diff --git a/2022/22xxx/CVE-2022-22060.json b/2022/22xxx/CVE-2022-22060.json index 607474f2f7f..5db5b47ced6 100644 --- a/2022/22xxx/CVE-2022-22060.json +++ b/2022/22xxx/CVE-2022-22060.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-617 Reachable Assertion", + "cweId": "CWE-617" } ] } diff --git a/2022/22xxx/CVE-2022-22075.json b/2022/22xxx/CVE-2022-22075.json index 07c48d8f1f9..3d87389980c 100644 --- a/2022/22xxx/CVE-2022-22075.json +++ b/2022/22xxx/CVE-2022-22075.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-200 Information Exposure", + "cweId": "CWE-200" } ] } diff --git a/2022/22xxx/CVE-2022-22076.json b/2022/22xxx/CVE-2022-22076.json index b0a4c7ec834..b4c13a3a47a 100644 --- a/2022/22xxx/CVE-2022-22076.json +++ b/2022/22xxx/CVE-2022-22076.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-310 Cryptographic Issues", + "cweId": "CWE-310" } ] } diff --git a/2022/25xxx/CVE-2022-25678.json b/2022/25xxx/CVE-2022-25678.json index 6e59049090d..73fe5306431 100644 --- a/2022/25xxx/CVE-2022-25678.json +++ b/2022/25xxx/CVE-2022-25678.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2022/25xxx/CVE-2022-25713.json b/2022/25xxx/CVE-2022-25713.json index b6d803319e7..dc5b9c51f54 100644 --- a/2022/25xxx/CVE-2022-25713.json +++ b/2022/25xxx/CVE-2022-25713.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", + "cweId": "CWE-119" } ] } diff --git a/2022/25xxx/CVE-2022-25726.json b/2022/25xxx/CVE-2022-25726.json index e4de8ae5e23..fe11a823de4 100644 --- a/2022/25xxx/CVE-2022-25726.json +++ b/2022/25xxx/CVE-2022-25726.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2022/25xxx/CVE-2022-25730.json b/2022/25xxx/CVE-2022-25730.json index be2ec5da526..bd9e405ab84 100644 --- a/2022/25xxx/CVE-2022-25730.json +++ b/2022/25xxx/CVE-2022-25730.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2022/25xxx/CVE-2022-25731.json b/2022/25xxx/CVE-2022-25731.json index 3753dd7cd07..2e2ca0494d1 100644 --- a/2022/25xxx/CVE-2022-25731.json +++ b/2022/25xxx/CVE-2022-25731.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-131 Incorrect Calculation of Buffer Size", + "cweId": "CWE-131" } ] } diff --git a/2022/25xxx/CVE-2022-25737.json b/2022/25xxx/CVE-2022-25737.json index e7b40b44dcf..f04332e9e49 100644 --- a/2022/25xxx/CVE-2022-25737.json +++ b/2022/25xxx/CVE-2022-25737.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-457 Use of Uninitialized Variable", + "cweId": "CWE-457" } ] } diff --git a/2022/25xxx/CVE-2022-25739.json b/2022/25xxx/CVE-2022-25739.json index ba0b5fa5bd2..a7ec7d61fc6 100644 --- a/2022/25xxx/CVE-2022-25739.json +++ b/2022/25xxx/CVE-2022-25739.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-476 NULL Pointer Dereference", + "cweId": "CWE-476" } ] } diff --git a/2022/25xxx/CVE-2022-25740.json b/2022/25xxx/CVE-2022-25740.json index 0d9c565b4c8..77da6f27476 100644 --- a/2022/25xxx/CVE-2022-25740.json +++ b/2022/25xxx/CVE-2022-25740.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2022/25xxx/CVE-2022-25745.json b/2022/25xxx/CVE-2022-25745.json index 100445e19fc..a9d4c4fe83a 100644 --- a/2022/25xxx/CVE-2022-25745.json +++ b/2022/25xxx/CVE-2022-25745.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-670 Always-Incorrect Control Flow Implementation", + "cweId": "CWE-670" } ] } diff --git a/2022/25xxx/CVE-2022-25747.json b/2022/25xxx/CVE-2022-25747.json index 936c058ebf7..c38f7090b35 100644 --- a/2022/25xxx/CVE-2022-25747.json +++ b/2022/25xxx/CVE-2022-25747.