From 4b7f80bf879d30fff8d67b94ca0f51b6f6710c59 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 29 Jan 2022 00:01:30 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/23xxx/CVE-2021-23484.json | 7 +++---- 2021/23xxx/CVE-2021-23558.json | 7 +++---- 2021/23xxx/CVE-2021-23760.json | 7 +++---- 2021/44xxx/CVE-2021-44358.json | 10 +++++----- 2021/44xxx/CVE-2021-44359.json | 10 +++++----- 2021/44xxx/CVE-2021-44360.json | 10 +++++----- 2021/44xxx/CVE-2021-44361.json | 10 +++++----- 2021/44xxx/CVE-2021-44362.json | 10 +++++----- 2021/44xxx/CVE-2021-44363.json | 10 +++++----- 2021/44xxx/CVE-2021-44364.json | 10 +++++----- 2021/44xxx/CVE-2021-44365.json | 10 +++++----- 2021/44xxx/CVE-2021-44367.json | 10 +++++----- 2021/44xxx/CVE-2021-44368.json | 10 +++++----- 2021/44xxx/CVE-2021-44369.json | 10 +++++----- 2021/44xxx/CVE-2021-44370.json | 10 +++++----- 2021/44xxx/CVE-2021-44371.json | 10 +++++----- 2021/44xxx/CVE-2021-44372.json | 10 +++++----- 2021/44xxx/CVE-2021-44373.json | 10 +++++----- 2021/44xxx/CVE-2021-44374.json | 10 +++++----- 2021/44xxx/CVE-2021-44376.json | 10 +++++----- 2021/44xxx/CVE-2021-44377.json | 10 +++++----- 2021/44xxx/CVE-2021-44378.json | 10 +++++----- 2021/44xxx/CVE-2021-44379.json | 10 +++++----- 2021/44xxx/CVE-2021-44380.json | 10 +++++----- 2021/44xxx/CVE-2021-44381.json | 10 +++++----- 2021/44xxx/CVE-2021-44382.json | 10 +++++----- 2021/44xxx/CVE-2021-44383.json | 10 +++++----- 2021/44xxx/CVE-2021-44384.json | 10 +++++----- 2021/44xxx/CVE-2021-44385.json | 10 +++++----- 2021/44xxx/CVE-2021-44386.json | 10 +++++----- 2021/44xxx/CVE-2021-44387.json | 10 +++++----- 2021/44xxx/CVE-2021-44388.json | 10 +++++----- 2021/44xxx/CVE-2021-44389.json | 10 +++++----- 2021/44xxx/CVE-2021-44390.json | 10 +++++----- 2021/44xxx/CVE-2021-44391.json | 10 +++++----- 2021/44xxx/CVE-2021-44392.json | 10 +++++----- 2021/44xxx/CVE-2021-44393.json | 10 +++++----- 2021/44xxx/CVE-2021-44395.json | 10 +++++----- 2021/44xxx/CVE-2021-44396.json | 10 +++++----- 2021/44xxx/CVE-2021-44397.json | 10 +++++----- 2021/44xxx/CVE-2021-44398.json | 10 +++++----- 2021/44xxx/CVE-2021-44399.json | 10 +++++----- 2021/44xxx/CVE-2021-44400.json | 10 +++++----- 2021/44xxx/CVE-2021-44401.json | 10 +++++----- 2021/44xxx/CVE-2021-44402.json | 10 +++++----- 2021/44xxx/CVE-2021-44403.json | 10 +++++----- 2021/44xxx/CVE-2021-44404.json | 10 +++++----- 2021/44xxx/CVE-2021-44405.json | 10 +++++----- 2021/44xxx/CVE-2021-44406.json | 10 +++++----- 2021/44xxx/CVE-2021-44407.json | 10 +++++----- 2021/44xxx/CVE-2021-44408.json | 10 +++++----- 2021/44xxx/CVE-2021-44409.json | 10 +++++----- 2021/44xxx/CVE-2021-44410.json | 10 +++++----- 2021/44xxx/CVE-2021-44411.json | 10 +++++----- 2021/44xxx/CVE-2021-44412.json | 10 +++++----- 2021/44xxx/CVE-2021-44413.json | 10 +++++----- 2021/44xxx/CVE-2021-44414.json | 10 +++++----- 2021/44xxx/CVE-2021-44415.json | 10 +++++----- 2021/44xxx/CVE-2021-44416.json | 10 +++++----- 2021/44xxx/CVE-2021-44417.json | 10 +++++----- 2021/44xxx/CVE-2021-44418.json | 10 +++++----- 2021/44xxx/CVE-2021-44419.json | 10 +++++----- 2021/4xxx/CVE-2021-4160.json | 14 ++++---------- 2022/0xxx/CVE-2022-0352.json | 9 ++++----- 2022/0xxx/CVE-2022-0392.json | 9 ++++----- 2022/0xxx/CVE-2022-0393.json | 9 ++++----- 2022/0xxx/CVE-2022-0395.json | 9 ++++----- 2022/21xxx/CVE-2022-21721.json | 8 ++++---- 2022/23xxx/CVE-2022-23598.json | 8 ++++---- 2022/23xxx/CVE-2022-23599.json | 16 ++++------------ 70 files changed, 336 insertions(+), 357 deletions(-) diff --git a/2021/23xxx/CVE-2021-23484.json b/2021/23xxx/CVE-2021-23484.json index 5a75ae893aa..e029041f02a 100644 --- a/2021/23xxx/CVE-2021-23484.json +++ b/2021/23xxx/CVE-2021-23484.json @@ -16,12 +16,11 @@ "product": { "product_data": [ { - "product_name": "zip-local", + "product_name": "n/a", "version": { "version_data": [ { - "version_affected": "<", - "version_value": "0.3.5" + "version_value": "n/a" } ] } @@ -39,7 +38,7 @@ "description": [ { "lang": "eng", - "value": "Arbitrary File Write via Archive Extraction (Zip Slip)" + "value": "n/a" } ] } diff --git a/2021/23xxx/CVE-2021-23558.json b/2021/23xxx/CVE-2021-23558.json index 716ecdbd489..5286a8826c4 100644 --- a/2021/23xxx/CVE-2021-23558.json +++ b/2021/23xxx/CVE-2021-23558.json @@ -16,12 +16,11 @@ "product": { "product_data": [ { - "product_name": "bmoor", + "product_name": "n/a", "version": { "version_data": [ { - "version_affected": "<", - "version_value": "0.10.1" + "version_value": "n/a" } ] } @@ -39,7 +38,7 @@ "description": [ { "lang": "eng", - "value": "Prototype Pollution" + "value": "n/a" } ] } diff --git a/2021/23xxx/CVE-2021-23760.json b/2021/23xxx/CVE-2021-23760.json index 2e21ecb5ffc..a043486532e 100644 --- a/2021/23xxx/CVE-2021-23760.json +++ b/2021/23xxx/CVE-2021-23760.json @@ -16,12 +16,11 @@ "product": { "product_data": [ { - "product_name": "keyget", + "product_name": "n/a", "version": { "version_data": [ { - "version_affected": ">=", - "version_value": "0.0.0" + "version_value": "n/a" } ] } @@ -39,7 +38,7 @@ "description": [ { "lang": "eng", - "value": "Prototype Pollution" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44358.json b/2021/44xxx/CVE-2021-44358.json index 8eabd8bc7e2..f102967f3b9 100644 --- a/2021/44xxx/CVE-2021-44358.json +++ b/2021/44xxx/CVE-2021-44358.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44359.json b/2021/44xxx/CVE-2021-44359.json index e933dd49099..59bed7c5102 100644 --- a/2021/44xxx/CVE-2021-44359.json +++ b/2021/44xxx/CVE-2021-44359.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44360.json b/2021/44xxx/CVE-2021-44360.json index a595bc46052..78151d2cfa4 100644 --- a/2021/44xxx/CVE-2021-44360.json +++ b/2021/44xxx/CVE-2021-44360.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44361.json b/2021/44xxx/CVE-2021-44361.json index 4644d17efe7..c838310350d 100644 --- a/2021/44xxx/CVE-2021-44361.json +++ b/2021/44xxx/CVE-2021-44361.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44362.json b/2021/44xxx/CVE-2021-44362.json index d24dcadf4f1..07e56e135a8 100644 --- a/2021/44xxx/CVE-2021-44362.json +++ b/2021/44xxx/CVE-2021-44362.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44363.json b/2021/44xxx/CVE-2021-44363.json index cfbc49de6ba..b0a090404dd 100644 --- a/2021/44xxx/CVE-2021-44363.json +++ b/2021/44xxx/CVE-2021-44363.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44364.json b/2021/44xxx/CVE-2021-44364.json index 5e325427073..6f5d400113b 100644 --- a/2021/44xxx/CVE-2021-44364.json +++ b/2021/44xxx/CVE-2021-44364.