From 64f8859a74c9bb83f854e8bb38e4be15aad3f102 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 10 Mar 2022 17:25:10 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/19xxx/CVE-2019-19646.json | 5 + 2019/19xxx/CVE-2019-19880.json | 5 + 2020/13xxx/CVE-2020-13871.json | 5 + 2020/13xxx/CVE-2020-13945.json | 5 + 2020/8xxx/CVE-2020-8284.json | 5 + 2020/8xxx/CVE-2020-8285.json | 5 + 2020/9xxx/CVE-2020-9327.json | 5 + 2021/22xxx/CVE-2021-22884.json | 5 + 2021/22xxx/CVE-2021-22921.json | 5 + 2021/22xxx/CVE-2021-22922.json | 5 + 2021/23xxx/CVE-2021-23362.json | 5 + 2021/25xxx/CVE-2021-25215.json | 5 + 2021/37xxx/CVE-2021-37706.json | 5 + 2021/38xxx/CVE-2021-38988.json | 208 ++++++++++++++++----------------- 2021/38xxx/CVE-2021-38989.json | 206 ++++++++++++++++---------------- 2022/0xxx/CVE-2022-0848.json | 5 + 2022/0xxx/CVE-2022-0879.json | 18 +++ 2022/21xxx/CVE-2022-21723.json | 5 + 2022/22xxx/CVE-2022-22351.json | 206 ++++++++++++++++---------------- 2022/22xxx/CVE-2022-22947.json | 5 + 2022/23xxx/CVE-2022-23608.json | 5 + 2022/23xxx/CVE-2022-23940.json | 61 +++++++++- 2022/24xxx/CVE-2022-24112.json | 5 + 2022/24xxx/CVE-2022-24177.json | 56 ++++++++- 2022/25xxx/CVE-2022-25294.json | 56 ++++++++- 2022/25xxx/CVE-2022-25960.json | 18 +++ 2022/26xxx/CVE-2022-26488.json | 56 ++++++++- 2022/26xxx/CVE-2022-26520.json | 71 ++++++++++- 2022/26xxx/CVE-2022-26612.json | 18 +++ 2022/26xxx/CVE-2022-26618.json | 18 +++ 2022/26xxx/CVE-2022-26619.json | 18 +++ 2022/26xxx/CVE-2022-26620.json | 18 +++ 2022/26xxx/CVE-2022-26621.json | 18 +++ 2022/26xxx/CVE-2022-26622.json | 18 +++ 2022/26xxx/CVE-2022-26623.json | 18 +++ 2022/26xxx/CVE-2022-26624.json | 18 +++ 2022/26xxx/CVE-2022-26625.json | 18 +++ 2022/26xxx/CVE-2022-26626.json | 18 +++ 2022/26xxx/CVE-2022-26627.json | 18 +++ 2022/26xxx/CVE-2022-26628.json | 18 +++ 2022/26xxx/CVE-2022-26629.json | 18 +++ 2022/26xxx/CVE-2022-26630.json | 18 +++ 2022/26xxx/CVE-2022-26631.json | 18 +++ 2022/26xxx/CVE-2022-26632.json | 18 +++ 2022/26xxx/CVE-2022-26633.json | 18 +++ 2022/26xxx/CVE-2022-26634.json | 18 +++ 2022/26xxx/CVE-2022-26635.json | 18 +++ 2022/26xxx/CVE-2022-26636.json | 18 +++ 2022/26xxx/CVE-2022-26637.json | 18 +++ 2022/26xxx/CVE-2022-26638.json | 18 +++ 2022/26xxx/CVE-2022-26639.json | 18 +++ 2022/26xxx/CVE-2022-26640.json | 18 +++ 2022/26xxx/CVE-2022-26641.json | 18 +++ 2022/26xxx/CVE-2022-26642.json | 18 +++ 2022/26xxx/CVE-2022-26643.json | 18 +++ 2022/26xxx/CVE-2022-26644.json | 18 +++ 2022/26xxx/CVE-2022-26645.json | 18 +++ 2022/26xxx/CVE-2022-26646.json | 18 +++ 2022/26xxx/CVE-2022-26651.json | 18 +++ 2022/26xxx/CVE-2022-26652.json | 18 +++ 2022/26xxx/CVE-2022-26653.json | 18 +++ 61 files changed, 1300 insertions(+), 340 deletions(-) create mode 100644 2022/0xxx/CVE-2022-0879.json create mode 100644 2022/25xxx/CVE-2022-25960.json create mode 100644 2022/26xxx/CVE-2022-26612.json create mode 100644 2022/26xxx/CVE-2022-26618.json create mode 100644 2022/26xxx/CVE-2022-26619.json create mode 100644 2022/26xxx/CVE-2022-26620.json create mode 100644 2022/26xxx/CVE-2022-26621.json create mode 100644 