SiteManager", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "All", + "version_value": "9.6.621421014" + } + ] + } + } + ] + }, + "vendor_name": "Secomea" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Schlumberger" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site Scripting (XSS) vulnerability in log view of Secomea SiteManager allows a logged in user to store javascript for later execution. This issue affects: Secomea SiteManager Version 9.6.621421014 and all prior versions." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.secomea.com/support/cybersecurity-advisory/#5017", + "name": "https://www.secomea.com/support/cybersecurity-advisory/#5017" + } + ] + }, + "source": { + "defect": [ + "RD-5017" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32006.json b/2021/32xxx/CVE-2021-32006.json index 42d318956a3..9d6a9238db8 100644 --- a/2021/32xxx/CVE-2021-32006.json +++ b/2021/32xxx/CVE-2021-32006.json @@ -1,18 +1,104 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "VulnerabilityReporting@secomea.com", "ID": "CVE-2021-32006", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "GateManager information leak for LinkManager Users" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GateManager", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "All", + "version_value": "9.6.621421014" + } + ] + } + } + ] + }, + "vendor_name": "Secomea" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Schlumberger" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This issue affects: Secomea GateManager Version 9.6.621421014 and all prior versions. Permission Issues vulnerability in LinkManager web portal of Secomea GateManager allows logged in LinkManager user to access stored SiteManager backup files." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-275 Permission Issues" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-274 Improper Handling of Insufficient Privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.secomea.com/support/cybersecurity-advisory/", + "name": "https://www.secomea.com/support/cybersecurity-advisory/" + } + ] + }, + "source": { + "defect": [ + "RD-5018" + ], + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3733.json b/2021/3xxx/CVE-2021-3733.json index 26de1dda3a2..852a0f36ce8 100644 --- a/2021/3xxx/CVE-2021-3733.json +++ b/2021/3xxx/CVE-2021-3733.json @@ -4,14 +4,78 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3733", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "python", + "version": { + "version_data": [ + { + "version_value": "Fixed in python v3.6.14, python v3.7.11, python v3.8.10, python v3.9.5." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400 - Uncontrolled Resource Consumption" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugs.python.org/issue43075", + "url": "https://bugs.python.org/issue43075" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1995234", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995234" + }, + { + "refsource": "MISC", + "name": "https://github.com/python/cpython/pull/24391", + "url": "https://github.com/python/cpython/pull/24391" + }, + { + "refsource": "MISC", + "name": "https://ubuntu.com/security/CVE-2021-3733", + "url": "https://ubuntu.com/security/CVE-2021-3733" + }, + { + "refsource": "MISC", + "name": "https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb", + "url": "https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability." } ] } diff --git a/2021/3xxx/CVE-2021-3739.json b/2021/3xxx/CVE-2021-3739.json index 681c4eed742..44e9edafffe 100644 --- a/2021/3xxx/CVE-2021-3739.json +++ b/2021/3xxx/CVE-2021-3739.json @@ -4,14 +4,78 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-3739", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "kernel", + "version": { + "version_data": [ + { + "version_value": "Fixed in v5.15-rc1 and above." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476 - NULL Pointer Dereference" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1997958", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997958" + }, + { + "refsource": "MISC", + "name": "https://ubuntu.com/security/CVE-2021-3739", + "url": "https://ubuntu.com/security/CVE-2021-3739" + }, + { + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2021/08/25/3", + "url": "https://www.openwall.com/lists/oss-security/2021/08/25/3" + }, + { + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091", + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091" + }, + { + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091", + "url": "https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires \u2018CAP_SYS_ADMIN\u2019. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system availability." } ] } diff --git a/2021/40xxx/CVE-2021-40158.json b/2021/40xxx/CVE-2021-40158.json index 6bdadcd1d37..8b3f1e5d8ef 100644 --- a/2021/40xxx/CVE-2021-40158.json +++ b/2021/40xxx/CVE-2021-40158.json @@ -83,6 +83,76 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-281/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-281/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-449/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-449/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-441/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-441/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-453/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-453/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-444/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-444/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-447/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-447/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-448/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-448/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-452/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-452/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-445/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-445/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-466/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-466/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-451/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-451/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-454/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-454/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-443/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-443/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-450/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-450/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-455/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-455/" } ] }, diff --git a/2021/40xxx/CVE-2021-40160.json b/2021/40xxx/CVE-2021-40160.json index 1b2e55c8642..c64071ecf75 100644 --- a/2021/40xxx/CVE-2021-40160.json +++ b/2021/40xxx/CVE-2021-40160.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-474/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-474/" } ] }, diff --git a/2022/0xxx/CVE-2022-0865.json b/2022/0xxx/CVE-2022-0865.json index 893bcdbc250..a47c570c4ab 100644 --- a/2022/0xxx/CVE-2022-0865.json +++ b/2022/0xxx/CVE-2022-0865.json @@ -4,15 +4,91 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-0865", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "libtiff", + "product": { + "product_data": [ + { + "product_name": "libtiff", + "version": { + "version_data": [ + { + "version_value": "=4.3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Reachable assertion in libtiff" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://gitlab.com/libtiff/libtiff/-/issues/385", + "url": "https://gitlab.com/libtiff/libtiff/-/issues/385", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/306", + "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/306", + "refsource": "MISC" + }, + { + "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json", + "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json", + "refsource": "CONFIRM" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Reachable Assertion in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 5e180045." } ] - } + }, + "impact": { + "cvss": { + "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "version": "3.1", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + } + }, + "credit": [ + { + "lang": "eng", + "value": "wangdw.augustus@gmail.com" + } + ] } \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23383.json b/2022/23xxx/CVE-2022-23383.json index 92281df8807..31d2395390c 100644 --- a/2022/23xxx/CVE-2022-23383.json +++ b/2022/23xxx/CVE-2022-23383.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-23383", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-23383", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "YzmCMS v6.3 is affected by broken access control. Without login, unauthorized access to the user's personal home page can be realized. It is necessary to judge the user's login status before accessing the personal home page, but the vulnerability can access other users' home pages through the non login status because real authentication is not carried out." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://yzmcms.com", + "refsource": "MISC", + "name": "http://yzmcms.com" + }, + { + "url": "https://down.chinaz.com/soft/37810.htm", + "refsource": "MISC", + "name": "https://down.chinaz.com/soft/37810.htm" + }, + { + "refsource": "MISC", + "name": "https://www.cnvd.org.cn/user/myreport/6499961", + "url": "https://www.cnvd.org.cn/user/myreport/6499961" } ] } diff --git a/2022/23xxx/CVE-2022-23852.json b/2022/23xxx/CVE-2022-23852.json index 3e3d04a337c..8c51caf4d5a 100644 --- a/2022/23xxx/CVE-2022-23852.json +++ b/2022/23xxx/CVE-2022-23852.json @@ -71,6 +71,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220217-0001/", "url": "https://security.netapp.com/advisory/ntap-20220217-0001/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html" } ] } diff --git a/2022/25xxx/CVE-2022-25236.json b/2022/25xxx/CVE-2022-25236.json index fcc3e49f011..42170449d99 100644 --- a/2022/25xxx/CVE-2022-25236.json +++ b/2022/25xxx/CVE-2022-25236.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220303-0008/", "url": "https://security.netapp.com/advisory/ntap-20220303-0008/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html" } ] } diff --git a/2022/25xxx/CVE-2022-25313.json b/2022/25xxx/CVE-2022-25313.json index 88f99ffc7c9..49e6869b92f 100644 --- a/2022/25xxx/CVE-2022-25313.json +++ b/2022/25xxx/CVE-2022-25313.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220303-0008/", "url": "https://security.netapp.com/advisory/ntap-20220303-0008/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html" } ] } diff --git a/2022/25xxx/CVE-2022-25315.json b/2022/25xxx/CVE-2022-25315.json index 731fb80cf15..298287e61a9 100644 --- a/2022/25xxx/CVE-2022-25315.json +++ b/2022/25xxx/CVE-2022-25315.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220303-0008/", "url": "https://security.netapp.com/advisory/ntap-20220303-0008/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html" } ] } diff --git a/2022/25xxx/CVE-2022-25922.json b/2022/25xxx/CVE-2022-25922.json index f409a6c065f..a4af03c9378 100644 --- a/2022/25xxx/CVE-2022-25922.json +++ b/2022/25xxx/CVE-2022-25922.json @@ -1,18 +1,98 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2022-25922", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "ICSA-22-063-01 Missing Authentication for Critical Function in Trailer Power Line Communications (PLC) J2497" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "PLC4TRUCKS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "J2497 " + } + ] + } + } + ] + }, + "vendor_name": "Power Line Communications" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "National Motor Freight Traffic Association, Inc. (NMFTA) researcher Ben Gardiner, NMFTA motor freight carrier members, and Assured Information Security researchers Chris Poore, Dan Salloum, and Eric Thayer reported this vulnerability to CISA." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Power Line Communications PLC4TRUCKS J2497 trailer brake controllers implement diagnostic functions which can be invoked by replaying J2497 messages. There is no authentication or authorization for these functions." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "PHYSICAL", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-306" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-063-01", + "refsource": "CONFIRM", + "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-063-01" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + }, + "work_around": [ + { + "lang": "eng", + "value": "The vulnerable technology, J2497, has been fielded since 2001 and the service lifetime of trailers is 15 to 30 years. For new equipment, the industry should consider dropping all J2497 features except for backwards-compatibility with LAMP ON detection only. For trailer equipment this means migrating all diagnostics to whatever newer trailer buses are established as the norm. For tractor equipment this means removing support for reception of any J2497 message other than LAMP messages and protecting the backwards-compatible trailers from attack. \n\nNMFTA has published detailed information about how to mitigate these issues in the following ways:\nInstall a LAMP ON firewall for each ECU\nUse a LAMP detect circuit LAMP ON sender with each trailer\nChange addresses dynamically on each tractor in response to detecting a transmitter on its current address. \nInstall RF chokes on each trailer between chassis ground and wiring ground\nLoad with LAMP keyhole signal on each tractor\nFlood with jamming signal on each tractor\nPlease see the publication from the NMFTA for additional details on these and other solutions." + } + ] } \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26131.json b/2022/26xxx/CVE-2022-26131.json index 4ea0818a2a9..3d3751a57db 100644 --- a/2022/26xxx/CVE-2022-26131.json +++ b/2022/26xxx/CVE-2022-26131.json @@ -1,18 +1,98 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2022-26131", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "ICSA-22-063-01 Improper Protection against Electromagnetic Fault Injection in Trailer Power Line Communications (PLC) J2497" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "PLC4TRUCKS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "J2497 " + } + ] + } + } + ] + }, + "vendor_name": "Power Line Communications" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "National Motor Freight Traffic Association, Inc. (NMFTA) researcher Ben Gardiner, NMFTA motor freight carrier members, and Assured Information Security researchers Chris Poore, Dan Salloum, and Eric Thayer reported this vulnerability to CISA." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Power Line Communications PLC4TRUCKS J2497 trailer receivers are susceptible to remote RF induced signals." } ] - } + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1319" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-063-01", + "refsource": "CONFIRM", + "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-063-01" + } + ] + }, + "source": { + "discovery": "UNKNOWN" + }, + "work_around": [ + { + "lang": "eng", + "value": "The vulnerable technology, J2497, has been fielded since 2001 and the service lifetime of trailers is 15 to 30 years. For new equipment, the industry should consider dropping all J2497 features except for backwards-compatibility with LAMP ON detection only. For trailer equipment this means migrating all diagnostics to whatever newer trailer buses are established as the norm. For tractor equipment this means removing support for reception of any J2497 message other than LAMP messages and protecting the backwards-compatible trailers from attack. \n\nNMFTA has published detailed information about how to mitigate these issues in the following ways:\nInstall a LAMP ON firewall for each ECU\nUse a LAMP detect circuit LAMP ON sender with each trailer\nChange addresses dynamically on each tractor in response to detecting a transmitter on its current address. \nInstall RF chokes on each trailer between chassis ground and wiring ground\nLoad with LAMP keyhole signal on each tractor\nFlood with jamming signal on each tractor\nPlease see the publication from the NMFTA for additional details on these and other solutions." + } + ] } \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26567.json b/2022/26xxx/CVE-2022-26567.json new file mode 100644 index 00000000000..050eb68c5df --- /dev/null +++ b/2022/26xxx/CVE-2022-26567.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26567", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26568.json b/2022/26xxx/CVE-2022-26568.json new file mode 100644 index 00000000000..721a1fdc823 --- /dev/null +++ b/2022/26xxx/CVE-2022-26568.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26568", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26569.json b/2022/26xxx/CVE-2022-26569.json new file mode 100644 index 00000000000..86b38d5ae39 --- /dev/null +++ b/2022/26xxx/CVE-2022-26569.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26569", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26570.json b/2022/26xxx/CVE-2022-26570.json new file mode 100644 index 00000000000..afd564f2c3d --- /dev/null +++ b/2022/26xxx/CVE-2022-26570.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26570", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26571.json b/2022/26xxx/CVE-2022-26571.json new file mode 100644 index 00000000000..8cc06eed5b2 --- /dev/null +++ b/2022/26xxx/CVE-2022-26571.