diff --git a/2022/3xxx/CVE-2022-3662.json b/2022/3xxx/CVE-2022-3662.json index 221811bbe7a..50541a71fdb 100644 --- a/2022/3xxx/CVE-2022-3662.json +++ b/2022/3xxx/CVE-2022-3662.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -57,19 +57,25 @@ "cvss": { "version": "3.1", "baseScore": "7.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/issues\/802" + "url": "https://github.com/axiomatic-systems/Bento4/issues/802", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/802" }, { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/files\/9817606\/mp42hls_cuaf_Ap4Sample99.zip" + "url": "https://github.com/axiomatic-systems/Bento4/files/9817606/mp42hls_cuaf_Ap4Sample99.zip", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/files/9817606/mp42hls_cuaf_Ap4Sample99.zip" }, { - "url": "https:\/\/vuldb.com\/?id.212002" + "url": "https://vuldb.com/?id.212002", + "refsource": "MISC", + "name": "https://vuldb.com/?id.212002" } ] } diff --git a/2022/3xxx/CVE-2022-3663.json b/2022/3xxx/CVE-2022-3663.json index d2474ac694d..8cd6dca9972 100644 --- a/2022/3xxx/CVE-2022-3663.json +++ b/2022/3xxx/CVE-2022-3663.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -57,19 +57,25 @@ "cvss": { "version": "3.1", "baseScore": "5.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/issues\/800" + "url": "https://github.com/axiomatic-systems/Bento4/issues/800", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/800" }, { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/files\/9817303\/mp4fragment_npd_Ap4StsdAtom.cpp75.zip" + "url": "https://github.com/axiomatic-systems/Bento4/files/9817303/mp4fragment_npd_Ap4StsdAtom.cpp75.zip", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/files/9817303/mp4fragment_npd_Ap4StsdAtom.cpp75.zip" }, { - "url": "https:\/\/vuldb.com\/?id.212003" + "url": "https://vuldb.com/?id.212003", + "refsource": "MISC", + "name": "https://vuldb.com/?id.212003" } ] } diff --git a/2022/3xxx/CVE-2022-3664.json b/2022/3xxx/CVE-2022-3664.json index 2092d9fcf9d..d83c0f8b6db 100644 --- a/2022/3xxx/CVE-2022-3664.json +++ b/2022/3xxx/CVE-2022-3664.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -57,19 +57,25 @@ "cvss": { "version": "3.1", "baseScore": "7.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/issues\/794" + "url": "https://github.com/axiomatic-systems/Bento4/issues/794", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/794" }, { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/files\/9746288\/avcinfo_poc1.zip" + "url": "https://github.com/axiomatic-systems/Bento4/files/9746288/avcinfo_poc1.zip", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/files/9746288/avcinfo_poc1.zip" }, { - "url": "https:\/\/vuldb.com\/?id.212004" + "url": "https://vuldb.com/?id.212004", + "refsource": "MISC", + "name": "https://vuldb.com/?id.212004" } ] } diff --git a/2022/3xxx/CVE-2022-3665.json b/2022/3xxx/CVE-2022-3665.json index e3ef5d8f225..86d6bbb9b20 100644 --- a/2022/3xxx/CVE-2022-3665.json +++ b/2022/3xxx/CVE-2022-3665.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -57,19 +57,25 @@ "cvss": { "version": "3.1", "baseScore": "7.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/issues\/794" + "url": "https://github.com/axiomatic-systems/Bento4/issues/794", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/794" }, { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/files\/9746311\/avcinfo_poc2.zip" + "url": "https://github.com/axiomatic-systems/Bento4/files/9746311/avcinfo_poc2.zip", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/files/9746311/avcinfo_poc2.zip" }, { - "url": "https:\/\/vuldb.com\/?id.212005" + "url": "https://vuldb.com/?id.212005", + "refsource": "MISC", + "name": "https://vuldb.com/?id.212005" } ] } diff --git a/2022/3xxx/CVE-2022-3666.json b/2022/3xxx/CVE-2022-3666.json index 8f700641f16..fbab1476ae5 100644 --- a/2022/3xxx/CVE-2022-3666.json +++ b/2022/3xxx/CVE-2022-3666.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -57,19 +57,25 @@ "cvss": { "version": "3.1", "baseScore": "7.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/issues\/793" + "url": "https://github.com/axiomatic-systems/Bento4/issues/793", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/793" }, { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/files\/9744391\/mp42ts_poc.zip" + "url": "https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip" }, { - "url": "https:\/\/vuldb.com\/?id.212006" + "url": "https://vuldb.com/?id.212006", + "refsource": "MISC", + "name": "https://vuldb.com/?id.212006" } ] } diff --git a/2022/3xxx/CVE-2022-3667.json b/2022/3xxx/CVE-2022-3667.json index 29c61c2500b..46efabb352c 100644 --- a/2022/3xxx/CVE-2022-3667.json +++ b/2022/3xxx/CVE-2022-3667.