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44365.json b/2021/44xxx/CVE-2021-44365.json index 132b5b7c47f..4a4298daf18 100644 --- a/2021/44xxx/CVE-2021-44365.json +++ b/2021/44xxx/CVE-2021-44365.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44367.json b/2021/44xxx/CVE-2021-44367.json index 19fb5a9d904..160d7f0adf1 100644 --- a/2021/44xxx/CVE-2021-44367.json +++ b/2021/44xxx/CVE-2021-44367.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44368.json b/2021/44xxx/CVE-2021-44368.json index c1adc3a7405..4ac439dcf02 100644 --- a/2021/44xxx/CVE-2021-44368.json +++ b/2021/44xxx/CVE-2021-44368.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44369.json b/2021/44xxx/CVE-2021-44369.json index 564c308c985..5ce2f162e72 100644 --- a/2021/44xxx/CVE-2021-44369.json +++ b/2021/44xxx/CVE-2021-44369.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44370.json b/2021/44xxx/CVE-2021-44370.json index 4fdce8ab154..7744255253c 100644 --- a/2021/44xxx/CVE-2021-44370.json +++ b/2021/44xxx/CVE-2021-44370.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44371.json b/2021/44xxx/CVE-2021-44371.json index bef77ad125b..9f500cd4780 100644 --- a/2021/44xxx/CVE-2021-44371.json +++ b/2021/44xxx/CVE-2021-44371.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44372.json b/2021/44xxx/CVE-2021-44372.json index fd04dc07cc6..acb9099b0ce 100644 --- a/2021/44xxx/CVE-2021-44372.json +++ b/2021/44xxx/CVE-2021-44372.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44373.json b/2021/44xxx/CVE-2021-44373.json index 360997c9f13..9f9c9b5a709 100644 --- a/2021/44xxx/CVE-2021-44373.json +++ b/2021/44xxx/CVE-2021-44373.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44374.json b/2021/44xxx/CVE-2021-44374.json index e3e80fb6bab..0b6f6bfba2f 100644 --- a/2021/44xxx/CVE-2021-44374.json +++ b/2021/44xxx/CVE-2021-44374.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44376.json b/2021/44xxx/CVE-2021-44376.json index a4482442f9b..3a17e806e86 100644 --- a/2021/44xxx/CVE-2021-44376.json +++ b/2021/44xxx/CVE-2021-44376.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44377.json b/2021/44xxx/CVE-2021-44377.json index 7a700981f1a..3e4639debf7 100644 --- a/2021/44xxx/CVE-2021-44377.json +++ b/2021/44xxx/CVE-2021-44377.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44378.json b/2021/44xxx/CVE-2021-44378.json index 89e017686b2..9b2b24c8130 100644 --- a/2021/44xxx/CVE-2021-44378.json +++ b/2021/44xxx/CVE-2021-44378.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44379.json b/2021/44xxx/CVE-2021-44379.json index 55cabd9832e..ec6af3abdd3 100644 --- a/2021/44xxx/CVE-2021-44379.json +++ b/2021/44xxx/CVE-2021-44379.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44380.json b/2021/44xxx/CVE-2021-44380.json index 362036adbd5..79fa1d91be3 100644 --- a/2021/44xxx/CVE-2021-44380.json +++ b/2021/44xxx/CVE-2021-44380.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44381.json b/2021/44xxx/CVE-2021-44381.json index 2148b08dd58..d7b476dca89 100644 --- a/2021/44xxx/CVE-2021-44381.json +++ b/2021/44xxx/CVE-2021-44381.