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26571", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26572.json b/2022/26xxx/CVE-2022-26572.json new file mode 100644 index 00000000000..12e585885ff --- /dev/null +++ b/2022/26xxx/CVE-2022-26572.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26572", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26573.json b/2022/26xxx/CVE-2022-26573.json new file mode 100644 index 00000000000..60a8171ab8c --- /dev/null +++ b/2022/26xxx/CVE-2022-26573.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26573", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26574.json b/2022/26xxx/CVE-2022-26574.json new file mode 100644 index 00000000000..fc26400f47c --- /dev/null +++ b/2022/26xxx/CVE-2022-26574.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26574", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26575.json b/2022/26xxx/CVE-2022-26575.json new file mode 100644 index 00000000000..e33a1496c78 --- /dev/null +++ b/2022/26xxx/CVE-2022-26575.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26575", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26576.json b/2022/26xxx/CVE-2022-26576.json new file mode 100644 index 00000000000..05d0c58043c --- /dev/null +++ b/2022/26xxx/CVE-2022-26576.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26576", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26577.json b/2022/26xxx/CVE-2022-26577.json new file mode 100644 index 00000000000..608ed721fb3 --- /dev/null +++ b/2022/26xxx/CVE-2022-26577.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26577", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26578.json b/2022/26xxx/CVE-2022-26578.json new file mode 100644 index 00000000000..28e65c9634c --- /dev/null +++ b/2022/26xxx/CVE-2022-26578.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26578", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26579.json b/2022/26xxx/CVE-2022-26579.json new file mode 100644 index 00000000000..aa7c34d16c5 --- /dev/null +++ b/2022/26xxx/CVE-2022-26579.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26579", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26580.json b/2022/26xxx/CVE-2022-26580.json new file mode 100644 index 00000000000..c0d44a0927d --- /dev/null +++ b/2022/26xxx/CVE-2022-26580.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26580", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26581.json b/2022/26xxx/CVE-2022-26581.json new file mode 100644 index 00000000000..a6b62d52853 --- /dev/null +++ b/2022/26xxx/CVE-2022-26581.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26581", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26582.json b/2022/26xxx/CVE-2022-26582.json new file mode 100644 index 00000000000..c86e44b4e0f --- /dev/null +++ b/2022/26xxx/CVE-2022-26582.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26582", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26583.json b/2022/26xxx/CVE-2022-26583.json new file mode 100644 index 00000000000..2c530975cf0 --- /dev/null +++ b/2022/26xxx/CVE-2022-26583.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26583", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26584.json b/2022/26xxx/CVE-2022-26584.json new file mode 100644 index 00000000000..4bfac20fa02 --- /dev/null +++ b/2022/26xxx/CVE-2022-26584.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26584", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26585.json b/2022/26xxx/CVE-2022-26585.json new file mode 100644 index 00000000000..8ec39134219 --- /dev/null +++ b/2022/26xxx/CVE-2022-26585.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26585", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26586.json b/2022/26xxx/CVE-2022-26586.json new file mode 100644 index 00000000000..694f660934f --- /dev/null +++ b/2022/26xxx/CVE-2022-26586.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26586", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26587.json b/2022/26xxx/CVE-2022-26587.json new file mode 100644 index 00000000000..dd8b5a0eadf --- /dev/null +++ b/2022/26xxx/CVE-2022-26587.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26587", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26588.json b/2022/26xxx/CVE-2022-26588.json new file mode 100644 index 00000000000..3965c1c170b --- /dev/null +++ b/2022/26xxx/CVE-2022-26588.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26588", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26589.json b/2022/26xxx/CVE-2022-26589.json new file mode 100644 index 00000000000..97b183ae33f --- /dev/null +++ b/2022/26xxx/CVE-2022-26589.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26589", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26590.json b/2022/26xxx/CVE-2022-26590.json new file mode 100644 index 00000000000..816816c3a50 --- /dev/null +++ b/2022/26xxx/CVE-2022-26590.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26590", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26591.json b/2022/26xxx/CVE-2022-26591.json new file mode 100644 index 00000000000..5842e625b00 --- /dev/null +++ b/2022/26xxx/CVE-2022-26591.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26591", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26592.json b/2022/26xxx/CVE-2022-26592.json new file mode 100644 index 00000000000..10a53bdc523 --- /dev/null +++ b/2022/26xxx/CVE-2022-26592.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26592", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26593.json b/2022/26xxx/CVE-2022-26593.json new file mode 100644 index 00000000000..ec4160d8b2e --- /dev/null +++ b/2022/26xxx/CVE-2022-26593.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26593", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26594.json b/2022/26xxx/CVE-2022-26594.json new file mode 100644 index 00000000000..855847cca0c --- /dev/null +++ b/2022/26xxx/CVE-2022-26594.