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2022/33xxx/CVE-2022-33211.json b/2022/33xxx/CVE-2022-33211.json index 738a91d7022..30ff82211d8 100644 --- a/2022/33xxx/CVE-2022-33211.json +++ b/2022/33xxx/CVE-2022-33211.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2022/33xxx/CVE-2022-33222.json b/2022/33xxx/CVE-2022-33222.json index 667db9a68f7..97dd3788066 100644 --- a/2022/33xxx/CVE-2022-33222.json +++ b/2022/33xxx/CVE-2022-33222.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2022/33xxx/CVE-2022-33223.json b/2022/33xxx/CVE-2022-33223.json index c5cb8a8f54d..583f396613a 100644 --- a/2022/33xxx/CVE-2022-33223.json +++ b/2022/33xxx/CVE-2022-33223.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-476 NULL Pointer Dereference", + "cweId": "CWE-476" } ] } diff --git a/2022/33xxx/CVE-2022-33224.json b/2022/33xxx/CVE-2022-33224.json index db96772d391..a882ef0f565 100644 --- a/2022/33xxx/CVE-2022-33224.json +++ b/2022/33xxx/CVE-2022-33224.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2022/33xxx/CVE-2022-33226.json b/2022/33xxx/CVE-2022-33226.json index 6e49ac34a0f..37e4c536c04 100644 --- a/2022/33xxx/CVE-2022-33226.json +++ b/2022/33xxx/CVE-2022-33226.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2022/33xxx/CVE-2022-33227.json b/2022/33xxx/CVE-2022-33227.json index b281bc62c89..a4b503c72ef 100644 --- a/2022/33xxx/CVE-2022-33227.json +++ b/2022/33xxx/CVE-2022-33227.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-415 Double Free", + "cweId": "CWE-415" } ] } diff --git a/2022/33xxx/CVE-2022-33228.json b/2022/33xxx/CVE-2022-33228.json index 5dc67980630..298bdd0f2d6 100644 --- a/2022/33xxx/CVE-2022-33228.json +++ b/2022/33xxx/CVE-2022-33228.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2022/33xxx/CVE-2022-33230.json b/2022/33xxx/CVE-2022-33230.json index cf9ec4023a9..7e967b6ed72 100644 --- a/2022/33xxx/CVE-2022-33230.json +++ b/2022/33xxx/CVE-2022-33230.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2022/33xxx/CVE-2022-33231.json b/2022/33xxx/CVE-2022-33231.json index c591349b106..0776c7dd40f 100644 --- a/2022/33xxx/CVE-2022-33231.json +++ b/2022/33xxx/CVE-2022-33231.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-415 Double Free", + "cweId": "CWE-415" } ] } diff --git a/2022/33xxx/CVE-2022-33240.json b/2022/33xxx/CVE-2022-33240.json index b4b5f2011e6..f63808081fd 100644 --- a/2022/33xxx/CVE-2022-33240.json +++ b/2022/33xxx/CVE-2022-33240.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-704 Incorrect Type Conversion or Cast", + "cweId": "CWE-704" } ] } diff --git a/2022/33xxx/CVE-2022-33251.json b/2022/33xxx/CVE-2022-33251.json index cbb2b65e13c..06420a4d68a 100644 --- a/2022/33xxx/CVE-2022-33251.json +++ b/2022/33xxx/CVE-2022-33251.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-617 Reachable Assertion", + "cweId": "CWE-617" } ] } diff --git a/2022/33xxx/CVE-2022-33258.json b/2022/33xxx/CVE-2022-33258.json index a538e49f9d9..9ceea018337 100644 --- a/2022/33xxx/CVE-2022-33258.json +++ b/2022/33xxx/CVE-2022-33258.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2022/33xxx/CVE-2022-33259.json b/2022/33xxx/CVE-2022-33259.json index 52c66d52b20..81ed3388515 100644 --- a/2022/33xxx/CVE-2022-33259.json +++ b/2022/33xxx/CVE-2022-33259.