From 42b2969f3e532056d8e9e6c5768f3d4f349134c9 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 23 Aug 2022 18:01:12 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/25xxx/CVE-2021-25738.json | 5 +++ 2022/1xxx/CVE-2022-1513.json | 5 +-- 2022/35xxx/CVE-2022-35115.json | 61 ++++++++++++++++++++++++++++++---- 2022/36xxx/CVE-2022-36429.json | 18 ++++++++++ 2022/37xxx/CVE-2022-37337.json | 18 ++++++++++ 2022/38xxx/CVE-2022-38458.json | 18 ++++++++++ 2022/38xxx/CVE-2022-38663.json | 5 +++ 2022/38xxx/CVE-2022-38664.json | 5 +++ 2022/38xxx/CVE-2022-38665.json | 5 +++ 9 files changed, 132 insertions(+), 8 deletions(-) create mode 100644 2022/36xxx/CVE-2022-36429.json create mode 100644 2022/37xxx/CVE-2022-37337.json create mode 100644 2022/38xxx/CVE-2022-38458.json diff --git a/2021/25xxx/CVE-2021-25738.json b/2021/25xxx/CVE-2021-25738.json index 1fb199515e0..94d863843d6 100644 --- a/2021/25xxx/CVE-2021-25738.json +++ b/2021/25xxx/CVE-2021-25738.json @@ -101,6 +101,11 @@ "refsource": "MISC", "url": "https://github.com/kubernetes-client/java/issues/1698", "name": "https://github.com/kubernetes-client/java/issues/1698" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20220823 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2022/08/23/2" } ] }, diff --git a/2022/1xxx/CVE-2022-1513.json b/2022/1xxx/CVE-2022-1513.json index 4deecf380cf..6d4d1fbcf82 100644 --- a/2022/1xxx/CVE-2022-1513.json +++ b/2022/1xxx/CVE-2022-1513.json @@ -73,8 +73,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://iknow.lenovo.com.cn/detail/dc_203545.html" + "refsource": "MISC", + "url": "https://iknow.lenovo.com.cn/detail/dc_203545.html", + "name": "https://iknow.lenovo.com.cn/detail/dc_203545.html" } ] }, diff --git a/2022/35xxx/CVE-2022-35115.json b/2022/35xxx/CVE-2022-35115.json index 861a8c36304..55c16fcbd52 100644 --- a/2022/35xxx/CVE-2022-35115.json +++ b/2022/35xxx/CVE-2022-35115.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-35115", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-35115", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IceWarp WebClient DC2 - Update 2 Build 9 (13.0.2.9) was discovered to contain a SQL injection vulnerability via the search parameter at /webmail/server/webmail.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://support.icewarp.com/hc/en-us/community/posts/4419283857297-DC2-Update-2-Build-10-13-0-2-10-", + "refsource": "MISC", + "name": "https://support.icewarp.com/hc/en-us/community/posts/4419283857297-DC2-Update-2-Build-10-13-0-2-10-" + }, + { + "refsource": "MISC", + "name": "https://veysel-xan.com/CVE-2022-35115.txt", + "url": "https://veysel-xan.com/CVE-2022-35115.txt" } ] } diff --git a/2022/36xxx/CVE-2022-36429.json b/2022/36xxx/CVE-2022-36429.json new file mode 100644 index 00000000000..02a2389e1ce --- /dev/null +++ b/2022/36xxx/CVE-2022-36429.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36429", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37337.json b/2022/37xxx/CVE-2022-37337.json new file mode 100644 index 00000000000..81bf0532635 --- /dev/null +++ b/2022/37xxx/CVE-2022-37337.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37337", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38458.json b/2022/38xxx/CVE-2022-38458.json new file mode 100644 index 00000000000..c3798707101 --- /dev/null +++ b/2022/38xxx/CVE-2022-38458.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38458", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38663.json b/2022/38xxx/CVE-2022-38663.json index d7eea0b4b85..f26b0d479e0 100644 --- a/2022/38xxx/CVE-2022-38663.json +++ b/2022/38xxx/CVE-2022-38663.json @@ -61,6 +61,11 @@ "name": "https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2796", "url": "https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2796", "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20220823 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2022/08/23/2" } ] } diff --git a/2022/38xxx/CVE-2022-38664.json b/2022/38xxx/CVE-2022-38664.json index 6f2aa13ffc2..6a34c43f49c 100644 --- a/2022/38xxx/CVE-2022-38664.json +++ b/2022/38xxx/CVE-2022-38664.json @@ -57,6 +57,11 @@ "name": "https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2765", "url": "https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2765", "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20220823 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2022/08/23/2" } ] } diff --git a/2022/38xxx/CVE-2022-38665.json b/2022/38xxx/CVE-2022-38665.json index f6c25e21054..0252309a281 100644 --- a/2022/38xxx/CVE-2022-38665.json +++ b/2022/38xxx/CVE-2022-38665.json @@ -57,6 +57,11 @@ "name": "https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2157", "url": "https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2157", "refsource": "CONFIRM" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20220823 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2022/08/23/2" } ] }