From 475843cac1d180829c14bbbbe8fe6ba87e665ec2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 27 Jun 2022 16:00:53 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2013/2xxx/CVE-2013-2084.json | 14 ++++---- 2013/2xxx/CVE-2013-2180.json | 63 ++++++++++++++++++++++++++++++---- 2022/2xxx/CVE-2022-2222.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34665.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34666.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34667.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34668.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34669.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34670.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34671.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34672.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34673.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34674.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34675.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34676.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34677.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34678.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34679.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34680.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34681.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34682.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34683.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34684.json | 18 ++++++++++ 23 files changed, 441 insertions(+), 14 deletions(-) create mode 100644 2022/2xxx/CVE-2022-2222.json create mode 100644 2022/34xxx/CVE-2022-34665.json create mode 100644 2022/34xxx/CVE-2022-34666.json create mode 100644 2022/34xxx/CVE-2022-34667.json create mode 100644 2022/34xxx/CVE-2022-34668.json create mode 100644 2022/34xxx/CVE-2022-34669.json create mode 100644 2022/34xxx/CVE-2022-34670.json create mode 100644 2022/34xxx/CVE-2022-34671.json create mode 100644 2022/34xxx/CVE-2022-34672.json create mode 100644 2022/34xxx/CVE-2022-34673.json create mode 100644 2022/34xxx/CVE-2022-34674.json create mode 100644 2022/34xxx/CVE-2022-34675.json create mode 100644 2022/34xxx/CVE-2022-34676.json create mode 100644 2022/34xxx/CVE-2022-34677.json create mode 100644 2022/34xxx/CVE-2022-34678.json create mode 100644 2022/34xxx/CVE-2022-34679.json create mode 100644 2022/34xxx/CVE-2022-34680.json create mode 100644 2022/34xxx/CVE-2022-34681.json create mode 100644 2022/34xxx/CVE-2022-34682.json create mode 100644 2022/34xxx/CVE-2022-34683.json create mode 100644 2022/34xxx/CVE-2022-34684.json diff --git a/2013/2xxx/CVE-2013-2084.json b/2013/2xxx/CVE-2013-2084.json index 990e31adf7b..e17611704b1 100644 --- a/2013/2xxx/CVE-2013-2084.json +++ b/2013/2xxx/CVE-2013-2084.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2013-2084", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2013-2084", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-2069. Reason: This candidate is a reservation duplicate of CVE-2013-2069. Notes: All CVE users should reference CVE-2013-2069 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2013/2xxx/CVE-2013-2180.json b/2013/2xxx/CVE-2013-2180.json index 1fc218e5d3c..da1de5654e8 100644 --- a/2013/2xxx/CVE-2013-2180.json +++ b/2013/2xxx/CVE-2013-2180.json @@ -1,17 +1,66 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2013-2180", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2013-2180", + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Wordpress UK Cookie Plugin", + "version": { + "version_data": [ + { + "version_value": "Wordpress UK Cookie Plugin 1.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://seclists.org/oss-sec/2013/q2/559", + "url": "https://seclists.org/oss-sec/2013/q2/559" + }, + { + "refsource": "MISC", + "name": "https://github.com/wpscanteam/wpscan/issues/184", + "url": "https://github.com/wpscanteam/wpscan/issues/184" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WordPress Plugin UK Cookie is prone to a cross-site request forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also possible. WordPress Plugin UK Cookie version 1.1 is vulnerable; other versions may also be affected." } ] } diff --git a/2022/2xxx/CVE-2022-2222.json b/2022/2xxx/CVE-2022-2222.json new file mode 100644 index 00000000000..a7b34e4adec --- /dev/null +++ b/2022/2xxx/CVE-2022-2222.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2222", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34665.json b/2022/34xxx/CVE-2022-34665.json new file mode 100644 index 00000000000..d97ea7057b9 --- /dev/null +++ b/2022/34xxx/CVE-2022-34665.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34665", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34666.json b/2022/34xxx/CVE-2022-34666.json new file mode 100644 index 00000000000..c8f9416fe29 --- /dev/null +++ b/2022/34xxx/CVE-2022-34666.