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2022/33xxx/CVE-2022-33263.json b/2022/33xxx/CVE-2022-33263.json index 2fd74abe203..49bac40195c 100644 --- a/2022/33xxx/CVE-2022-33263.json +++ b/2022/33xxx/CVE-2022-33263.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-416 Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2022/33xxx/CVE-2022-33264.json b/2022/33xxx/CVE-2022-33264.json index 9475f3236ec..e5c0a092190 100644 --- a/2022/33xxx/CVE-2022-33264.json +++ b/2022/33xxx/CVE-2022-33264.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-121 Stack-based Buffer Overflow", + "cweId": "CWE-121" } ] } diff --git a/2022/33xxx/CVE-2022-33267.json b/2022/33xxx/CVE-2022-33267.json index f7079d73983..f7c283cce92 100644 --- a/2022/33xxx/CVE-2022-33267.json +++ b/2022/33xxx/CVE-2022-33267.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", + "cweId": "CWE-119" } ] } diff --git a/2022/33xxx/CVE-2022-33269.json b/2022/33xxx/CVE-2022-33269.json index 10b45f3aa73..f33a4f853ec 100644 --- a/2022/33xxx/CVE-2022-33269.json +++ b/2022/33xxx/CVE-2022-33269.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-190 Integer Overflow or Wraparound", + "cweId": "CWE-190" } ] } diff --git a/2022/33xxx/CVE-2022-33270.json b/2022/33xxx/CVE-2022-33270.json index e5c74aba99a..925cf70970f 100644 --- a/2022/33xxx/CVE-2022-33270.json +++ b/2022/33xxx/CVE-2022-33270.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", + "cweId": "CWE-367" } ] } diff --git a/2022/33xxx/CVE-2022-33273.json b/2022/33xxx/CVE-2022-33273.json index f9c9528c45f..d4f11e94d87 100644 --- a/2022/33xxx/CVE-2022-33273.json +++ b/2022/33xxx/CVE-2022-33273.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2022/33xxx/CVE-2022-33281.json b/2022/33xxx/CVE-2022-33281.json index 4c189c6c464..d2857088a87 100644 --- a/2022/33xxx/CVE-2022-33281.json +++ b/2022/33xxx/CVE-2022-33281.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-129 Improper Validation of Array Index", + "cweId": "CWE-129" } ] } diff --git a/2022/33xxx/CVE-2022-33282.json b/2022/33xxx/CVE-2022-33282.json index 09be2554bb1..8ccd682c70c 100644 --- a/2022/33xxx/CVE-2022-33282.json +++ b/2022/33xxx/CVE-2022-33282.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-680 Integer Overflow to Buffer Overflow", + "cweId": "CWE-680" } ] } diff --git a/2022/33xxx/CVE-2022-33287.json b/2022/33xxx/CVE-2022-33287.json index 3e3631417b8..2924234068c 100644 --- a/2022/33xxx/CVE-2022-33287.json +++ b/2022/33xxx/CVE-2022-33287.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2022/33xxx/CVE-2022-33288.json b/2022/33xxx/CVE-2022-33288.json index 04c9bef42d0..611552b5708 100644 --- a/2022/33xxx/CVE-2022-33288.json +++ b/2022/33xxx/CVE-2022-33288.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2022/33xxx/CVE-2022-33289.json b/2022/33xxx/CVE-2022-33289.json index 0155ca0721f..0b86d3feae5 100644 --- a/2022/33xxx/CVE-2022-33289.json +++ b/2022/33xxx/CVE-2022-33289.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-129 Improper Validation of Array Index", + "cweId": "CWE-129" } ] } diff --git a/2022/33xxx/CVE-2022-33291.json b/2022/33xxx/CVE-2022-33291.json index 0c963e2887d..7ec2c2944c1 100644 --- a/2022/33xxx/CVE-2022-33291.json +++ b/2022/33xxx/CVE-2022-33291.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2022/33xxx/CVE-2022-33292.json b/2022/33xxx/CVE-2022-33292.json index 5c1c5444b88..bc1a4e8755a 100644 --- a/2022/33xxx/CVE-2022-33292.json +++ b/2022/33xxx/CVE-2022-33292.