"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-03-10 17:28:38 +00:00
parent dc506370ee
commit 3ecb4311fe
No known key found for this signature in database
GPG Key ID: 08789936A25A004E
62 changed files with 1453 additions and 61 deletions

View File

@ -86,6 +86,16 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -61,6 +61,11 @@
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8",
"refsource": "MISC",
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8"
},
{
"refsource": "DEBIAN",
"name": "DSA-5095",
"url": "https://www.debian.org/security/2022/dsa-5095"
}
]
}

View File

@ -66,6 +66,16 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -58,6 +58,16 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -53,6 +53,16 @@
"refsource": "MISC",
"name": "https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/",
"url": "https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -73,6 +73,16 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20220303-0002/",
"url": "https://security.netapp.com/advisory/ntap-20220303-0002/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -89,6 +89,16 @@
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -98,6 +98,21 @@
"refsource": "DEBIAN",
"name": "DSA-5050",
"url": "https://www.debian.org/security/2022/dsa-5050"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -98,6 +98,21 @@
"refsource": "DEBIAN",
"name": "DSA-5050",
"url": "https://www.debian.org/security/2022/dsa-5050"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -98,6 +98,21 @@
"refsource": "DEBIAN",
"name": "DSA-5050",
"url": "https://www.debian.org/security/2022/dsa-5050"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -98,6 +98,21 @@
"refsource": "DEBIAN",
"name": "DSA-5050",
"url": "https://www.debian.org/security/2022/dsa-5050"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -98,6 +98,21 @@
"refsource": "DEBIAN",
"name": "DSA-5050",
"url": "https://www.debian.org/security/2022/dsa-5050"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -76,6 +76,16 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -71,6 +71,16 @@
"refsource": "CONFIRM",
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10",
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -68,6 +68,21 @@
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951",
"url": "https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -63,6 +63,16 @@
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680",
"url": "https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -58,6 +58,21 @@
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2021/09/15/4",
"url": "https://www.openwall.com/lists/oss-security/2021/09/15/4"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -48,6 +48,16 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2000585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000585"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -63,6 +63,16 @@
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df",
"url": "https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -91,6 +91,16 @@
"refsource": "CONFIRM",
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12",
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -86,6 +86,16 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -86,6 +86,16 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -76,6 +76,16 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211210-0001/",
"url": "https://security.netapp.com/advisory/ntap-20211210-0001/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -76,6 +76,21 @@
"refsource": "DEBIAN",
"name": "DSA-5092",
"url": "https://www.debian.org/security/2022/dsa-5092"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -71,6 +71,16 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20220114-0003/",
"url": "https://security.netapp.com/advisory/ntap-20220114-0003/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -66,6 +66,21 @@
"refsource": "DEBIAN",
"name": "DSA-5050",
"url": "https://www.debian.org/security/2022/dsa-5050"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -86,6 +86,16 @@
"refsource": "DEBIAN",
"name": "DSA-5050",
"url": "https://www.debian.org/security/2022/dsa-5050"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -66,6 +66,16 @@
"refsource": "DEBIAN",
"name": "DSA-5050",
"url": "https://www.debian.org/security/2022/dsa-5050"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -63,6 +63,21 @@
"refsource": "MISC",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -58,6 +58,21 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20220217-0005/",
"url": "https://security.netapp.com/advisory/ntap-20220217-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -53,6 +53,26 @@
"refsource": "MISC",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5095",
"url": "https://www.debian.org/security/2022/dsa-5095"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -53,6 +53,26 @@
"refsource": "MISC",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5095",
"url": "https://www.debian.org/security/2022/dsa-5095"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -58,6 +58,26 @@
"refsource": "MISC",
"name": "https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/",
"url": "https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5095",
"url": "https://www.debian.org/security/2022/dsa-5095"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
},

View File

@ -1,18 +1,89 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0890",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "NULL Pointer Dereference in mruby/mruby"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "mruby/mruby",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "3.2"
}
]
}
}
]
},
"vendor_name": "mruby"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-476 NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276"
},
{
"name": "https://github.com/mruby/mruby/commit/da48e7dbb20024c198493b8724adae1b842083aa",
"refsource": "MISC",
"url": "https://github.com/mruby/mruby/commit/da48e7dbb20024c198493b8724adae1b842083aa"
}
]
},
"source": {
"advisory": "68e09ec1-6cc7-48b8-981d-30f478c70276",
"discovery": "EXTERNAL"
}
}

