mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
58369ce55b
commit
4cb21c30d6
@ -1,18 +1,97 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "hirt@hitachi.co.jp",
|
||||
"ID": "CVE-2021-28052",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Hitachi Content Platform Information Disclosure Vulnerability"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Hitachi Content Platform",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "8.3.7"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "9.0.0",
|
||||
"version_value": "9.2.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Hitachi Vantara"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A tenant administrator Hitachi Content Platform (HCP) may modify the configuration in another tenant without authorization, potentially allowing unauthorized access to data in the other tenant. Also, a tenant user (non-administrator) may view configuration in another tenant without authorization. This issue affects: Hitachi Vantara Hitachi Content Platform versions prior to 8.3.7; 9.0.0 versions prior to 9.2.3."
|
||||
}
|
||||
]
|
||||
},
|
||||
"generator": {
|
||||
"engine": "Vulnogram 0.0.9"
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"attackComplexity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-264 Permissions, Privileges, and Access Controls"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.hitachi.com/hirt/hitachi-sec/2021/604.html",
|
||||
"name": "https://www.hitachi.com/hirt/hitachi-sec/2021/604.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://knowledge.hitachivantara.com/Security/HCP_Multitenancy_Vulnerability",
|
||||
"name": "https://knowledge.hitachivantara.com/Security/HCP_Multitenancy_Vulnerability"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"advisory": "hitachi-sec-2021-604",
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-2852",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1349322"
|
||||
"url": "https://crbug.com/1349322",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1349322"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-2853",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1350097"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
"url": "https://crbug.com/1350097",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1350097"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-2854",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1337538"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
"url": "https://crbug.com/1337538",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1337538"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-2855",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1345042"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
"url": "https://crbug.com/1345042",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1345042"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-2856",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1345630"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
"url": "https://crbug.com/1345630",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1345630"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-2857",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1338135"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
"url": "https://crbug.com/1338135",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1338135"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-2858",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1341918"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
"url": "https://crbug.com/1341918",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1341918"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-2859",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1338412"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
"url": "https://crbug.com/1338412",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1338412"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-2860",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1345193"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
"url": "https://crbug.com/1345193",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1345193"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-2861",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1346236"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
"url": "https://crbug.com/1346236",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1346236"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-2998",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1329794"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html"
|
||||
"url": "https://crbug.com/1329794",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1329794"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3038",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1340253"
|
||||
"url": "https://crbug.com/1340253",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1340253"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3039",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1343348"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1343348",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1343348"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3040",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1341539"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1341539",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1341539"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3041",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1345947"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1345947",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1345947"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3042",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1338553"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1338553",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1338553"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3043",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1336979"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1336979",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1336979"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3044",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1051198"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1051198",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1051198"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3045",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1339648"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1339648",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1339648"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3046",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1346245"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1346245",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1346245"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3047",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1342586"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1342586",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1342586"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3048",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1303308"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1303308",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1303308"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3049",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1316892"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1316892",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1316892"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3050",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1337132"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1337132",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1337132"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3051",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1345245"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1345245",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1345245"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3052",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1346154"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1346154",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1346154"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3053",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1267867"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1267867",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1267867"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3054",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1290236"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1290236",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1290236"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3055",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1351969"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1351969",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1351969"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3056",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1329460"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1329460",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1329460"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3057",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1336904"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1336904",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1336904"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3058",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1337676"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1337676",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1337676"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3071",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1333995"
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
|
||||
"url": "https://crbug.com/1333995",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1333995"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3075",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1358134"
|
||||
"url": "https://crbug.com/1358134",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1358134"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html"
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3195",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1358381"
|
||||
"url": "https://crbug.com/1358381",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1358381"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3196",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1358090"
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
|
||||
"url": "https://crbug.com/1358090",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1358090"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3197",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1358075"
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
|
||||
"url": "https://crbug.com/1358075",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1358075"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3198",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1355682"
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
|
||||
"url": "https://crbug.com/1355682",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1355682"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3199",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1355237"
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
|
||||
"url": "https://crbug.com/1355237",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1355237"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3200",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1355103"
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
|
||||
"url": "https://crbug.com/1355103",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1355103"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3201",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1343104"
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
|
||||
"url": "https://crbug.com/1343104",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1343104"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
18
2022/3xxx/CVE-2022-3304.json
Normal file
18
2022/3xxx/CVE-2022-3304.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3304",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3305.json
Normal file
18
2022/3xxx/CVE-2022-3305.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3305",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3306.json
Normal file
18
2022/3xxx/CVE-2022-3306.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3306",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3307.json
Normal file
18
2022/3xxx/CVE-2022-3307.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3307",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3308.json
Normal file
18
2022/3xxx/CVE-2022-3308.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3308",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3309.json
Normal file
18
2022/3xxx/CVE-2022-3309.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3309",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3310.json
Normal file
18
2022/3xxx/CVE-2022-3310.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3310",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3311.json
Normal file
18
2022/3xxx/CVE-2022-3311.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3311",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3312.json
Normal file
18
2022/3xxx/CVE-2022-3312.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3312",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3313.json
Normal file
18
2022/3xxx/CVE-2022-3313.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3313",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3314.json
Normal file
18
2022/3xxx/CVE-2022-3314.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3314",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3315.json
Normal file
18
2022/3xxx/CVE-2022-3315.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3315",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3316.json
Normal file
18
2022/3xxx/CVE-2022-3316.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3316",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3317.json
Normal file
18
2022/3xxx/CVE-2022-3317.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3317",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3318.json
Normal file
18
2022/3xxx/CVE-2022-3318.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3318",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/3xxx/CVE-2022-3319.json
Normal file
18
2022/3xxx/CVE-2022-3319.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-3319",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -1,17 +1,66 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-40043",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2022-40043",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Centreon v20.10.18 was discovered to contain a SQL injection vulnerability via the esc_name (Escalation Name) parameter at Configuration/Notifications/Escalations."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/centreon/centreon/releases",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/centreon/centreon/releases"
|
||||
},
|
||||
{
|
||||
"url": "https://www.hakaioffensivesecurity.com/centreon-sqli-and-xss-vulnerability/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.hakaioffensivesecurity.com/centreon-sqli-and-xss-vulnerability/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,66 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-40044",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2022-40044",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Centreon v20.10.18 was discovered to contain a cross-site scripting (XSS) vulnerability via the esc_name (Escalation Name) parameter at Configuration/Notifications/Escalations. This vulnerability allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/centreon/centreon/releases",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/centreon/centreon/releases"
|
||||
},
|
||||
{
|
||||
"url": "https://www.hakaioffensivesecurity.com/centreon-sqli-and-xss-vulnerability/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.hakaioffensivesecurity.com/centreon-sqli-and-xss-vulnerability/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,61 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-40784",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2022-40784",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Unlimited strcpy on user input when setting a locale file leads to stack buffer overflow in mIPC camera firmware 5.3.1.2003161406."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://hackmd.io/@_zOX-PXQQFmCETA_RZIgow/BkOhIU1oc",
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@_zOX-PXQQFmCETA_RZIgow/BkOhIU1oc"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user