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44382.json b/2021/44xxx/CVE-2021-44382.json index 5d3af7e3183..6ed023b3602 100644 --- a/2021/44xxx/CVE-2021-44382.json +++ b/2021/44xxx/CVE-2021-44382.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44383.json b/2021/44xxx/CVE-2021-44383.json index d743b9beed5..0dd8b22c900 100644 --- a/2021/44xxx/CVE-2021-44383.json +++ b/2021/44xxx/CVE-2021-44383.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44384.json b/2021/44xxx/CVE-2021-44384.json index 7c75f00e8cc..2a83a5725e5 100644 --- a/2021/44xxx/CVE-2021-44384.json +++ b/2021/44xxx/CVE-2021-44384.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44385.json b/2021/44xxx/CVE-2021-44385.json index b9bf00b3df0..9188db58e00 100644 --- a/2021/44xxx/CVE-2021-44385.json +++ b/2021/44xxx/CVE-2021-44385.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44386.json b/2021/44xxx/CVE-2021-44386.json index 33a91728117..faba6ff6336 100644 --- a/2021/44xxx/CVE-2021-44386.json +++ b/2021/44xxx/CVE-2021-44386.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44387.json b/2021/44xxx/CVE-2021-44387.json index 821bd9d1690..2f3900bb910 100644 --- a/2021/44xxx/CVE-2021-44387.json +++ b/2021/44xxx/CVE-2021-44387.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44388.json b/2021/44xxx/CVE-2021-44388.json index 95289c22397..cc15b891429 100644 --- a/2021/44xxx/CVE-2021-44388.json +++ b/2021/44xxx/CVE-2021-44388.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44389.json b/2021/44xxx/CVE-2021-44389.json index c6a1dbfbab4..ce6c2a6f90b 100644 --- a/2021/44xxx/CVE-2021-44389.json +++ b/2021/44xxx/CVE-2021-44389.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44390.json b/2021/44xxx/CVE-2021-44390.json index 68ef77beec0..bad06c0e546 100644 --- a/2021/44xxx/CVE-2021-44390.json +++ b/2021/44xxx/CVE-2021-44390.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44391.json b/2021/44xxx/CVE-2021-44391.json index 4c13da9501c..029e0395f89 100644 --- a/2021/44xxx/CVE-2021-44391.json +++ b/2021/44xxx/CVE-2021-44391.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44392.json b/2021/44xxx/CVE-2021-44392.json index 01c7e5eaf27..43cf45ce3b1 100644 --- a/2021/44xxx/CVE-2021-44392.json +++ b/2021/44xxx/CVE-2021-44392.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44393.json b/2021/44xxx/CVE-2021-44393.json index 9a7af274265..999642d7bb8 100644 --- a/2021/44xxx/CVE-2021-44393.json +++ b/2021/44xxx/CVE-2021-44393.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44395.json b/2021/44xxx/CVE-2021-44395.json index 836076d16bd..3fbad17057e 100644 --- a/2021/44xxx/CVE-2021-44395.json +++ b/2021/44xxx/CVE-2021-44395.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44396.json b/2021/44xxx/CVE-2021-44396.json index aff8ed81cfd..d35e4ac6387 100644 --- a/2021/44xxx/CVE-2021-44396.json +++ b/2021/44xxx/CVE-2021-44396.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44397.json b/2021/44xxx/CVE-2021-44397.json index 2322a612dd7..a96730de7e3 100644 --- a/2021/44xxx/CVE-2021-44397.json +++ b/2021/44xxx/CVE-2021-44397.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44398.json b/2021/44xxx/CVE-2021-44398.json index 165ba3e680b..824ce434211 100644 --- a/2021/44xxx/CVE-2021-44398.json +++ b/2021/44xxx/CVE-2021-44398.