diff --git a/2022/1xxx/CVE-2022-1533.json b/2022/1xxx/CVE-2022-1533.json index f0618dd4e61..dfa70bd0d34 100644 --- a/2022/1xxx/CVE-2022-1533.json +++ b/2022/1xxx/CVE-2022-1533.json @@ -1,89 +1,89 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@huntr.dev", - "ID": "CVE-2022-1533", - "STATE": "PUBLIC", - "TITLE": "Buffer Over-read in bfabiszewski/libmobi" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "bfabiszewski/libmobi", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "0.11" - } - ] + "CVE_data_meta": { + "ASSIGNER": "security@huntr.dev", + "ID": "CVE-2022-1533", + "STATE": "PUBLIC", + "TITLE": "Buffer Over-read in bfabiszewski/libmobi" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "bfabiszewski/libmobi", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "0.11" + } + ] + } + } + ] + }, + "vendor_name": "bfabiszewski" } - } ] - }, - "vendor_name": "bfabiszewski" } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code execution." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 6.6, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-126 Buffer Over-read" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code execution." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://huntr.dev/bounties/cb574ce1-fbf7-42ea-9e6a-91e17adecdc3", - "refsource": "CONFIRM", - "url": "https://huntr.dev/bounties/cb574ce1-fbf7-42ea-9e6a-91e17adecdc3" - }, - { - "name": "https://github.com/bfabiszewski/libmobi/commit/eafc415bc6067e72577f70d6dd5acbf057ce6e6f", - "refsource": "MISC", - "url": "https://github.com/bfabiszewski/libmobi/commit/eafc415bc6067e72577f70d6dd5acbf057ce6e6f" - } - ] - }, - "source": { - "advisory": "cb574ce1-fbf7-42ea-9e6a-91e17adecdc3", - "discovery": "EXTERNAL" - } + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-126 Buffer Over-read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://huntr.dev/bounties/cb574ce1-fbf7-42ea-9e6a-91e17adecdc3", + "refsource": "CONFIRM", + "url": "https://huntr.dev/bounties/cb574ce1-fbf7-42ea-9e6a-91e17adecdc3" + }, + { + "name": "https://github.com/bfabiszewski/libmobi/commit/eafc415bc6067e72577f70d6dd5acbf057ce6e6f", + "refsource": "MISC", + "url": "https://github.com/bfabiszewski/libmobi/commit/eafc415bc6067e72577f70d6dd5acbf057ce6e6f" + } + ] + }, + "source": { + "advisory": "cb574ce1-fbf7-42ea-9e6a-91e17adecdc3", + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1534.json b/2022/1xxx/CVE-2022-1534.json index 9ef10fd6e1f..ee297335bcc 100644 --- a/2022/1xxx/CVE-2022-1534.json +++ b/2022/1xxx/CVE-2022-1534.json @@ -1,89 +1,89 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@huntr.dev", - "ID": "CVE-2022-1534", - "STATE": "PUBLIC", - "TITLE": "Buffer Over-read at parse_rawml.c:1416 in bfabiszewski/libmobi" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "bfabiszewski/libmobi", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "0.11" - } - ] + "CVE_data_meta": { + "ASSIGNER": "security@huntr.dev", + "ID": "CVE-2022-1534", + "STATE": "PUBLIC", + "TITLE": "Buffer Over-read at parse_rawml.c:1416 in bfabiszewski/libmobi" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "bfabiszewski/libmobi", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "0.11" + } + ] + } + } + ] + }, + "vendor_name": "bfabiszewski" } - } ] - }, - "vendor_name": "bfabiszewski" } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Buffer Over-read at parse_rawml.c:1416 in GitHub repository bfabiszewski/libmobi prior to 0.11. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 6.6, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-126 Buffer Over-read" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer Over-read at parse_rawml.c:1416 in GitHub repository bfabiszewski/libmobi prior to 0.11. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://huntr.dev/bounties/9a90ffa1-38f5-4685-9c00-68ba9068ce3d", - "refsource": "CONFIRM", - "url": "https://huntr.dev/bounties/9a90ffa1-38f5-4685-9c00-68ba9068ce3d" - }, - { - "name": "https://github.com/bfabiszewski/libmobi/commit/fb1ab50e448ddbed746fd27ae07469bc506d838b", - "refsource": "MISC", - "url": "https://github.com/bfabiszewski/libmobi/commit/fb1ab50e448ddbed746fd27ae07469bc506d838b" - } - ] - }, - "source": { - "advisory": "9a90ffa1-38f5-4685-9c00-68ba9068ce3d", - "discovery": "EXTERNAL" - } + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-126 Buffer Over-read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://huntr.dev/bounties/9a90ffa1-38f5-4685-9c00-68ba9068ce3d", + "refsource": "CONFIRM", + "url": "https://huntr.dev/bounties/9a90ffa1-38f5-4685-9c00-68ba9068ce3d" + }, + { + "name": "https://github.com/bfabiszewski/libmobi/commit/fb1ab50e448ddbed746fd27ae07469bc506d838b", + "refsource": "MISC", + "url": "https://github.com/bfabiszewski/libmobi/commit/fb1ab50e448ddbed746fd27ae07469bc506d838b" + } + ] + }, + "source": { + "advisory": "9a90ffa1-38f5-4685-9c00-68ba9068ce3d", + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1535.json b/2022/1xxx/CVE-2022-1535.json new file mode 100644 index 00000000000..fe70d0150fa --- /dev/null +++ b/2022/1xxx/CVE-2022-1535.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-1535", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29490.json b/2022/29xxx/CVE-2022-29490.json new file mode 100644 index 00000000000..b7a792da642 --- /dev/null +++ b/2022/29xxx/CVE-2022-29490.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29490", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29492.json b/2022/29xxx/CVE-2022-29492.json new file mode 100644 index 00000000000..062d26c4339 --- /dev/null +++ b/2022/29xxx/CVE-2022-29492.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29492", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29922.json b/2022/29xxx/CVE-2022-29922.json new file mode 100644 index 00000000000..6768cea70b8 --- /dev/null +++ b/2022/29xxx/CVE-2022-29922.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29922", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file