From 4d11981e0bdd4345597877611d0a027906f3fd6f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 17 Nov 2022 04:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/27xxx/CVE-2022-27812.json | 2 +- 2022/40xxx/CVE-2022-40881.json | 56 ++++++++++++++++++++++++++++++---- 2022/42xxx/CVE-2022-42187.json | 56 ++++++++++++++++++++++++++++++---- 2022/42xxx/CVE-2022-42245.json | 56 ++++++++++++++++++++++++++++++---- 2022/42xxx/CVE-2022-42246.json | 56 ++++++++++++++++++++++++++++++---- 2022/4xxx/CVE-2022-4043.json | 18 +++++++++++ 6 files changed, 219 insertions(+), 25 deletions(-) create mode 100644 2022/4xxx/CVE-2022-4043.json diff --git a/2022/27xxx/CVE-2022-27812.json b/2022/27xxx/CVE-2022-27812.json index 06931014d0e..f7f443c5bc9 100644 --- a/2022/27xxx/CVE-2022-27812.json +++ b/2022/27xxx/CVE-2022-27812.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Flooding SNS firewall 3.7.0 to 3.7.26 with udp or icmp randomizing the source through an internal to internal or external to internal interfaces will lead the firewall to overwork. It will consume 100% CPU, 100 RAM and won't be available and can crash." + "value": "Flooding SNS firewall versions 3.7.0 to 3.7.29, 3.11.0 to 3.11.17, 4.2.0 to 4.2.10, and 4.3.0 to 4.3.6 with specific forged traffic, can lead to SNS DoS." } ] }, diff --git a/2022/40xxx/CVE-2022-40881.json b/2022/40xxx/CVE-2022-40881.json index e5001582591..0e9cfbe81cc 100644 --- a/2022/40xxx/CVE-2022-40881.json +++ b/2022/40xxx/CVE-2022-40881.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-40881", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-40881", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SolarView Compact 6.00 was discovered to contain a command injection vulnerability via network_test.php" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/Timorlover/SolarView_Compact_6.0_rce_via_network_test.php", + "url": "https://github.com/Timorlover/SolarView_Compact_6.0_rce_via_network_test.php" } ] } diff --git a/2022/42xxx/CVE-2022-42187.json b/2022/42xxx/CVE-2022-42187.json index 05f98fa5658..93ad11d7d13 100644 --- a/2022/42xxx/CVE-2022-42187.json +++ b/2022/42xxx/CVE-2022-42187.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42187", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42187", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hustoj 22.09.22 has a XSS Vulnerability in /admin/problem_judge.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/zhblue/hustoj/issues/866", + "refsource": "MISC", + "name": "https://github.com/zhblue/hustoj/issues/866" } ] } diff --git a/2022/42xxx/CVE-2022-42245.json b/2022/42xxx/CVE-2022-42245.json index 6452b9dc108..9f46bbba592 100644 --- a/2022/42xxx/CVE-2022-42245.json +++ b/2022/42xxx/CVE-2022-42245.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42245", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42245", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Dreamer CMS 4.0.01 is vulnerable to SQL Injection." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitee.com/isoftforce/dreamer_cms/issues/I5U408", + "refsource": "MISC", + "name": "https://gitee.com/isoftforce/dreamer_cms/issues/I5U408" } ] } diff --git a/2022/42xxx/CVE-2022-42246.json b/2022/42xxx/CVE-2022-42246.json index 17d3bf2fecf..d97098fa7b9 100644 --- a/2022/42xxx/CVE-2022-42246.json +++ b/2022/42xxx/CVE-2022-42246.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42246", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42246", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Doufox 0.0.4 contains a CSRF vulnerability that can add system administrator account." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/farliy-hacker/Doufoxcms/issues/1", + "refsource": "MISC", + "name": "https://github.com/farliy-hacker/Doufoxcms/issues/1" } ] } diff --git a/2022/4xxx/CVE-2022-4043.json b/2022/4xxx/CVE-2022-4043.json new file mode 100644 index 00000000000..831eefcae1e --- /dev/null +++ b/2022/4xxx/CVE-2022-4043.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-4043", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file