From 468310c7977d11c2e849f1aa1c6c0985cc67de6a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 12 Oct 2022 19:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/3xxx/CVE-2022-3477.json | 18 +++++++++++ 2022/42xxx/CVE-2022-42077.json | 56 ++++++++++++++++++++++++++++++---- 2022/42xxx/CVE-2022-42078.json | 56 ++++++++++++++++++++++++++++++---- 2022/42xxx/CVE-2022-42079.json | 56 ++++++++++++++++++++++++++++++---- 2022/42xxx/CVE-2022-42080.json | 56 ++++++++++++++++++++++++++++++---- 2022/42xxx/CVE-2022-42081.json | 56 ++++++++++++++++++++++++++++++---- 2022/42xxx/CVE-2022-42086.json | 56 ++++++++++++++++++++++++++++++---- 2022/42xxx/CVE-2022-42087.json | 56 ++++++++++++++++++++++++++++++---- 2022/42xxx/CVE-2022-42895.json | 18 +++++++++++ 2022/42xxx/CVE-2022-42896.json | 18 +++++++++++ 10 files changed, 404 insertions(+), 42 deletions(-) create mode 100644 2022/3xxx/CVE-2022-3477.json create mode 100644 2022/42xxx/CVE-2022-42895.json create mode 100644 2022/42xxx/CVE-2022-42896.json diff --git a/2022/3xxx/CVE-2022-3477.json b/2022/3xxx/CVE-2022-3477.json new file mode 100644 index 00000000000..909122a5a7e --- /dev/null +++ b/2022/3xxx/CVE-2022-3477.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3477", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/42xxx/CVE-2022-42077.json b/2022/42xxx/CVE-2022-42077.json index 5d5dcd8be13..741dbadbe22 100644 --- a/2022/42xxx/CVE-2022-42077.json +++ b/2022/42xxx/CVE-2022-42077.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42077", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42077", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolReboot." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-1.md", + "refsource": "MISC", + "name": "https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-1.md" } ] } diff --git a/2022/42xxx/CVE-2022-42078.json b/2022/42xxx/CVE-2022-42078.json index 87d65c0b849..584f6a0c24f 100644 --- a/2022/42xxx/CVE-2022-42078.json +++ b/2022/42xxx/CVE-2022-42078.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42078", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42078", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolRestoreSet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-2.md", + "refsource": "MISC", + "name": "https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-2.md" } ] } diff --git a/2022/42xxx/CVE-2022-42079.json b/2022/42xxx/CVE-2022-42079.json index 4d09cc007f0..f5dcba18802 100644 --- a/2022/42xxx/CVE-2022-42079.json +++ b/2022/42xxx/CVE-2022-42079.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42079", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42079", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a stack overflow via the function formWifiBasicSet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-3.md", + "refsource": "MISC", + "name": "https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-3.md" } ] } diff --git a/2022/42xxx/CVE-2022-42080.json b/2022/42xxx/CVE-2022-42080.json index 098339e975b..28a6e696d24 100644 --- a/2022/42xxx/CVE-2022-42080.json +++ b/2022/42xxx/CVE-2022-42080.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42080", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42080", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a heap overflow via sched_start_time parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-4.md", + "refsource": "MISC", + "name": "https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-4.md" } ] } diff --git a/2022/42xxx/CVE-2022-42081.json b/2022/42xxx/CVE-2022-42081.json index 156d17eea35..12865fb6bef 100644 --- a/2022/42xxx/CVE-2022-42081.json +++ b/2022/42xxx/CVE-2022-42081.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42081", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42081", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a stack overflow via sched_end_time parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-5.md", + "refsource": "MISC", + "name": "https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-5.md" } ] } diff --git a/2022/42xxx/CVE-2022-42086.json b/2022/42xxx/CVE-2022-42086.json index adc29e20b81..e59f6ec14b7 100644 --- a/2022/42xxx/CVE-2022-42086.json +++ b/2022/42xxx/CVE-2022-42086.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42086", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42086", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenda AX1803 US_AX1803v2.0br_v1.0.0.1_2994_CN_ZGYD01_4 is vulnerable to Cross Site Request Forgery (CSRF) via function TendaAteMode." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/tianhui999/myCVE/blob/main/AX1803/AX1803-2.md", + "refsource": "MISC", + "name": "https://github.com/tianhui999/myCVE/blob/main/AX1803/AX1803-2.md" } ] } diff --git a/2022/42xxx/CVE-2022-42087.json b/2022/42xxx/CVE-2022-42087.json index 64f7a506961..5cc95409fb4 100644 --- a/2022/42xxx/CVE-2022-42087.json +++ b/2022/42xxx/CVE-2022-42087.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42087", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42087", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenda AX1803 US_AX1803v2.0br_v1.0.0.1_2994_CN_ZGYD01_4 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolReboot." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/tianhui999/myCVE/blob/main/AX1803/AX1803-1.md", + "refsource": "MISC", + "name": "https://github.com/tianhui999/myCVE/blob/main/AX1803/AX1803-1.md" } ] } diff --git a/2022/42xxx/CVE-2022-42895.json b/2022/42xxx/CVE-2022-42895.json new file mode 100644 index 00000000000..9c3d837de1e --- /dev/null +++ b/2022/42xxx/CVE-2022-42895.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-42895", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/42xxx/CVE-2022-42896.json b/2022/42xxx/CVE-2022-42896.json new file mode 100644 index 00000000000..3fdac5a7d8b --- /dev/null +++ b/2022/42xxx/CVE-2022-42896.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-42896", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file