mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3e8fcc4394
commit
5e1767c104
@ -13,18 +13,47 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"product_name": "Kubernetes",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
"version_affected": "<=",
|
||||
"version_value": "v1.18.18"
|
||||
},
|
||||
{
|
||||
"version_affected": "?>",
|
||||
"version_value": "v1.18.18"
|
||||
},
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_value": "v1.19.10"
|
||||
},
|
||||
{
|
||||
"version_affected": "?>",
|
||||
"version_value": "v1.19.10"
|
||||
},
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_value": "v1.20.6"
|
||||
},
|
||||
{
|
||||
"version_affected": "?>",
|
||||
"version_value": "v1.20.6"
|
||||
},
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_value": "v1.21.0"
|
||||
},
|
||||
{
|
||||
"version_affected": "?>",
|
||||
"version_value": "v1.21.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
"vendor_name": "Kubernetes"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,7 +100,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
"value": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -88,6 +117,11 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://groups.google.com/g/kubernetes-security-announce/c/-MFX60_wdOY",
|
||||
"name": "https://groups.google.com/g/kubernetes-security-announce/c/-MFX60_wdOY"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220225-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220225-0002/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -88,6 +88,11 @@
|
||||
"refsource": "XF",
|
||||
"name": "ibm-db2-cve202120373-info-disc (195521)",
|
||||
"title": "X-Force Vulnerability Report"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220225-0005/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220225-0005/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -48,6 +48,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2020588",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020588"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220225-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220225-0007/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -102,6 +102,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/",
|
||||
"url": "https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220225-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220225-0001/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -58,6 +58,11 @@
|
||||
"name": "https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-002",
|
||||
"refsource": "MISC",
|
||||
"url": "https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-002"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220225-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220225-0004/"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -69,4 +74,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -63,6 +63,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.willsroot.io/2022/01/cve-2022-0185.html",
|
||||
"url": "https://www.willsroot.io/2022/01/cve-2022-0185.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220225-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220225-0003/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -58,6 +58,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2022-18ad73aba6",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220225-0009/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220225-0009/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
18
2022/0xxx/CVE-2022-0762.json
Normal file
18
2022/0xxx/CVE-2022-0762.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0762",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/0xxx/CVE-2022-0763.json
Normal file
18
2022/0xxx/CVE-2022-0763.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0763",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -56,6 +56,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ",
|
||||
"url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220225-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220225-0006/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ",
|
||||
"url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220225-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220225-0006/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ",
|
||||
"url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220225-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220225-0006/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2022-2aa7c08b53",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220225-0008/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220225-0008/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user