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44399.json b/2021/44xxx/CVE-2021-44399.json index 3d25cc4d3be..751069ace07 100644 --- a/2021/44xxx/CVE-2021-44399.json +++ b/2021/44xxx/CVE-2021-44399.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44400.json b/2021/44xxx/CVE-2021-44400.json index 44f26e29d8e..335a1b86881 100644 --- a/2021/44xxx/CVE-2021-44400.json +++ b/2021/44xxx/CVE-2021-44400.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44401.json b/2021/44xxx/CVE-2021-44401.json index 4a1539fc182..ccb2aeacd68 100644 --- a/2021/44xxx/CVE-2021-44401.json +++ b/2021/44xxx/CVE-2021-44401.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44402.json b/2021/44xxx/CVE-2021-44402.json index d0d23399376..16a51a33d03 100644 --- a/2021/44xxx/CVE-2021-44402.json +++ b/2021/44xxx/CVE-2021-44402.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44403.json b/2021/44xxx/CVE-2021-44403.json index e9a36b17035..30d71c43e20 100644 --- a/2021/44xxx/CVE-2021-44403.json +++ b/2021/44xxx/CVE-2021-44403.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44404.json b/2021/44xxx/CVE-2021-44404.json index 92a05f8c7d7..a4e50134a2e 100644 --- a/2021/44xxx/CVE-2021-44404.json +++ b/2021/44xxx/CVE-2021-44404.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44405.json b/2021/44xxx/CVE-2021-44405.json index 6a41419d85f..62e6177d43c 100644 --- a/2021/44xxx/CVE-2021-44405.json +++ b/2021/44xxx/CVE-2021-44405.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44406.json b/2021/44xxx/CVE-2021-44406.json index a819d88f678..34cdad27fa7 100644 --- a/2021/44xxx/CVE-2021-44406.json +++ b/2021/44xxx/CVE-2021-44406.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44407.json b/2021/44xxx/CVE-2021-44407.json index 40a5a671a6f..e00ff8ccb37 100644 --- a/2021/44xxx/CVE-2021-44407.json +++ b/2021/44xxx/CVE-2021-44407.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44408.json b/2021/44xxx/CVE-2021-44408.json index 63266360369..84bce2c0cea 100644 --- a/2021/44xxx/CVE-2021-44408.json +++ b/2021/44xxx/CVE-2021-44408.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44409.json b/2021/44xxx/CVE-2021-44409.json index 15046f37c72..d32cb190521 100644 --- a/2021/44xxx/CVE-2021-44409.json +++ b/2021/44xxx/CVE-2021-44409.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44410.json b/2021/44xxx/CVE-2021-44410.json index e9f5bec3cf1..aa006032ae9 100644 --- a/2021/44xxx/CVE-2021-44410.json +++ b/2021/44xxx/CVE-2021-44410.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44411.json b/2021/44xxx/CVE-2021-44411.json index e9456837752..498dd8cf00f 100644 --- a/2021/44xxx/CVE-2021-44411.json +++ b/2021/44xxx/CVE-2021-44411.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44412.json b/2021/44xxx/CVE-2021-44412.json index b0ffdb8abcb..3220b4b373a 100644 --- a/2021/44xxx/CVE-2021-44412.json +++ b/2021/44xxx/CVE-2021-44412.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44413.json b/2021/44xxx/CVE-2021-44413.json index e21584c2a88..4283912a6de 100644 --- a/2021/44xxx/CVE-2021-44413.json +++ b/2021/44xxx/CVE-2021-44413.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44414.json b/2021/44xxx/CVE-2021-44414.json index 2901e290bac..7cc408d5f5f 100644 --- a/2021/44xxx/CVE-2021-44414.json +++ b/2021/44xxx/CVE-2021-44414.