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-416 Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2022/33xxx/CVE-2022-33294.json b/2022/33xxx/CVE-2022-33294.json index 665b66058ba..c6fa09671d1 100644 --- a/2022/33xxx/CVE-2022-33294.json +++ b/2022/33xxx/CVE-2022-33294.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-476 NULL Pointer Dereference", + "cweId": "CWE-476" } ] } diff --git a/2022/33xxx/CVE-2022-33295.json b/2022/33xxx/CVE-2022-33295.json index 70921b09a65..ba915e39477 100644 --- a/2022/33xxx/CVE-2022-33295.json +++ b/2022/33xxx/CVE-2022-33295.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2022/33xxx/CVE-2022-33296.json b/2022/33xxx/CVE-2022-33296.json index d033fbd5e49..ae7e8bae1a9 100644 --- a/2022/33xxx/CVE-2022-33296.json +++ b/2022/33xxx/CVE-2022-33296.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-680 Integer Overflow to Buffer Overflow", + "cweId": "CWE-680" } ] } diff --git a/2022/33xxx/CVE-2022-33297.json b/2022/33xxx/CVE-2022-33297.json index 609e8bac05e..dfcc6a9e9e8 100644 --- a/2022/33xxx/CVE-2022-33297.json +++ b/2022/33xxx/CVE-2022-33297.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2022/33xxx/CVE-2022-33298.json b/2022/33xxx/CVE-2022-33298.json index 0d61fb74a38..f64939813f5 100644 --- a/2022/33xxx/CVE-2022-33298.json +++ b/2022/33xxx/CVE-2022-33298.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-416 Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2022/33xxx/CVE-2022-33301.json b/2022/33xxx/CVE-2022-33301.json index 190dc154d68..1fb2ef43cf3 100644 --- a/2022/33xxx/CVE-2022-33301.json +++ b/2022/33xxx/CVE-2022-33301.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-704 Incorrect Type Conversion or Cast", + "cweId": "CWE-704" } ] } diff --git a/2022/33xxx/CVE-2022-33302.json b/2022/33xxx/CVE-2022-33302.json index e1ceba791fc..4a515f3bc1b 100644 --- a/2022/33xxx/CVE-2022-33302.json +++ b/2022/33xxx/CVE-2022-33302.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-129 Improper Validation of Array Index", + "cweId": "CWE-129" } ] } diff --git a/2022/33xxx/CVE-2022-33303.json b/2022/33xxx/CVE-2022-33303.json index e6d0d87433e..8bdbca3a042 100644 --- a/2022/33xxx/CVE-2022-33303.json +++ b/2022/33xxx/CVE-2022-33303.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')", + "cweId": "CWE-400" } ] } diff --git a/2022/33xxx/CVE-2022-33304.json b/2022/33xxx/CVE-2022-33304.json index 95f52445118..87f4c0c7f1c 100644 --- a/2022/33xxx/CVE-2022-33304.json +++ b/2022/33xxx/CVE-2022-33304.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-476 NULL Pointer Dereference", + "cweId": "CWE-476" } ] } diff --git a/2022/33xxx/CVE-2022-33305.json b/2022/33xxx/CVE-2022-33305.json index 26e1a1997af..473d18112e2 100644 --- a/2022/33xxx/CVE-2022-33305.json +++ b/2022/33xxx/CVE-2022-33305.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-476 NULL Pointer Dereference", + "cweId": "CWE-476" } ] } diff --git a/2022/33xxx/CVE-2022-33307.json b/2022/33xxx/CVE-2022-33307.json index f8a51c742ae..82e51cf56e6 100644 --- a/2022/33xxx/CVE-2022-33307.json +++ b/2022/33xxx/CVE-2022-33307.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-415 Double Free", + "cweId": "CWE-415" } ] } diff --git a/2022/34xxx/CVE-2022-34144.json b/2022/34xxx/CVE-2022-34144.json index 9bf5d4b383b..eb5442db8d3 100644 --- a/2022/34xxx/CVE-2022-34144.json +++ b/2022/34xxx/CVE-2022-34144.