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -57,19 +57,25 @@ "cvss": { "version": "3.1", "baseScore": "7.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/issues\/789" + "url": "https://github.com/axiomatic-systems/Bento4/issues/789", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/789" }, { - "url": "https:\/\/github.com\/17ssDP\/fuzzer_crashes\/blob\/main\/Bento4\/mp42aac-hbo-01" + "url": "https://github.com/17ssDP/fuzzer_crashes/blob/main/Bento4/mp42aac-hbo-01", + "refsource": "MISC", + "name": "https://github.com/17ssDP/fuzzer_crashes/blob/main/Bento4/mp42aac-hbo-01" }, { - "url": "https:\/\/vuldb.com\/?id.212007" + "url": "https://vuldb.com/?id.212007", + "refsource": "MISC", + "name": "https://vuldb.com/?id.212007" } ] } diff --git a/2022/3xxx/CVE-2022-3668.json b/2022/3xxx/CVE-2022-3668.json index cc0a37a1eb4..83ca4d6930d 100644 --- a/2022/3xxx/CVE-2022-3668.json +++ b/2022/3xxx/CVE-2022-3668.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -57,19 +57,25 @@ "cvss": { "version": "3.1", "baseScore": "5.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/issues\/776" + "url": "https://github.com/axiomatic-systems/Bento4/issues/776", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/776" }, { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/files\/9640968\/Bug_1_POC.zip" + "url": "https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip" }, { - "url": "https:\/\/vuldb.com\/?id.212008" + "url": "https://vuldb.com/?id.212008", + "refsource": "MISC", + "name": "https://vuldb.com/?id.212008" } ] } diff --git a/2022/3xxx/CVE-2022-3669.json b/2022/3xxx/CVE-2022-3669.json index a3adb038478..93c6941ab07 100644 --- a/2022/3xxx/CVE-2022-3669.json +++ b/2022/3xxx/CVE-2022-3669.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -57,19 +57,25 @@ "cvss": { "version": "3.1", "baseScore": "5.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/issues\/776" + "url": "https://github.com/axiomatic-systems/Bento4/issues/776", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/776" }, { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/files\/9675042\/Bug_2_POC.zip" + "url": "https://github.com/axiomatic-systems/Bento4/files/9675042/Bug_2_POC.zip", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/files/9675042/Bug_2_POC.zip" }, { - "url": "https:\/\/vuldb.com\/?id.212009" + "url": "https://vuldb.com/?id.212009", + "refsource": "MISC", + "name": "https://vuldb.com/?id.212009" } ] } diff --git a/2022/3xxx/CVE-2022-3670.json b/2022/3xxx/CVE-2022-3670.json index 5628fa7ad46..baaa4d5c1c2 100644 --- a/2022/3xxx/CVE-2022-3670.json +++ b/2022/3xxx/CVE-2022-3670.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -57,19 +57,25 @@ "cvss": { "version": "3.1", "baseScore": "7.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/issues\/776" + "url": "https://github.com/axiomatic-systems/Bento4/issues/776", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/776" }, { - "url": "https:\/\/github.com\/axiomatic-systems\/Bento4\/files\/9675049\/Bug_3_POC.zip" + "url": "https://github.com/axiomatic-systems/Bento4/files/9675049/Bug_3_POC.zip", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/files/9675049/Bug_3_POC.zip" }, { - "url": "https:\/\/vuldb.com\/?id.212010" + "url": "https://vuldb.com/?id.212010", + "refsource": "MISC", + "name": "https://vuldb.com/?id.212010" } ] } diff --git a/2022/3xxx/CVE-2022-3704.json b/2022/3xxx/CVE-2022-3704.json new file mode 100644 index 00000000000..8a40bba3569 --- /dev/null +++ b/2022/3xxx/CVE-2022-3704.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3704", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3705.json b/2022/3xxx/CVE-2022-3705.json new file mode 100644 index 00000000000..6af9e9a1117 --- /dev/null +++ b/2022/3xxx/CVE-2022-3705.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3705", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/42xxx/CVE-2022-42998.json b/2022/42xxx/CVE-2022-42998.json index ef7a52d3d75..386fbe03433 100644 --- a/2022/42xxx/CVE-2022-42998.json +++ b/2022/42xxx/CVE-2022-42998.