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44415.json b/2021/44xxx/CVE-2021-44415.json index d0adf9e2d20..bd085948bfe 100644 --- a/2021/44xxx/CVE-2021-44415.json +++ b/2021/44xxx/CVE-2021-44415.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44416.json b/2021/44xxx/CVE-2021-44416.json index 99d52393eb6..1b8e441cd06 100644 --- a/2021/44xxx/CVE-2021-44416.json +++ b/2021/44xxx/CVE-2021-44416.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44417.json b/2021/44xxx/CVE-2021-44417.json index c226ba708b0..79d8c812247 100644 --- a/2021/44xxx/CVE-2021-44417.json +++ b/2021/44xxx/CVE-2021-44417.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44418.json b/2021/44xxx/CVE-2021-44418.json index 6edaf85fb51..e62f6ad4510 100644 --- a/2021/44xxx/CVE-2021-44418.json +++ b/2021/44xxx/CVE-2021-44418.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/44xxx/CVE-2021-44419.json b/2021/44xxx/CVE-2021-44419.json index e46ac102f7c..3ae7952d6e8 100644 --- a/2021/44xxx/CVE-2021-44419.json +++ b/2021/44xxx/CVE-2021-44419.json @@ -11,21 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Reolink", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "reolink RLC-410W v3.0.0.136_20121102" + "version_value": "n/a" } ] } } ] - } + }, + "vendor_name": "n/a" } ] } @@ -36,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "denial of service" + "value": "n/a" } ] } diff --git a/2021/4xxx/CVE-2021-4160.json b/2021/4xxx/CVE-2021-4160.json index aa0eff72f35..a5ebeb81c2e 100644 --- a/2021/4xxx/CVE-2021-4160.json +++ b/2021/4xxx/CVE-2021-4160.json @@ -13,24 +13,18 @@ "product": { "product_data": [ { - "product_name": "OpenSSL", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "Fixed in OpenSSL 3.0.1 (Affected 3.0.0)" - }, - { - "version_value": "Fixed in OpenSSL 1.1.1m (Affected 1.1.1-1.1.1l)" - }, - { - "version_value": "Fixed in OpenSSL 1.0.2zc-dev (Affected 1.0.2-1.0.2zb)" + "version_value": "n/a" } ] } } ] }, - "vendor_name": "OpenSSL" + "vendor_name": "n/a" } ] } @@ -65,7 +59,7 @@ "description": [ { "lang": "eng", - "value": "carry-propagating bug" + "value": "n/a" } ] } diff --git a/2022/0xxx/CVE-2022-0352.json b/2022/0xxx/CVE-2022-0352.json index 928aab25e4c..3dbb153bf56 100644 --- a/2022/0xxx/CVE-2022-0352.json +++ b/2022/0xxx/CVE-2022-0352.json @@ -12,19 +12,18 @@ "product": { "product_data": [ { - "product_name": "janeczku/calibre-web", + "product_name": "n/a", "version": { "version_data": [ { - "version_affected": "<", - "version_value": "0.6.16" + "version_value": "n/a" } ] } } ] }, - "vendor_name": "janeczku" + "vendor_name": "n/a" } ] } @@ -62,7 +61,7 @@ "description": [ { "lang": "eng", - "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + "value": "n/a" } ] } diff --git a/2022/0xxx/CVE-2022-0392.json b/2022/0xxx/CVE-2022-0392.json index e4f13270347..6be4053eb6e 100644 --- a/2022/0xxx/CVE-2022-0392.json +++ b/2022/0xxx/CVE-2022-0392.json @@ -12,19 +12,18 @@ "product": { "product_data": [ { - "product_name": "vim/vim", + "product_name": "n/a", "version": { "version_data": [ { - "version_affected": "<", - "version_value": "8.2" + "version_value": "n/a" } ] } } ] }, - "vendor_name": "vim" + "vendor_name": "n/a" } ] } @@ -62,7 +61,7 @@ "description": [ { "lang": "eng", - "value": "CWE-122 Heap-based Buffer Overflow" + "value": "n/a" } ] } diff --git a/2022/0xxx/CVE-2022-0393.json b/2022/0xxx/CVE-2022-0393.json index 893faa4118d..5f5fa3bcacd 100644 --- a/2022/0xxx/CVE-2022-0393.json +++ b/2022/0xxx/CVE-2022-0393.json @@ -12,19 +12,18 @@ "product": { "product_data": [ { - "product_name": "vim/vim", + "product_name": "n/a", "version": { "version_data": [ { - "version_affected": "<", - "version_value": "8.2" + "version_value": "n/a" } ] } } ] }, - "vendor_name": "vim" + "vendor_name": "n/a" } ] } @@ -62,7 +61,7 @@ "description": [ { "lang": "eng", - "value": "CWE-125 Out-of-bounds Read" + "value": "n/a" } ] } diff --git a/2022/0xxx/CVE-2022-0395.json b/2022/0xxx/CVE-2022-0395.json index 95b899b64c1..b25c49ed6a6 100644 --- a/2022/0xxx/CVE-2022-0395.json +++ b/2022/0xxx/CVE-2022-0395.json @@ -12,19 +12,18 @@ "product": { "product_data": [ { - "product_name": "livehelperchat/livehelperchat", + "product_name": "n/a", "version": { "version_data": [ { - "version_affected": "<", - "version_value": "3.93v" + "version_value": "n/a" } ] } } ] }, - "vendor_name": "livehelperchat" + "vendor_name": "n/a" } ] } @@ -62,7 +61,7 @@ "description": [ { "lang": "eng", - "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + "value": "n/a" } ] } diff --git a/2022/21xxx/CVE-2022-21721.json b/2022/21xxx/CVE-2022-21721.json index 67ff12323c8..fb305c58377 100644 --- a/2022/21xxx/CVE-2022-21721.json +++ b/2022/21xxx/CVE-2022-21721.json @@ -12,18 +12,18 @@ "product": { "product_data": [ { - "product_name": "next.js", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": ">= 12.0.0, < 12.0.9" + "version_value": "n/a" } ] } } ] }, - "vendor_name": "vercel" + "vendor_name": "n/a" } ] } @@ -61,7 +61,7 @@ "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "n/a" } ] } diff --git a/2022/23xxx/CVE-2022-23598.json b/2022/23xxx/CVE-2022-23598.json index 8d14df9447e..53544946278 100644 --- a/2022/23xxx/CVE-2022-23598.json +++ b/2022/23xxx/CVE-2022-23598.json @@ -12,18 +12,18 @@ "product": { "product_data": [ { - "product_name": "laminas-form", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "< 3.1.1" + "version_value": "n/a" } ] } } ] }, - "vendor_name": "laminas" + "vendor_name": "n/a" } ] } @@ -61,7 +61,7 @@ "description": [ { "lang": "eng", - "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + "value": "n/a" } ] } diff --git a/2022/23xxx/CVE-2022-23599.json b/2022/23xxx/CVE-2022-23599.json index ae40014811c..9f519037183 100644 --- a/2022/23xxx/CVE-2022-23599.json +++ b/2022/23xxx/CVE-2022-23599.json @@ -12,18 +12,18 @@ "product": { "product_data": [ { - "product_name": "Products.ATContentTypes", + "product_name": "n/a", "version": { "version_data": [ { - "version_value": "< 3.0.6" + "version_value": "n/a" } ] } } ] }, - "vendor_name": "plone" + "vendor_name": "n/a" } ] } @@ -61,15 +61,7 @@ "description": [ { "lang": "eng", - "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" - } - ] - }, - { - "description": [ - { - "lang": "eng", - "value": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" + "value": "n/a" } ] }