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-617 Reachable Assertion", + "cweId": "CWE-617" } ] } diff --git a/2022/40xxx/CVE-2022-40503.json b/2022/40xxx/CVE-2022-40503.json index 6aa27b2a1cd..f6805510d4a 100644 --- a/2022/40xxx/CVE-2022-40503.json +++ b/2022/40xxx/CVE-2022-40503.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2022/40xxx/CVE-2022-40504.json b/2022/40xxx/CVE-2022-40504.json index 594aec76f1a..8515b4f7e69 100644 --- a/2022/40xxx/CVE-2022-40504.json +++ b/2022/40xxx/CVE-2022-40504.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-617 Reachable Assertion", + "cweId": "CWE-617" } ] } diff --git a/2022/40xxx/CVE-2022-40505.json b/2022/40xxx/CVE-2022-40505.json index 6370d3be0c2..a0ac7a5ddce 100644 --- a/2022/40xxx/CVE-2022-40505.json +++ b/2022/40xxx/CVE-2022-40505.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2022/40xxx/CVE-2022-40507.json b/2022/40xxx/CVE-2022-40507.json index 171a6022530..7b109c80021 100644 --- a/2022/40xxx/CVE-2022-40507.json +++ b/2022/40xxx/CVE-2022-40507.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-415 Double Free", + "cweId": "CWE-415" } ] } diff --git a/2022/40xxx/CVE-2022-40508.json b/2022/40xxx/CVE-2022-40508.json index 2f12494f717..59140eed28a 100644 --- a/2022/40xxx/CVE-2022-40508.json +++ b/2022/40xxx/CVE-2022-40508.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-617 Reachable Assertion", + "cweId": "CWE-617" } ] } diff --git a/2022/40xxx/CVE-2022-40521.json b/2022/40xxx/CVE-2022-40521.json index 08f14008a5c..dc88964ae5a 100644 --- a/2022/40xxx/CVE-2022-40521.json +++ b/2022/40xxx/CVE-2022-40521.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-285 Improper Authorization", + "cweId": "CWE-285" } ] } diff --git a/2022/40xxx/CVE-2022-40522.json b/2022/40xxx/CVE-2022-40522.json index 333ce3c764d..091ea40ffc3 100644 --- a/2022/40xxx/CVE-2022-40522.json +++ b/2022/40xxx/CVE-2022-40522.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-415 Double Free", + "cweId": "CWE-415" } ] } diff --git a/2023/28xxx/CVE-2023-28549.json b/2023/28xxx/CVE-2023-28549.json index eeb69c38392..1006b825616 100644 --- a/2023/28xxx/CVE-2023-28549.json +++ b/2023/28xxx/CVE-2023-28549.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", + "cweId": "CWE-119" } ] } diff --git a/2023/28xxx/CVE-2023-28555.json b/2023/28xxx/CVE-2023-28555.json index cccf53cac9b..27f5037570b 100644 --- a/2023/28xxx/CVE-2023-28555.json +++ b/2023/28xxx/CVE-2023-28555.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2023/28xxx/CVE-2023-28557.json b/2023/28xxx/CVE-2023-28557.json index 9b95decabe5..aaa3aa5e62c 100644 --- a/2023/28xxx/CVE-2023-28557.json +++ b/2023/28xxx/CVE-2023-28557.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-129 Improper Validation of Array Index", + "cweId": "CWE-129" } ] } diff --git a/2023/28xxx/CVE-2023-28558.json b/2023/28xxx/CVE-2023-28558.json index 63c0a8b7fad..7015bd47a5d 100644 --- a/2023/28xxx/CVE-2023-28558.json +++ b/2023/28xxx/CVE-2023-28558.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-129 Improper Validation of Array Index", + "cweId": "CWE-129" } ] } diff --git a/2023/28xxx/CVE-2023-28559.json b/2023/28xxx/CVE-2023-28559.json index dd2890c4796..4ea43495dd6 100644 --- a/2023/28xxx/CVE-2023-28559.json +++ b/2023/28xxx/CVE-2023-28559.