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34666", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34667.json b/2022/34xxx/CVE-2022-34667.json new file mode 100644 index 00000000000..a0add650a7d --- /dev/null +++ b/2022/34xxx/CVE-2022-34667.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34667", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34668.json b/2022/34xxx/CVE-2022-34668.json new file mode 100644 index 00000000000..ac1b79172c4 --- /dev/null +++ b/2022/34xxx/CVE-2022-34668.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34668", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34669.json b/2022/34xxx/CVE-2022-34669.json new file mode 100644 index 00000000000..ceb29b8ebe6 --- /dev/null +++ b/2022/34xxx/CVE-2022-34669.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34669", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34670.json b/2022/34xxx/CVE-2022-34670.json new file mode 100644 index 00000000000..6731acde677 --- /dev/null +++ b/2022/34xxx/CVE-2022-34670.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34670", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34671.json b/2022/34xxx/CVE-2022-34671.json new file mode 100644 index 00000000000..88ec1c3abe3 --- /dev/null +++ b/2022/34xxx/CVE-2022-34671.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34671", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34672.json b/2022/34xxx/CVE-2022-34672.json new file mode 100644 index 00000000000..8ba33520e94 --- /dev/null +++ b/2022/34xxx/CVE-2022-34672.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34672", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34673.json b/2022/34xxx/CVE-2022-34673.json new file mode 100644 index 00000000000..4ee3ae4e867 --- /dev/null +++ b/2022/34xxx/CVE-2022-34673.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34673", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34674.json b/2022/34xxx/CVE-2022-34674.json new file mode 100644 index 00000000000..b8603853f31 --- /dev/null +++ b/2022/34xxx/CVE-2022-34674.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34674", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34675.json b/2022/34xxx/CVE-2022-34675.json new file mode 100644 index 00000000000..8cbfff27ab0 --- /dev/null +++ b/2022/34xxx/CVE-2022-34675.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34675", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34676.json b/2022/34xxx/CVE-2022-34676.json new file mode 100644 index 00000000000..e04077cdc85 --- /dev/null +++ b/2022/34xxx/CVE-2022-34676.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34676", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34677.json b/2022/34xxx/CVE-2022-34677.json new file mode 100644 index 00000000000..2ee13b666f5 --- /dev/null +++ b/2022/34xxx/CVE-2022-34677.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34677", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34678.json b/2022/34xxx/CVE-2022-34678.json new file mode 100644 index 00000000000..0f237183e15 --- /dev/null +++ b/2022/34xxx/CVE-2022-34678.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34678", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34679.json b/2022/34xxx/CVE-2022-34679.json new file mode 100644 index 00000000000..7c0e9c35354 --- /dev/null +++ b/2022/34xxx/CVE-2022-34679.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34679", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34680.json b/2022/34xxx/CVE-2022-34680.json new file mode 100644 index 00000000000..d7e90c8c5f2 --- /dev/null +++ b/2022/34xxx/CVE-2022-34680.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34680", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34681.json b/2022/34xxx/CVE-2022-34681.json new file mode 100644 index 00000000000..cacb81be3bc --- /dev/null +++ b/2022/34xxx/CVE-2022-34681.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34681", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34682.json b/2022/34xxx/CVE-2022-34682.json new file mode 100644 index 00000000000..ccefaaa2ae6 --- /dev/null +++ b/2022/34xxx/CVE-2022-34682.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34682", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34683.json b/2022/34xxx/CVE-2022-34683.json new file mode 100644 index 00000000000..76a29c92e9f --- /dev/null +++ b/2022/34xxx/CVE-2022-34683.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34683", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34684.json b/2022/34xxx/CVE-2022-34684.json new file mode 100644 index 00000000000..21e7997bdad --- /dev/null +++ b/2022/34xxx/CVE-2022-34684.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34684", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file