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42998", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42998", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack overflow via the srcip parameter at /goform/form2IPQoSTcAdd." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.dlink.com/en/security-bulletin/", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin/" + }, + { + "url": "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2IPQoSTcAdd", + "refsource": "MISC", + "name": "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2IPQoSTcAdd" } ] } diff --git a/2022/42xxx/CVE-2022-42999.json b/2022/42xxx/CVE-2022-42999.json index 3ec319929e5..f089c4ac56f 100644 --- a/2022/42xxx/CVE-2022-42999.json +++ b/2022/42xxx/CVE-2022-42999.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42999", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42999", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "D-Link DIR-816 A2 1.10 B05 was discovered to contain multiple command injection vulnerabilities via the admuser and admpass parameters at /goform/setSysAdm." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.dlink.com/en/security-bulletin/", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin/" + }, + { + "url": "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSysAdm", + "refsource": "MISC", + "name": "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSysAdm" } ] } diff --git a/2022/43xxx/CVE-2022-43000.json b/2022/43xxx/CVE-2022-43000.json index 214616177a2..d535ad96d33 100644 --- a/2022/43xxx/CVE-2022-43000.json +++ b/2022/43xxx/CVE-2022-43000.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-43000", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-43000", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack overflow via the wizardstep4_pskpwd parameter at /goform/form2WizardStep4." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.dlink.com/en/security-bulletin/", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin/" + }, + { + "url": "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2WizardStep4", + "refsource": "MISC", + "name": "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2WizardStep4" } ] } diff --git a/2022/43xxx/CVE-2022-43001.json b/2022/43xxx/CVE-2022-43001.json index 2bd4decce4a..844c4ba41c9 100644 --- a/2022/43xxx/CVE-2022-43001.json +++ b/2022/43xxx/CVE-2022-43001.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-43001", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-43001", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack overflow via the pskValue parameter in the setSecurity function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.dlink.com/en/security-bulletin/", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin/" + }, + { + "url": "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSecurity", + "refsource": "MISC", + "name": "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSecurity" } ] } diff --git a/2022/43xxx/CVE-2022-43002.json b/2022/43xxx/CVE-2022-43002.json index 9c12c28b30e..ae542e4a6ee 100644 --- a/2022/43xxx/CVE-2022-43002.json +++ b/2022/43xxx/CVE-2022-43002.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-43002", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-43002", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack overflow via the wizardstep54_pskpwd parameter at /goform/form2WizardStep54." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.dlink.com/en/security-bulletin/", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin/" + }, + { + "url": "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2WizardStep54", + "refsource": "MISC", + "name": "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2WizardStep54" } ] } diff --git a/2022/43xxx/CVE-2022-43003.json b/2022/43xxx/CVE-2022-43003.json index e2b90393577..219caaec242 100644 --- a/2022/43xxx/CVE-2022-43003.json +++ b/2022/43xxx/CVE-2022-43003.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-43003", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-43003", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack overflow via the pskValue parameter in the setRepeaterSecurity function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.dlink.com/en/security-bulletin/", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin/" + }, + { + "url": "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setRepeaterSecurity", + "refsource": "MISC", + "name": "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setRepeaterSecurity" } ] }