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2023/28xxx/CVE-2023-28560.json b/2023/28xxx/CVE-2023-28560.json index b61aaa12024..ac7430eb6b7 100644 --- a/2023/28xxx/CVE-2023-28560.json +++ b/2023/28xxx/CVE-2023-28560.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2023/28xxx/CVE-2023-28561.json b/2023/28xxx/CVE-2023-28561.json index 6504a2696cb..08a4aa2d72b 100644 --- a/2023/28xxx/CVE-2023-28561.json +++ b/2023/28xxx/CVE-2023-28561.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2023/28xxx/CVE-2023-28562.json b/2023/28xxx/CVE-2023-28562.json index 60fe7d5059e..f9ae82b3216 100644 --- a/2023/28xxx/CVE-2023-28562.json +++ b/2023/28xxx/CVE-2023-28562.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2023/28xxx/CVE-2023-28564.json b/2023/28xxx/CVE-2023-28564.json index 598f9f61c0d..ea4e5514577 100644 --- a/2023/28xxx/CVE-2023-28564.json +++ b/2023/28xxx/CVE-2023-28564.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-823 Use of Out-of-range Pointer Offset", + "cweId": "CWE-823" } ] } diff --git a/2023/28xxx/CVE-2023-28565.json b/2023/28xxx/CVE-2023-28565.json index c7a51bcf6f0..9c36480752a 100644 --- a/2023/28xxx/CVE-2023-28565.json +++ b/2023/28xxx/CVE-2023-28565.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-129 Improper Validation of Array Index", + "cweId": "CWE-129" } ] } diff --git a/2023/28xxx/CVE-2023-28567.json b/2023/28xxx/CVE-2023-28567.json index bddd3ff6bc2..0c2711c48c4 100644 --- a/2023/28xxx/CVE-2023-28567.json +++ b/2023/28xxx/CVE-2023-28567.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-129 Improper Validation of Array Index", + "cweId": "CWE-129" } ] } diff --git a/2023/28xxx/CVE-2023-28571.json b/2023/28xxx/CVE-2023-28571.json index 26877245644..58f45696ad3 100644 --- a/2023/28xxx/CVE-2023-28571.json +++ b/2023/28xxx/CVE-2023-28571.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2023/28xxx/CVE-2023-28573.json b/2023/28xxx/CVE-2023-28573.json index 7bfcdbbb2f0..f9d944c4342 100644 --- a/2023/28xxx/CVE-2023-28573.json +++ b/2023/28xxx/CVE-2023-28573.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-129 Improper Validation of Array Index", + "cweId": "CWE-129" } ] } diff --git a/2023/28xxx/CVE-2023-28575.json b/2023/28xxx/CVE-2023-28575.json index d1cda0d88ec..d292c40d1c2 100644 --- a/2023/28xxx/CVE-2023-28575.json +++ b/2023/28xxx/CVE-2023-28575.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-823 Use of Out-of-range Pointer Offset", + "cweId": "CWE-823" } ] } diff --git a/2023/28xxx/CVE-2023-28576.json b/2023/28xxx/CVE-2023-28576.json index 458af8b3a67..bc52f5a96aa 100644 --- a/2023/28xxx/CVE-2023-28576.json +++ b/2023/28xxx/CVE-2023-28576.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", + "cweId": "CWE-367" } ] } diff --git a/2023/28xxx/CVE-2023-28577.json b/2023/28xxx/CVE-2023-28577.json index d94783e2c26..ff89329563f 100644 --- a/2023/28xxx/CVE-2023-28577.json +++ b/2023/28xxx/CVE-2023-28577.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-416 Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2023/28xxx/CVE-2023-28581.json b/2023/28xxx/CVE-2023-28581.json index 727af3f6ac7..68f7ffa0555 100644 --- a/2023/28xxx/CVE-2023-28581.json +++ b/2023/28xxx/CVE-2023-28581.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", + "cweId": "CWE-119" } ] } diff --git a/2023/28xxx/CVE-2023-28583.json b/2023/28xxx/CVE-2023-28583.json index 44529981e4b..7b5f5cf59dc 100644 --- a/2023/28xxx/CVE-2023-28583.json +++ b/2023/28xxx/CVE-2023-28583.