diff --git a/2022/2xxx/CVE-2022-2811.json b/2022/2xxx/CVE-2022-2811.json index d03128ed1ec..0252543e083 100644 --- a/2022/2xxx/CVE-2022-2811.json +++ b/2022/2xxx/CVE-2022-2811.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "3.5", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "https:\/\/s1.ax1x.com\/2022\/08\/13\/vtDEFO.png" + "url": "https://s1.ax1x.com/2022/08/13/vtDEFO.png", + "refsource": "MISC", + "name": "https://s1.ax1x.com/2022/08/13/vtDEFO.png" }, { - "url": "https:\/\/vuldb.com\/?id.206397" + "url": "https://vuldb.com/?id.206397", + "refsource": "MISC", + "name": "https://vuldb.com/?id.206397" } ] } diff --git a/2022/2xxx/CVE-2022-2812.json b/2022/2xxx/CVE-2022-2812.json index ce8b40fd69a..4248c48546e 100644 --- a/2022/2xxx/CVE-2022-2812.json +++ b/2022/2xxx/CVE-2022-2812.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability classified as critical was found in SourceCodester Guest Management System. This vulnerability affects unknown code of the file index.php. The manipulation of the argument username\/pass leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-206398 is the identifier assigned to this vulnerability." + "value": "A vulnerability classified as critical was found in SourceCodester Guest Management System. This vulnerability affects unknown code of the file index.php. The manipulation of the argument username/pass leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-206398 is the identifier assigned to this vulnerability." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "7.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/s1.ax1x.com\/2022\/08\/13\/vtDVYD.png" + "url": "https://s1.ax1x.com/2022/08/13/vtDVYD.png", + "refsource": "MISC", + "name": "https://s1.ax1x.com/2022/08/13/vtDVYD.png" }, { - "url": "https:\/\/vuldb.com\/?id.206398" + "url": "https://vuldb.com/?id.206398", + "refsource": "MISC", + "name": "https://vuldb.com/?id.206398" } ] } diff --git a/2022/2xxx/CVE-2022-2813.json b/2022/2xxx/CVE-2022-2813.json index ae23b74c6e1..9b41f1e4988 100644 --- a/2022/2xxx/CVE-2022-2813.json +++ b/2022/2xxx/CVE-2022-2813.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -58,13 +58,15 @@ "cvss": { "version": "3.1", "baseScore": "4.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } }, "references": { "reference_data": [ { - "url": "https:\/\/vuldb.com\/?id.206400" + "url": "https://vuldb.com/?id.206400", + "refsource": "MISC", + "name": "https://vuldb.com/?id.206400" } ] } diff --git a/2022/2xxx/CVE-2022-2814.json b/2022/2xxx/CVE-2022-2814.json new file mode 100644 index 00000000000..1e602658d41 --- /dev/null +++ b/2022/2xxx/CVE-2022-2814.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2814", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file