View File

@ -4,15 +4,96 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0891",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@gitlab.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "libtiff",
"product": {
"product_data": [
{
"product_name": "libtiff",
"version": {
"version_data": [
{
"version_value": ">=3.9.0, <=4.3.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in libtiff"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gitlab.com/libtiff/libtiff/-/issues/380",
"url": "https://gitlab.com/libtiff/libtiff/-/issues/380",
"refsource": "MISC"
},
{
"name": "https://gitlab.com/libtiff/libtiff/-/issues/382",
"url": "https://gitlab.com/libtiff/libtiff/-/issues/382",
"refsource": "MISC"
},
{
"name": "https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c",
"url": "https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c",
"refsource": "MISC"
},
{
"name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json",
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json",
"refsource": "CONFIRM"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact"
}
]
}
},
"impact": {
"cvss": {
"vectorString": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"version": "3.1",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
}
},
"credit": [
{
"lang": "eng",
"value": "shahchintanh@gmail.com"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0901",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0902",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0907",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0908",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0909",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-0910",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -1,18 +1,115 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "cna@cyber.gov.il",
"DATE_PUBLIC": "2022-03-02T16:21:00.000Z",
"ID": "CVE-2022-22795",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Signiant - Manager+Agents XML External Entity (XXE)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Signiant",
"version": {
"version_data": [
{
"version_name": "Signiant ",
"version_value": "Build 78045 13.5.0 "
},
{
"version_name": "Signiant ",
"version_value": "Build 79008,14.0.0"
},
{
"version_name": "Signiant ",
"version_value": "Build 79687 14.1.0"
},
{
"version_name": "Signiant ",
"version_value": "Build 79687 15.0.0 "
}
]
}
}
]
},
"vendor_name": "Signiant"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Anton Golotin"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-611 Improper Restriction of XML External Entity Reference ('XXE')"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://www.gov.il/en/departments/faq/cve_advisories",
"name": "https://www.gov.il/en/departments/faq/cve_advisories"
}
]
},
"solution": [
{
"lang": "eng",
"value": "All of 13.5, 14.1, and 15.1 have an update available.\nThe mitigation involved adding a filter that validates for external dtd."
}
],
"source": {
"advisory": "ILVN-2022-0016",
"defect": [
"ILVN-2022-0016"
],
"discovery": "EXTERNAL"
}
}

View File

@ -15,11 +15,11 @@
"product": {
"product_data": [
{
"product_name": "AXIS IP Utility",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "All version prior to 4.17.0"
"version_value": "All version prior to 4.18.0"
}
]
}
@ -55,7 +55,7 @@
"description_data": [
{
"lang": "eng",
"value": "AXIS IP Utility prior to 4.17.0 allows for remote code execution and local privilege escalation by the means of DLL hijacking. IPUtility.exe would attempt to load DLLs from its current working directory which could allow for remote code execution if a compromised DLL would be placed in the same folder."
"value": "AXIS IP Utility before 4.18.0 allows for remote code execution and local privilege escalation by the means of DLL hijacking. IPUtility.exe would attempt to load DLLs from its current working directory which could allow for remote code execution if a compromised DLL would be placed in the same folder."
}
]
}

View File

@ -76,6 +76,21 @@
"refsource": "DEBIAN",
"name": "DSA-5092",
"url": "https://www.debian.org/security/2022/dsa-5092"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-24605",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-24605",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Luocms v2.0 is affected by SQL Injection in /admin/link/link_ok.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/jsjbcyber/bug_report/blob/main/bug_l",
"refsource": "MISC",
"name": "https://github.com/jsjbcyber/bug_report/blob/main/bug_l"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-24606",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-24606",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Luocms v2.0 is affected by SQL Injection in /admin/news/sort_ok.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/jsjbcyber/bug_report/blob/main/bug_m",
"refsource": "MISC",
"name": "https://github.com/jsjbcyber/bug_report/blob/main/bug_m"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-24607",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-24607",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Luocms v2.0 is affected by SQL Injection in /admin/news/news_ok.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/jsjbcyber/bug_report/blob/main/bug_n",
"refsource": "MISC",
"name": "https://github.com/jsjbcyber/bug_report/blob/main/bug_n"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-24608",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-24608",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Luocms v2.0 is affected by Cross Site Scripting (XSS) in /admin/news/sort_add.php and /inc/function.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/jsjbcyber/bug_report/blob/main/bug_o",
"refsource": "MISC",
"name": "https://github.com/jsjbcyber/bug_report/blob/main/bug_o"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-24609",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-24609",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Luocms v2.0 is affected by an incorrect access control vulnerability. Through /admin/templates/template_manage.php, an attacker can write an arbitrary shell file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/jsjbcyber/bug_report/blob/main/bug_p",
"refsource": "MISC",
"name": "https://github.com/jsjbcyber/bug_report/blob/main/bug_p"
}
]
}

