diff --git a/2021/3xxx/CVE-2021-3721.json b/2021/3xxx/CVE-2021-3721.json index 5d494e95a82..97bacba72c3 100644 --- a/2021/3xxx/CVE-2021-3721.json +++ b/2021/3xxx/CVE-2021-3721.json @@ -31,7 +31,7 @@ "credit": [ { "lang": "eng", - "value": "Lenovo thanks renweijun(任卫军), from Sangfor TIT(Sangfor Threat Intelligence Team) for reporting this issue." + "value": "Lenovo thanks renweijun(\u4efb\u536b\u519b), from Sangfor TIT(Sangfor Threat Intelligence Team) for reporting this issue." } ], "data_format": "MITRE", @@ -79,8 +79,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://iknow.lenovo.com.cn/detail/dc_200016.html" + "refsource": "MISC", + "url": "https://iknow.lenovo.com.cn/detail/dc_200016.html", + "name": "https://iknow.lenovo.com.cn/detail/dc_200016.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3722.json b/2021/3xxx/CVE-2021-3722.json index 2ea5111f728..a6c9c93c631 100644 --- a/2021/3xxx/CVE-2021-3722.json +++ b/2021/3xxx/CVE-2021-3722.json @@ -79,8 +79,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://iknow.lenovo.com.cn/detail/dc_199218.html" + "refsource": "MISC", + "url": "https://iknow.lenovo.com.cn/detail/dc_199218.html", + "name": "https://iknow.lenovo.com.cn/detail/dc_199218.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3898.json b/2021/3xxx/CVE-2021-3898.json index 09434fbe4d5..bfc7f169b5b 100644 --- a/2021/3xxx/CVE-2021-3898.json +++ b/2021/3xxx/CVE-2021-3898.json @@ -53,7 +53,7 @@ "description_data": [ { "lang": "eng", - "value": "Versions of Motorola Ready For and Motorola Device Help Android applications prior to 2021-04-08 do not properly verify the server certificate which could lead to the communication channel being accessible by an attacker. " + "value": "Versions of Motorola Ready For and Motorola Device Help Android applications prior to 2021-04-08 do not properly verify the server certificate which could lead to the communication channel being accessible by an attacker." } ] }, @@ -91,8 +91,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://support.lenovo.com/us/en/product_security/LEN-58311" + "refsource": "MISC", + "url": "https://support.lenovo.com/us/en/product_security/LEN-58311", + "name": "https://support.lenovo.com/us/en/product_security/LEN-58311" } ] }, diff --git a/2021/3xxx/CVE-2021-3970.json b/2021/3xxx/CVE-2021-3970.json index d340d3ac03f..b868f678f31 100644 --- a/2021/3xxx/CVE-2021-3970.json +++ b/2021/3xxx/CVE-2021-3970.json @@ -31,7 +31,7 @@ "credit": [ { "lang": "eng", - "value": " Lenovo thanks Martin Smolár from ESET for reporting this issue." + "value": " Lenovo thanks Martin Smol\u00e1r from ESET for reporting this issue." } ], "data_format": "MITRE", @@ -79,8 +79,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://support.lenovo.com/us/en/product_security/LEN-73440" + "refsource": "MISC", + "url": "https://support.lenovo.com/us/en/product_security/LEN-73440", + "name": "https://support.lenovo.com/us/en/product_security/LEN-73440" } ] }, diff --git a/2021/3xxx/CVE-2021-3971.json b/2021/3xxx/CVE-2021-3971.json index e401c1ce7ee..b8da108b06a 100644 --- a/2021/3xxx/CVE-2021-3971.json +++ b/2021/3xxx/CVE-2021-3971.json @@ -31,7 +31,7 @@ "credit": [ { "lang": "eng", - "value": " Lenovo thanks Martin Smolár from ESET for reporting this issue." + "value": " Lenovo thanks Martin Smol\u00e1r from ESET for reporting this issue." } ], "data_format": "MITRE", @@ -79,8 +79,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://support.lenovo.com/us/en/product_security/LEN-73440" + "refsource": "MISC", + "url": "https://support.lenovo.com/us/en/product_security/LEN-73440", + "name": "https://support.lenovo.com/us/en/product_security/LEN-73440" } ] }, diff --git a/2021/3xxx/CVE-2021-3972.json b/2021/3xxx/CVE-2021-3972.json index