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-415 Double Free", + "cweId": "CWE-415" } ] } diff --git a/2023/28xxx/CVE-2023-28584.json b/2023/28xxx/CVE-2023-28584.json index 9a8a0e1b194..ef1d3a4a0fc 100644 --- a/2023/28xxx/CVE-2023-28584.json +++ b/2023/28xxx/CVE-2023-28584.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-285 Improper Authorization", + "cweId": "CWE-285" } ] } diff --git a/2023/33xxx/CVE-2023-33014.json b/2023/33xxx/CVE-2023-33014.json index 5c97e9458be..6310895dc20 100644 --- a/2023/33xxx/CVE-2023-33014.json +++ b/2023/33xxx/CVE-2023-33014.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-20 Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2023/33xxx/CVE-2023-33015.json b/2023/33xxx/CVE-2023-33015.json index bc2a23f673d..d004d325683 100644 --- a/2023/33xxx/CVE-2023-33015.json +++ b/2023/33xxx/CVE-2023-33015.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2023/33xxx/CVE-2023-33016.json b/2023/33xxx/CVE-2023-33016.json index 6e4f11d2f53..05be70b8ddd 100644 --- a/2023/33xxx/CVE-2023-33016.json +++ b/2023/33xxx/CVE-2023-33016.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2023/33xxx/CVE-2023-33019.json b/2023/33xxx/CVE-2023-33019.json index 6fbf0508348..d173486b96e 100644 --- a/2023/33xxx/CVE-2023-33019.json +++ b/2023/33xxx/CVE-2023-33019.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-285 Improper Authorization", + "cweId": "CWE-285" } ] } diff --git a/2023/33xxx/CVE-2023-33020.json b/2023/33xxx/CVE-2023-33020.json index 453e5a6da40..04c916f1f43 100644 --- a/2023/33xxx/CVE-2023-33020.json +++ b/2023/33xxx/CVE-2023-33020.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-285 Improper Authorization", + "cweId": "CWE-285" } ] } diff --git a/2023/33xxx/CVE-2023-33021.json b/2023/33xxx/CVE-2023-33021.json index 76f08883ca5..a303e467780 100644 --- a/2023/33xxx/CVE-2023-33021.json +++ b/2023/33xxx/CVE-2023-33021.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-416 Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2023/33xxx/CVE-2023-33025.json b/2023/33xxx/CVE-2023-33025.json index f444ff257fd..6a934555622 100644 --- a/2023/33xxx/CVE-2023-33025.json +++ b/2023/33xxx/CVE-2023-33025.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2023/33xxx/CVE-2023-33026.json b/2023/33xxx/CVE-2023-33026.json index a99926966a7..e86afd68abd 100644 --- a/2023/33xxx/CVE-2023-33026.json +++ b/2023/33xxx/CVE-2023-33026.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2023/33xxx/CVE-2023-33027.json b/2023/33xxx/CVE-2023-33027.json index 05be4296f08..1801f48c123 100644 --- a/2023/33xxx/CVE-2023-33027.json +++ b/2023/33xxx/CVE-2023-33027.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-126 Buffer Over-read", + "cweId": "CWE-126" } ] } diff --git a/2023/33xxx/CVE-2023-33028.json b/2023/33xxx/CVE-2023-33028.json index 98e16d40bcb..0bd960b1f7e 100644 --- a/2023/33xxx/CVE-2023-33028.json +++ b/2023/33xxx/CVE-2023-33028.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-121 Stack-based Buffer Overflow", + "cweId": "CWE-121" } ] } diff --git a/2023/33xxx/CVE-2023-33029.json b/2023/33xxx/CVE-2023-33029.json index ee291f9843c..1fbe1bc6e3c 100644 --- a/2023/33xxx/CVE-2023-33029.json +++ b/2023/33xxx/CVE-2023-33029.