"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-08-17 13:00:40 +00:00
parent f0ad5aa0d1
commit 4422a78f1a
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
4 changed files with 133 additions and 12 deletions

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-45454",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-45454",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Ampere Altra before SRP 1.08b and Altra Max\u200b before SRP 2.05 allow information disclosure of power telemetry via HWmon."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://amperecomputing.com/product-security/",
"refsource": "MISC",
"name": "https://amperecomputing.com/product-security/"
},
{
"refsource": "MISC",
"name": "https://amperecomputing.com/products/security-bulletins/platypus.html",
"url": "https://amperecomputing.com/products/security-bulletins/platypus.html"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://packetstormsecurity.com/files/168064/Intelbras-ATA-200-Cross-Site-Scripting.html",
"url": "https://packetstormsecurity.com/files/168064/Intelbras-ATA-200-Cross-Site-Scripting.html"
},
{
"refsource": "MISC",
"name": "https://github.com/leonardobg/CVE-2022-24654",
"url": "https://github.com/leonardobg/CVE-2022-24654"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-2873",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-37459",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-37459",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Ampere Altra devices before 1.08g and Ampere Altra Max devices before 2.05a allow attackers to control the predictions for return addresses and potentially hijack code flow to execute arbitrary code via a side-channel attack, aka a \"Retbleed\" issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://amperecomputing.com/products/security-bulletins/retbleed.html",
"refsource": "MISC",
"name": "https://amperecomputing.com/products/security-bulletins/retbleed.html"
},
{
"url": "https://developer.arm.com/documentation/ka005138/1-0/",
"refsource": "MISC",
"name": "https://developer.arm.com/documentation/ka005138/1-0/"
}
]
}