From 4296f6e363b15a656f924441ef2acad8bd4a1697 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 19 Oct 2022 11:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/23xxx/CVE-2020-23648.json | 66 ++++++++++++++++++++++++++++++---- 2022/39xxx/CVE-2022-39233.json | 2 +- 2022/43xxx/CVE-2022-43439.json | 18 ++++++++++ 3 files changed, 79 insertions(+), 7 deletions(-) create mode 100644 2022/43xxx/CVE-2022-43439.json diff --git a/2020/23xxx/CVE-2020-23648.json b/2020/23xxx/CVE-2020-23648.json index 225ac592805..82e17354320 100644 --- a/2020/23xxx/CVE-2020-23648.json +++ b/2020/23xxx/CVE-2020-23648.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-23648", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-23648", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Asus RT-N12E 2.0.0.39 is affected by an incorrect access control vulnerability. Through system.asp / start_apply.htm, an attacker can change the administrator password without any authentication." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.asus.com/Networking/RTN12E/HelpDesk_BIOS/", + "refsource": "MISC", + "name": "https://www.asus.com/Networking/RTN12E/HelpDesk_BIOS/" + }, + { + "url": "https://www.shodan.io/search?query=rt-n12e", + "refsource": "MISC", + "name": "https://www.shodan.io/search?query=rt-n12e" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/ninj4c0d3r/574d2753d469e4ba51dfe555d9c2d4fb", + "url": "https://gist.github.com/ninj4c0d3r/574d2753d469e4ba51dfe555d9c2d4fb" } ] } diff --git a/2022/39xxx/CVE-2022-39233.json b/2022/39xxx/CVE-2022-39233.json index 6aaa7f5d548..75da3d7e675 100644 --- a/2022/39xxx/CVE-2022-39233.json +++ b/2022/39xxx/CVE-2022-39233.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions 12.9.99.228 and above, prior to 14.0.99.24, authorizations are not properly verified when updating the branch prefix used by the GitLab repository integration. Authenticated users can change the branch prefix of any of the GitLab repository integration they can see vie the REST endpoint `PATCH /gitlab_repositories/{id}`. This action should be restricted to Git administrators. This issue is patched in Tuleap Community Edition 14.0.99.24 and Tuleap Enterprise Edition 14.0-3. There are no known workarounds. " + "value": "Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions 12.9.99.228 and above, prior to 14.0.99.24, authorizations are not properly verified when updating the branch prefix used by the GitLab repository integration. Authenticated users can change the branch prefix of any of the GitLab repository integration they can see vie the REST endpoint `PATCH /gitlab_repositories/{id}`. This action should be restricted to Git administrators. This issue is patched in Tuleap Community Edition 14.0.99.24 and Tuleap Enterprise Edition 14.0-3. There are no known workarounds." } ] }, diff --git a/2022/43xxx/CVE-2022-43439.json b/2022/43xxx/CVE-2022-43439.json new file mode 100644 index 00000000000..3d88a1c1e9b --- /dev/null +++ b/2022/43xxx/CVE-2022-43439.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-43439", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file