View File

@ -66,6 +66,16 @@
"refsource": "DEBIAN",
"name": "DSA-5092",
"url": "https://www.debian.org/security/2022/dsa-5092"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -76,6 +76,21 @@
"refsource": "DEBIAN",
"name": "DSA-5092",
"url": "https://www.debian.org/security/2022/dsa-5092"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -76,6 +76,21 @@
"refsource": "DEBIAN",
"name": "DSA-5092",
"url": "https://www.debian.org/security/2022/dsa-5092"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-5096",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "MLIST",
"name": "[oss-security] 20220222 Re: Linux kernel: heap out of bounds write in nf_dup_netdev.c since 5.4",
"url": "http://www.openwall.com/lists/oss-security/2022/02/22/1"
},
{
"refsource": "DEBIAN",
"name": "DSA-5095",
"url": "https://www.debian.org/security/2022/dsa-5095"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-25915",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-26009",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-26342",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -1,18 +1,75 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@citrix.com",
"ID": "CVE-2022-26355",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Citrix Federated Authentication Service (FAS) "
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Federated Authentication Service (FAS)",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "10.6"
},
{
"version_affected": ">=",
"version_value": "7.17"
}
]
}
}
]
},
"vendor_name": "Citrix"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Citrix Federated Authentication Service (FAS) 7.17 - 10.6 causes deployments that have been configured to store a registration authority certificate's private key in a Trusted Platform Module (TPM) to incorrectly store that key in the Microsoft Software Key Storage Provider (MSKSP). This issue only occurs if PowerShell was used when configuring FAS to store the registration authority certificate\u2019s private key in the TPM. It does not occur if the TPM was not selected for use or if the FAS administration console was used for configuration."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-668 Exposure of Resource to Wrong Sphere"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://support.citrix.com/article/CTX341587",
"name": "https://support.citrix.com/article/CTX341587"
}
]
},
"source": {
"advisory": "CTX341587",
"discovery": "UNKNOWN"
}
}

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-26652",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-26652",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "NATS nats-server before 2.7.4 allows Directory Traversal (with write access) via an element in a ZIP archive for JetStream streams. nats-streaming-server before 0.24.3 is also affected."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/nats-io/nats-server/releases",
"refsource": "MISC",
"name": "https://github.com/nats-io/nats-server/releases"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/nats-io/nats-server/security/advisories/GHSA-6h3m-36w8-hv68",
"url": "https://github.com/nats-io/nats-server/security/advisories/GHSA-6h3m-36w8-hv68"
},
{
"refsource": "CONFIRM",
"name": "https://advisories.nats.io/CVE/CVE-2022-26652.txt",
"url": "https://advisories.nats.io/CVE/CVE-2022-26652.txt"
}
]
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-26846",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SPIP before 3.2.14 and 4.x before 4.0.5 allows remote authenticated editors to execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://lists.debian.org/debian-security-announce/2022/msg00060.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-security-announce/2022/msg00060.html"
},
{
"url": "https://blog.spip.net/Mise-a-jour-critique-de-securite-sorties-de-SPIP-4-0-5-et-SPIP-3-2-14.html",
"refsource": "MISC",
"name": "https://blog.spip.net/Mise-a-jour-critique-de-securite-sorties-de-SPIP-4-0-5-et-SPIP-3-2-14.html"
},
{
"url": "https://git.spip.net/spip/medias/commit/3014b845da2dd8ad15ff04b50fd9dbba388a9ca2",
"refsource": "MISC",
"name": "https://git.spip.net/spip/medias/commit/3014b845da2dd8ad15ff04b50fd9dbba388a9ca2"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-26847",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SPIP before 3.2.14 and 4.x before 4.0.5 allows unauthenticated access to information about editorial objects."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://lists.debian.org/debian-security-announce/2022/msg00060.html",
"refsource": "MISC",
"name": "https://lists.debian.org/debian-security-announce/2022/msg00060.html"
},
{
"url": "https://blog.spip.net/Mise-a-jour-critique-de-securite-sorties-de-SPIP-4-0-5-et-SPIP-3-2-14.html",
"refsource": "MISC",
"name": "https://blog.spip.net/Mise-a-jour-critique-de-securite-sorties-de-SPIP-4-0-5-et-SPIP-3-2-14.html"
},
{
"url": "https://git.spip.net/spip/medias/commit/3014b845da2dd8ad15ff04b50fd9dbba388a9ca2",
"refsource": "MISC",
"name": "https://git.spip.net/spip/medias/commit/3014b845da2dd8ad15ff04b50fd9dbba388a9ca2"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-26848",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-26849",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}