diff --git a/2021/44xxx/CVE-2021-44425.json b/2021/44xxx/CVE-2021-44425.json index b491442277f..4b440bc2e84 100644 --- a/2021/44xxx/CVE-2021-44425.json +++ b/2021/44xxx/CVE-2021-44425.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-44425", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-44425", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in AnyDesk before 6.2.6 and 6.3.x before 6.3.3. An unnecessarily open listening port on a machine in the LAN of an attacker, opened by the Anydesk Windows client when using the tunneling feature, allows the attacker unauthorized access to the local machine's AnyDesk tunneling protocol stack (and also to any remote destination machine software that is listening to the AnyDesk tunneled port)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://anydesk.com/en/downloads/windows", + "refsource": "MISC", + "name": "https://anydesk.com/en/downloads/windows" + }, + { + "refsource": "MISC", + "name": "https://argus-sec.com/discovering-tunneling-service-security-flaws-in-anydesk-remote-application/", + "url": "https://argus-sec.com/discovering-tunneling-service-security-flaws-in-anydesk-remote-application/" } ] } diff --git a/2021/44xxx/CVE-2021-44426.json b/2021/44xxx/CVE-2021-44426.json index ffbba6c0ed8..8bdf7892978 100644 --- a/2021/44xxx/CVE-2021-44426.json +++ b/2021/44xxx/CVE-2021-44426.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-44426", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-44426", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in AnyDesk before 6.2.6 and 6.3.x before 6.3.5. An upload of an arbitrary file to a victim's local ~/Downloads/ directory is possible if the victim is using the AnyDesk Windows client to connect to a remote machine, if an attacker is also connected remotely with AnyDesk to the same remote machine. The upload is done without any approval or action taken by the victim." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://anydesk.com/en/downloads/windows", + "refsource": "MISC", + "name": "https://anydesk.com/en/downloads/windows" + }, + { + "refsource": "MISC", + "name": "https://argus-sec.com/discovering-tunneling-service-security-flaws-in-anydesk-remote-application/", + "url": "https://argus-sec.com/discovering-tunneling-service-security-flaws-in-anydesk-remote-application/" } ] } diff --git a/2022/29xxx/CVE-2022-29549.json b/2022/29xxx/CVE-2022-29549.json index 849ac737261..0fd851a39b6 100644 --- a/2022/29xxx/CVE-2022-29549.json +++ b/2022/29xxx/CVE-2022-29549.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://blog.qualys.com/product-tech/2022/08/15/qualys-security-updates-cloud-agent-for-linux", "url": "https://blog.qualys.com/product-tech/2022/08/15/qualys-security-updates-cloud-agent-for-linux" + }, + { + "refsource": "FULLDISC", + "name": "20220912 Multiple vulnerabilities discovered in Qualys Cloud Agent", + "url": "http://seclists.org/fulldisclosure/2022/Sep/10" } ] } diff --git a/2022/29xxx/CVE-2022-29550.json b/2022/29xxx/CVE-2022-29550.json index 2b61cc8d363..b3dd9b0aa5f 100644 --- a/2022/29xxx/CVE-2022-29550.json +++ b/2022/29xxx/CVE-2022-29550.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://blog.qualys.com/product-tech/2022/08/15/qualys-security-updates-cloud-agent-for-linux", "url": "https://blog.qualys.com/product-tech/2022/08/15/qualys-security-updates-cloud-agent-for-linux" + }, + { + "refsource": "FULLDISC", + "name": "20220912 Multiple vulnerabilities discovered in Qualys Cloud Agent", + "url": "http://seclists.org/fulldisclosure/2022/Sep/10" } ] } diff --git a/2022/36xxx/CVE-2022-36101.json b/2022/36xxx/CVE-2022-36101.json index 00a6f5bf1e2..8b6fc090f46 100644 --- a/2022/36xxx/CVE-2022-36101.json +++ b/2022/36xxx/CVE-2022-36101.json @@ -69,6 +69,11 @@ }, "references": { "reference_data": [ + { + "name": "https://packagist.org/packages/shopware/shopware", + "refsource": "MISC", + "url": "https://packagist.org/packages/shopware/shopware" + }, { "name": "https://github.com/shopware/shopware/security/advisories/GHSA-6vfq-jmxg-g58r", "refsource": "CONFIRM", @@ -83,11 +88,6 @@ "name": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022", "refsource": "MISC", "url": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022" - }, - { - "name": "https://packagist.org/packages/shopware/shopware", - "refsource": "MISC", - "url": "https://packagist.org/packages/shopware/shopware" } ] }, diff --git a/2022/36xxx/CVE-2022-36102.json b/2022/36xxx/CVE-2022-36102.json index 5fda16326f9..8dd7ad988ab 100644 --- a/2022/36xxx/CVE-2022-36102.json +++ b/2022/36xxx/CVE-2022-36102.json @@ -69,6 +69,16 @@ }, "references": { "reference_data": [ + { + "name": "https://packagist.org/packages/shopware/shopware", + "refsource": "MISC", + "url": "https://packagist.org/packages/shopware/shopware" + }, + { + "name": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022", + "refsource": "MISC", + "url": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022" + }, { "name": "https://github.com/shopware/shopware/security/advisories/GHSA-qc43-pgwq-3q2q", "refsource": "CONFIRM", @@ -78,16 +88,6 @@ "name": "https://github.com/shopware/shopware/commit/de92d3a78279119a5bbe203054f8fa1d25126af6", "refsource": "MISC", "url": "https://github.com/shopware/shopware/commit/de92d3a78279119a5bbe203054f8fa1d25126af6" - }, - { - "name": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022", - "refsource": "MISC", - "url": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022" - }, - { - "name": "https://packagist.org/packages/shopware/shopware", - "refsource": "MISC", - "url": "https://packagist.org/packages/shopware/shopware" } ] }, diff --git a/2022/36xxx/CVE-2022-36173.json b/2022/36xxx/CVE-2022-36173.json index 62b1435ed72..3d6989f8578 100644 --- a/2022/36xxx/CVE-2022-36173.json +++ b/2022/36xxx/CVE-2022-36173.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-36173", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-36173", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FreshService macOS Agent < 4.4.0 and FreshServce Linux Agent < 3.4.0 are vulnerable to TLS Man-in-The-Middle via the FreshAgent client and scheduled update service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://community.freshworks.com/product-updates/freshservice-release-notes-april-2022-23982#Security+updates:+Discovery+Probe+and+Discovery+Agent", + "refsource": "MISC", + "name": "https://community.freshworks.com/product-updates/freshservice-release-notes-april-2022-23982#Security+updates:+Discovery+Probe+and+Discovery+Agent" + }, + { + "url": "https://public-exposure.inform.social/post/integrity-checking/", + "refsource": "MISC", + "name": "https://public-exposure.inform.social/post/integrity-checking/" } ] } diff --git a/2022/36xxx/CVE-2022-36174.json b/2022/36xxx/CVE-2022-36174.json index 2588ceece18..ab7bb2fac3f 100644 --- a/2022/36xxx/CVE-2022-36174.json +++ b/2022/36xxx/CVE-2022-36174.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-36174", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-36174", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FreshService Windows Agent < 2.11.0 and FreshService macOS Agent < 4.2.0 and FreshService Linux Agent < 3.3.0. are vulnerable to Broken integrity checking via the FreshAgent client and scheduled update service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://community.freshworks.com/product-updates/freshservice-release-notes-april-2022-23982#Security+updates:+Discovery+Probe+and+Discovery+Agent", + "refsource": "MISC", + "name": "https://community.freshworks.com/product-updates/freshservice-release-notes-april-2022-23982#Security+updates:+Discovery+Probe+and+Discovery+Agent" + }, + { + "url": "https://public-exposure.inform.social/post/integrity-checking/", + "refsource": "MISC", + "name": "https://public-exposure.inform.social/post/integrity-checking/" } ] } diff --git a/2022/38xxx/CVE-2022-38291.json b/2022/38xxx/CVE-2022-38291.json index eb41c2e4a20..d7e4e7ddab4 100644 --- a/2022/38xxx/CVE-2022-38291.json +++ b/2022/38xxx/CVE-2022-38291.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-38291", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-38291", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SLiMS Senayan Library Management System v9.4.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the Search function. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Search bar." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/slims/slims9_bulian/issues/156", + "refsource": "MISC", + "name": "https://github.com/slims/slims9_bulian/issues/156" } ] } diff --git a/2022/38xxx/CVE-2022-38292.json b/2022/38xxx/CVE-2022-38292.json index 12fa1d018f3..90d26ab5b36 100644 --- a/2022/38xxx/CVE-2022-38292.json +++ b/2022/38xxx/CVE-2022-38292.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-38292", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-38292", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SLiMS Senayan Library Management System v9.4.2 was discovered to contain multiple Server-Side Request Forgeries via the components /bibliography/marcsru.php and /bibliography/z3950sru.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/slims/slims9_bulian/issues/158", + "refsource": "MISC", + "name": "https://github.com/slims/slims9_bulian/issues/158" } ] } diff --git a/2022/38xxx/CVE-2022-38295.json b/2022/38xxx/CVE-2022-38295.json index ef1e22bd5d5..2c853a1edf8 100644 --- a/2022/38xxx/CVE-2022-38295.json +++ b/2022/38xxx/CVE-2022-38295.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-38295", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-38295", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cuppa CMS v1.0 was discovered to contain a cross-site scripting vulnerability at /table_manager/view/cu_user_groups. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field under the Add New Group function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/CuppaCMS/CuppaCMS/issues/34", + "refsource": "MISC", + "name": "https://github.com/CuppaCMS/CuppaCMS/issues/34" } ] } diff --git a/2022/38xxx/CVE-2022-38296.json b/2022/38xxx/CVE-2022-38296.json index 3cc485e477f..97741a5c2c9 100644 --- a/2022/38xxx/CVE-2022-38296.json +++ b/2022/38xxx/CVE-2022-38296.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-38296", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-38296", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cuppa CMS v1.0 was discovered to contain an arbitrary file upload vulnerability via the File Manager." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/CuppaCMS/CuppaCMS/issues/33", + "refsource": "MISC", + "name": "https://github.com/CuppaCMS/CuppaCMS/issues/33" } ] } diff --git a/2022/38xxx/CVE-2022-38605.json b/2022/38xxx/CVE-2022-38605.json index 5bda7fee50c..ea3266dc58f 100644 --- a/2022/38xxx/CVE-2022-38605.json +++ b/2022/38xxx/CVE-2022-38605.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-38605", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-38605", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Church Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/edit_event.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/sunaono1/bug_report/blob/main/vendors/Godfrey%20De%20Blessed/church-management-system/SQLi-1.md", + "url": "https://github.com/sunaono1/bug_report/blob/main/vendors/Godfrey%20De%20Blessed/church-management-system/SQLi-1.md" } ] } diff --git a/2022/38xxx/CVE-2022-38606.json b/2022/38xxx/CVE-2022-38606.json index 3c1d7998fb4..638e6d16bb2 100644 --- a/2022/38xxx/CVE-2022-38606.json +++ b/2022/38xxx/CVE-2022-38606.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-38606", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-38606", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Garage Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /garage/editcategory.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/sunaono1/bug_report/blob/main/vendors/mayuri_k/garage-management-system/SQLi-1.md", + "url": "https://github.com/sunaono1/bug_report/blob/main/vendors/mayuri_k/garage-management-system/SQLi-1.md" } ] } diff --git a/2022/38xxx/CVE-2022-38610.json b/2022/38xxx/CVE-2022-38610.json index 39d041a3a1e..a55d5b86fa0 100644 --- a/2022/38xxx/CVE-2022-38610.json +++ b/2022/38xxx/CVE-2022-38610.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-38610", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-38610", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Garage Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /garage/editclient.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/sunaono1/bug_report/blob/main/vendors/mayuri_k/garage-management-system/SQLi-2.md", + "url": "https://github.com/sunaono1/bug_report/blob/main/vendors/mayuri_k/garage-management-system/SQLi-2.md" } ] } diff --git a/2022/3xxx/CVE-2022-3183.json b/2022/3xxx/CVE-2022-3183.json new file mode 100644 index 00000000000..e4b69528e0c --- /dev/null +++ b/2022/3xxx/CVE-2022-3183.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3183", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3184.json b/2022/3xxx/CVE-2022-3184.json new file mode 100644 index 00000000000..581e332f048 --- /dev/null +++ b/2022/3xxx/CVE-2022-3184.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3184", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3185.json b/2022/3xxx/CVE-2022-3185.json new file mode 100644 index 00000000000..b892b9be9ec --- /dev/null +++ b/2022/3xxx/CVE-2022-3185.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3185", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3186.json b/2022/3xxx/CVE-2022-3186.json new file mode 100644 index 00000000000..18141175aa6 --- /dev/null +++ b/2022/3xxx/CVE-2022-3186.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3186", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3187.json b/2022/3xxx/CVE-2022-3187.json new file mode 100644 index 00000000000..25108615439 --- /dev/null +++ b/2022/3xxx/CVE-2022-3187.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3187", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3188.json b/2022/3xxx/CVE-2022-3188.json new file mode 100644 index 00000000000..84b9d70108f --- /dev/null +++ b/2022/3xxx/CVE-2022-3188.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3188", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3189.json b/2022/3xxx/CVE-2022-3189.json new file mode 100644 index 00000000000..fe18d155646 --- /dev/null +++ b/2022/3xxx/CVE-2022-3189.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3189", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40617.json b/2022/40xxx/CVE-2022-40617.json new file mode 100644 index 00000000000..816cb0c982e --- /dev/null +++ b/2022/40xxx/CVE-2022-40617.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40617", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file