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-416 Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2023/33xxx/CVE-2023-33030.json b/2023/33xxx/CVE-2023-33030.json index 8dbd2e90c61..201470188f3 100644 --- a/2023/33xxx/CVE-2023-33030.json +++ b/2023/33xxx/CVE-2023-33030.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2023/33xxx/CVE-2023-33032.json b/2023/33xxx/CVE-2023-33032.json index 38e7a87feb2..36ec518aee1 100644 --- a/2023/33xxx/CVE-2023-33032.json +++ b/2023/33xxx/CVE-2023-33032.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-190 Integer Overflow or Wraparound", + "cweId": "CWE-190" } ] } diff --git a/2023/33xxx/CVE-2023-33033.json b/2023/33xxx/CVE-2023-33033.json index 10d237cea25..909ca36cee4 100644 --- a/2023/33xxx/CVE-2023-33033.json +++ b/2023/33xxx/CVE-2023-33033.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-823 Use of Out-of-range Pointer Offset", + "cweId": "CWE-823" } ] } diff --git a/2023/33xxx/CVE-2023-33034.json b/2023/33xxx/CVE-2023-33034.json index 5443526bb7a..43ca4a73d13 100644 --- a/2023/33xxx/CVE-2023-33034.json +++ b/2023/33xxx/CVE-2023-33034.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-195 Signed-to-unsigned conversion error", + "cweId": "CWE-195" } ] } diff --git a/2023/33xxx/CVE-2023-33035.json b/2023/33xxx/CVE-2023-33035.json index 2d7dfaa76bc..4534fc52f37 100644 --- a/2023/33xxx/CVE-2023-33035.json +++ b/2023/33xxx/CVE-2023-33035.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", + "cweId": "CWE-120" } ] } diff --git a/2023/33xxx/CVE-2023-33039.json b/2023/33xxx/CVE-2023-33039.json index 478d6ecbfe4..4dbaf8b2cf8 100644 --- a/2023/33xxx/CVE-2023-33039.json +++ b/2023/33xxx/CVE-2023-33039.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "n/a" + "value": "CWE-416 Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2024/22xxx/CVE-2024-22359.json b/2024/22xxx/CVE-2024-22359.json index 0963d443cc2..8fb24b751fa 100644 --- a/2024/22xxx/CVE-2024-22359.json +++ b/2024/22xxx/CVE-2024-22359.json @@ -1,17 +1,120 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-22359", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.20, 7.1 through 7.1.2.16, 7.2 through 7.2.3.9, 7.3 through 7.3.2.4 and IBM DevOps Deploy 8.0 through 8.0.0.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 280897." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "UrbanCode Deploy", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "7.0", + "version_value": "7.0.5.20" + }, + { + "version_affected": "<=", + "version_name": "7.1", + "version_value": "7.1.2.16" + }, + { + "version_affected": "<=", + "version_name": "7.2", + "version_value": "7.2.3.9" + }, + { + "version_affected": "<=", + "version_name": "7.3", + "version_value": "7.3.2.4" + } + ] + } + }, + { + "product_name": "DevOps Deploy", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "8.0", + "version_value": "8.0.0.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/7148111", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/7148111" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280897", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280897" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/3xxx/CVE-2024-3716.json b/2024/3xxx/CVE-2024-3716.json new file mode 100644 index 00000000000..7743a5fe067 --- /dev/null +++ b/2024/3xxx/CVE-2024-3716.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3716", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file