efb855f0631..c1377c65816 100644 --- a/2021/3xxx/CVE-2021-3972.json +++ b/2021/3xxx/CVE-2021-3972.json @@ -31,7 +31,7 @@ "credit": [ { "lang": "eng", - "value": " Lenovo thanks Martin Smolár from ESET for reporting this issue." + "value": " Lenovo thanks Martin Smol\u00e1r from ESET for reporting this issue." } ], "data_format": "MITRE", @@ -79,8 +79,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://support.lenovo.com/us/en/product_security/LEN-73440" + "refsource": "MISC", + "url": "https://support.lenovo.com/us/en/product_security/LEN-73440", + "name": "https://support.lenovo.com/us/en/product_security/LEN-73440" } ] }, diff --git a/2021/4xxx/CVE-2021-4210.json b/2021/4xxx/CVE-2021-4210.json index 8bfdaa6f53f..649a92219d5 100644 --- a/2021/4xxx/CVE-2021-4210.json +++ b/2021/4xxx/CVE-2021-4210.json @@ -79,8 +79,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://support.lenovo.com/us/en/product_security/LEN-77639" + "refsource": "MISC", + "url": "https://support.lenovo.com/us/en/product_security/LEN-77639", + "name": "https://support.lenovo.com/us/en/product_security/LEN-77639" } ] }, diff --git a/2021/4xxx/CVE-2021-4211.json b/2021/4xxx/CVE-2021-4211.json index d9c506c9302..e43adb3fb12 100644 --- a/2021/4xxx/CVE-2021-4211.json +++ b/2021/4xxx/CVE-2021-4211.json @@ -41,7 +41,7 @@ "description_data": [ { "lang": "eng", - "value": "A potential vulnerability in the SMI callback function used in the SMBIOS event log driver in some Lenovo Desktop, ThinkStation, and ThinkEdge models may allow an attacker with local access and elevated privileges to execute arbitrary code. " + "value": "A potential vulnerability in the SMI callback function used in the SMBIOS event log driver in some Lenovo Desktop, ThinkStation, and ThinkEdge models may allow an attacker with local access and elevated privileges to execute arbitrary code." } ] }, @@ -79,8 +79,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://support.lenovo.com/us/en/product_security/LEN-77639" + "refsource": "MISC", + "url": "https://support.lenovo.com/us/en/product_security/LEN-77639", + "name": "https://support.lenovo.com/us/en/product_security/LEN-77639" } ] }, diff --git a/2021/4xxx/CVE-2021-4212.json b/2021/4xxx/CVE-2021-4212.json index abb601272a9..4d7c6fa32bc 100644 --- a/2021/4xxx/CVE-2021-4212.json +++ b/2021/4xxx/CVE-2021-4212.json @@ -41,7 +41,7 @@ "description_data": [ { "lang": "eng", - "value": "A potential vulnerability in the SMI callback function used in the Legacy BIOS mode driver in some Lenovo Notebook models may allow an attacker with local access and elevated privileges to execute arbitrary code. " + "value": "A potential vulnerability in the SMI callback function used in the Legacy BIOS mode driver in some Lenovo Notebook models may allow an attacker with local access and elevated privileges to execute arbitrary code." } ] }, @@ -79,8 +79,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://support.lenovo.com/us/en/product_security/LEN-77639" + "refsource": "MISC", + "url": "https://support.lenovo.com/us/en/product_security/LEN-77639", + "name": "https://support.lenovo.com/us/en/product_security/LEN-77639" } ] }, diff --git a/2022/0xxx/CVE-2022-0192.json b/2022/0xxx/CVE-2022-0192.json index 1c9bd608178..d4e53b1b146 100644 --- a/2022/0xxx/CVE-2022-0192.json +++ b/2022/0xxx/CVE-2022-0192.json @@ -79,8 +79,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://iknow.lenovo.com.cn/detail/dc_201470.html" + "refsource": "MISC", + "url": "https://iknow.lenovo.com.cn/detail/dc_201470.html", + "name": "https://iknow.lenovo.com.cn/detail/dc_201470.html" } ] }, diff --git a/2022/0xxx/CVE-2022-0354.json b/2022/0xxx/CVE-2022-0354.json index c18a50fa919..8b7b62dd16d 100644 --- a/2022/0xxx/CVE-2022-0354.json +++ b/2022/0xxx/CVE-2022-0354.json @@ -79,8 +79,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://support.lenovo.com/us/en/product_security/LEN-76673" + "refsource": "MISC", + "url": "https://support.lenovo.com/us/en/product_security/LEN-76673", + "name": "https://support.lenovo.com/us/en/product_security/LEN-76673" } ] }, diff --git a/2022/0xxx/CVE-2022-0636.json b/2022/0xxx/CVE-2022-0636.json index 5fc503f1257..86524bea360 100644 --- a/2022/0xxx/CVE-2022-0636.json +++ b/2022/0xxx/CVE-2022-0636.json @@ -79,8 +79,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://support.lenovo.com/us/en/product_security/LEN-78116" + "refsource": "MISC", + "url": "https://support.lenovo.com/us/en/product_security/LEN-78116", + "name": "https://support.lenovo.com/us/en/product_security/LEN-78116" } ] }, diff --git a/2022/1xxx/CVE-2022-1107.json b/2022/1xxx/CVE-2022-1107.json index 3f31a6efe2f..d8ef916a38e 100644 --- a/2022/1xxx/CVE-2022-1107.json +++ b/2022/1xxx/CVE-2022-1107.json @@ -41,7 +41,7 @@ "description_data": [ { "lang": "eng", - "value": "A potential vulnerability due to use of Boot Services in the SmmOEMInt15 SMI handler in some ThinkPad models could be exploited by an attacker with elevated privileges that could allow for execution of code." + "value": "A potential vulnerability due to use of Boot Services in the SmmOEMInt15 SMI handler in some ThinkPad models could be exploited by an attacker with elevated privileges that could allow for execution of code." } ] }, @@ -79,8 +79,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://support.lenovo.com/us/en/product_security/LEN-84943" + "refsource": "MISC", + "url": "https://support.lenovo.com/us/en/product_security/LEN-84943", + "name": "https://support.lenovo.com/us/en/product_security/LEN-84943" } ] }, diff --git a/2022/1xxx/CVE-2022-1108.json b/2022/1xxx/CVE-2022-1108.json index 757a70265b0..0b87741cb24 100644 --- a/2022/1xxx/CVE-2022-1108.json +++ b/2022/1xxx/CVE-2022-1108.json @@ -41,7 +41,7 @@ "description_data": [ { "lang": "eng", - "value": " A potential vulnerability due to improper buffer validation in the SMI handler LenovoFlashDeviceInterface in Thinkpad X1 Fold Gen 1 could be exploited by an attacker with local access and elevated privileges to execute arbitrary code." + "value": "A potential vulnerability due to improper buffer validation in the SMI handler LenovoFlashDeviceInterface in Thinkpad X1 Fold Gen 1 could be exploited by an attacker with local access and elevated privileges to execute arbitrary code." } ] }, @@ -79,8 +79,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://support.lenovo.com/us/en/product_security/LEN-84943" + "refsource": "MISC", + "url": "https://support.lenovo.com/us/en/product_security/LEN-84943", + "name": "https://support.lenovo.com/us/en/product_security/LEN-84943" } ] }, diff --git a/2022/24xxx/CVE-2022-24874.json b/2022/24xxx/CVE-2022-24874.json index 8525fb5662e..aa40eaadd45 100644 --- a/2022/24xxx/CVE-2022-24874.json +++ b/2022/24xxx/CVE-2022-24874.json @@ -1,12 +1,12 @@ { + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24874", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -15,4 +15,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29464.json b/2022/29xxx/CVE-2022-29464.json index 55fe501846b..e19ce1101aa 100644 --- a/2022/29xxx/CVE-2022-29464.json +++ b/2022/29xxx/CVE-2022-29464.json @@ -56,6 +56,11 @@ "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2021-1738", "refsource": "MISC", "name": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2021-1738" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20220422 CVE-2022-29464 :: WSO2 Unrestricted arbitrary file upload, and remote code to execution vulnerability.", + "url": "http://www.openwall.com/lists/oss-security/2022/04/22/7" } ] },