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26594", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26595.json b/2022/26xxx/CVE-2022-26595.json new file mode 100644 index 00000000000..cbf7c2225a5 --- /dev/null +++ b/2022/26xxx/CVE-2022-26595.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26595", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26596.json b/2022/26xxx/CVE-2022-26596.json new file mode 100644 index 00000000000..ae29024c8ae --- /dev/null +++ b/2022/26xxx/CVE-2022-26596.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26596", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26597.json b/2022/26xxx/CVE-2022-26597.json new file mode 100644 index 00000000000..f5d09382325 --- /dev/null +++ b/2022/26xxx/CVE-2022-26597.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26597", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26598.json b/2022/26xxx/CVE-2022-26598.json new file mode 100644 index 00000000000..fe4a2917383 --- /dev/null +++ b/2022/26xxx/CVE-2022-26598.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26598", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26599.json b/2022/26xxx/CVE-2022-26599.json new file mode 100644 index 00000000000..964904034b7 --- /dev/null +++ b/2022/26xxx/CVE-2022-26599.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26599", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26600.json b/2022/26xxx/CVE-2022-26600.json new file mode 100644 index 00000000000..bb6dff7c629 --- /dev/null +++ b/2022/26xxx/CVE-2022-26600.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26600", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26601.json b/2022/26xxx/CVE-2022-26601.json new file mode 100644 index 00000000000..b3692a98277 --- /dev/null +++ b/2022/26xxx/CVE-2022-26601.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26601", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26602.json b/2022/26xxx/CVE-2022-26602.json new file mode 100644 index 00000000000..97e770e3cc9 --- /dev/null +++ b/2022/26xxx/CVE-2022-26602.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26602", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26603.json b/2022/26xxx/CVE-2022-26603.json new file mode 100644 index 00000000000..9e18e361e15 --- /dev/null +++ b/2022/26xxx/CVE-2022-26603.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26603", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26604.json b/2022/26xxx/CVE-2022-26604.json new file mode 100644 index 00000000000..d07d58f30ee --- /dev/null +++ b/2022/26xxx/CVE-2022-26604.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26604", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26605.json b/2022/26xxx/CVE-2022-26605.json new file mode 100644 index 00000000000..11f7181ce57 --- /dev/null +++ b/2022/26xxx/CVE-2022-26605.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26605", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26606.json b/2022/26xxx/CVE-2022-26606.json new file mode 100644 index 00000000000..a0d7604039f --- /dev/null +++ b/2022/26xxx/CVE-2022-26606.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26606", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26607.json b/2022/26xxx/CVE-2022-26607.json new file mode 100644 index 00000000000..88b4b522ca1 --- /dev/null +++ b/2022/26xxx/CVE-2022-26607.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26607", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26608.json b/2022/26xxx/CVE-2022-26608.json new file mode 100644 index 00000000000..e32aaae3b8f --- /dev/null +++ b/2022/26xxx/CVE-2022-26608.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26608", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26609.json b/2022/26xxx/CVE-2022-26609.json new file mode 100644 index 00000000000..c3ab45cd377 --- /dev/null +++ b/2022/26xxx/CVE-2022-26609.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26609", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26610.json b/2022/26xxx/CVE-2022-26610.json new file mode 100644 index 00000000000..0066eb0553b --- /dev/null +++ b/2022/26xxx/CVE-2022-26610.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26610", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26611.json b/2022/26xxx/CVE-2022-26611.json new file mode 100644 index 00000000000..57a033ec376 --- /dev/null +++ b/2022/26xxx/CVE-2022-26611.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26611", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26613.json b/2022/26xxx/CVE-2022-26613.json new file mode 100644 index 00000000000..02d5672f636 --- /dev/null +++ b/2022/26xxx/CVE-2022-26613.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26613", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26614.json b/2022/26xxx/CVE-2022-26614.json new file mode 100644 index 00000000000..a15a2061355 --- /dev/null +++ b/2022/26xxx/CVE-2022-26614.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26614", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26615.json b/2022/26xxx/CVE-2022-26615.json new file mode 100644 index 00000000000..f54777618bf --- /dev/null +++ b/2022/26xxx/CVE-2022-26615.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26615", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26616.json b/2022/26xxx/CVE-2022-26616.json new file mode 100644 index 00000000000..9fcf73784ee --- /dev/null +++ b/2022/26xxx/CVE-2022-26616.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26616", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26617.json b/2022/26xxx/CVE-2022-26617.json new file mode 100644 index 00000000000..7adf0f442e5 --- /dev/null +++ b/2022/26xxx/CVE-2022-26617.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26617", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file