2022/26xxx/CVE-2022-26622.json create mode 100644 2022/26xxx/CVE-2022-26623.json create mode 100644 2022/26xxx/CVE-2022-26624.json create mode 100644 2022/26xxx/CVE-2022-26625.json create mode 100644 2022/26xxx/CVE-2022-26626.json create mode 100644 2022/26xxx/CVE-2022-26627.json create mode 100644 2022/26xxx/CVE-2022-26628.json create mode 100644 2022/26xxx/CVE-2022-26629.json create mode 100644 2022/26xxx/CVE-2022-26630.json create mode 100644 2022/26xxx/CVE-2022-26631.json create mode 100644 2022/26xxx/CVE-2022-26632.json create mode 100644 2022/26xxx/CVE-2022-26633.json create mode 100644 2022/26xxx/CVE-2022-26634.json create mode 100644 2022/26xxx/CVE-2022-26635.json create mode 100644 2022/26xxx/CVE-2022-26636.json create mode 100644 2022/26xxx/CVE-2022-26637.json create mode 100644 2022/26xxx/CVE-2022-26638.json create mode 100644 2022/26xxx/CVE-2022-26639.json create mode 100644 2022/26xxx/CVE-2022-26640.json create mode 100644 2022/26xxx/CVE-2022-26641.json create mode 100644 2022/26xxx/CVE-2022-26642.json create mode 100644 2022/26xxx/CVE-2022-26643.json create mode 100644 2022/26xxx/CVE-2022-26644.json create mode 100644 2022/26xxx/CVE-2022-26645.json create mode 100644 2022/26xxx/CVE-2022-26646.json create mode 100644 2022/26xxx/CVE-2022-26651.json create mode 100644 2022/26xxx/CVE-2022-26652.json create mode 100644 2022/26xxx/CVE-2022-26653.json diff --git a/2019/19xxx/CVE-2019-19646.json b/2019/19xxx/CVE-2019-19646.json index 2bb7f8674b7..9da173b4ad8 100644 --- a/2019/19xxx/CVE-2019-19646.json +++ b/2019/19xxx/CVE-2019-19646.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2021-14", "url": "https://www.tenable.com/security/tns-2021-14" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] } diff --git a/2019/19xxx/CVE-2019-19880.json b/2019/19xxx/CVE-2019-19880.json index 84a7fd6c0f1..af0f5d659b7 100644 --- a/2019/19xxx/CVE-2019-19880.json +++ b/2019/19xxx/CVE-2019-19880.json @@ -96,6 +96,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] } diff --git a/2020/13xxx/CVE-2020-13871.json b/2020/13xxx/CVE-2020-13871.json index 2d34173e8b8..79d42095ed2 100644 --- a/2020/13xxx/CVE-2020-13871.json +++ b/2020/13xxx/CVE-2020-13871.json @@ -96,6 +96,11 @@ "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] } diff --git a/2020/13xxx/CVE-2020-13945.json b/2020/13xxx/CVE-2020-13945.json index 300701a75c5..74843581546 100644 --- a/2020/13xxx/CVE-2020-13945.json +++ b/2020/13xxx/CVE-2020-13945.json @@ -57,6 +57,11 @@ "refsource": "CONFIRM", "name": "https://lists.apache.org/thread.html/r792feb29964067a4108f53e8579a1e9bd1c8b5b9bc95618c814faf2f%40%3Cdev.apisix.apache.org%3E", "url": "https://lists.apache.org/thread.html/r792feb29964067a4108f53e8579a1e9bd1c8b5b9bc95618c814faf2f%40%3Cdev.apisix.apache.org%3E" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8284.json b/2020/8xxx/CVE-2020-8284.json index 70d7f494840..a231aa15e71 100644 --- a/2020/8xxx/CVE-2020-8284.json +++ b/2020/8xxx/CVE-2020-8284.json @@ -113,6 +113,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2022.html" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] }, diff --git a/2020/8xxx/CVE-2020-8285.json b/2020/8xxx/CVE-2020-8285.json index a89e3ce15ef..9ee453aea55 100644 --- a/2020/8xxx/CVE-2020-8285.json +++ b/2020/8xxx/CVE-2020-8285.json @@ -133,6 +133,11 @@ "url": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2022.html" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] }, diff --git a/2020/9xxx/CVE-2020-9327.json b/2020/9xxx/CVE-2020-9327.json index 24c740fe7d5..d4baa0ad63c 100644 --- a/2020/9xxx/CVE-2020-9327.json +++ b/2020/9xxx/CVE-2020-9327.json @@ -101,6 +101,11 @@ "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] } diff --git a/2021/22xxx/CVE-2021-22884.json b/2021/22xxx/CVE-2021-22884.json index cf224b38136..b15889de6e9 100644 --- a/2021/22xxx/CVE-2021-22884.json +++ b/2021/22xxx/CVE-2021-22884.json @@ -98,6 +98,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210723-0001/", "url": "https://security.netapp.com/advisory/ntap-20210723-0001/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] }, diff --git a/2021/22xxx/CVE-2021-22921.json b/2021/22xxx/CVE-2021-22921.json index d1287c7e5b9..46d276df31b 100644 --- a/2021/22xxx/CVE-2021-22921.json +++ b/2021/22xxx/CVE-2021-22921.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210805-0003/", "url": "https://security.netapp.com/advisory/ntap-20210805-0003/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] }, diff --git a/2021/22xxx/CVE-2021-22922.json b/2021/22xxx/CVE-2021-22922.json index ee9ba1f303f..00b0a2a444f 100644 --- a/2021/22xxx/CVE-2021-22922.json +++ b/2021/22xxx/CVE-2021-22922.json @@ -83,6 +83,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210902-0003/", "url": "https://security.netapp.com/advisory/ntap-20210902-0003/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] }, diff --git a/2021/23xxx/CVE-2021-23362.json b/2021/23xxx/CVE-2021-23362.json index c0c3148910d..cfedc8387dd 100644 --- a/2021/23xxx/CVE-2021-23362.json +++ b/2021/23xxx/CVE-2021-23362.json @@ -76,6 +76,11 @@ "refsource": "MISC", "name": "https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01", "url": "https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] }, diff --git a/2021/25xxx/CVE-2021-25215.json b/2021/25xxx/CVE-2021-25215.json index 002db1f0233..79accb63247 100644 --- a/2021/25xxx/CVE-2021-25215.json +++ b/2021/25xxx/CVE-2021-25215.json @@ -156,6 +156,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210521-0006/", "url": "https://security.netapp.com/advisory/ntap-20210521-0006/" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] }, diff --git a/2021/37xxx/CVE-2021-37706.json b/2021/37xxx/CVE-2021-37706.json index b1235ffe49a..1aabc5fd6a9 100644 --- a/2021/37xxx/CVE-2021-37706.json +++ b/2021/37xxx/CVE-2021-37706.json @@ -83,6 +83,11 @@ "refsource": "FULLDISC", "name": "20220304 AST-2022-004: pjproject: integer underflow on STUN message", "url": "http://seclists.org/fulldisclosure/2022/Mar/0" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html", + "url": "http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html" } ] }, diff --git a/2021/38xxx/CVE-2021-38988.json b/2021/38xxx/CVE-2021-38988.json index cc6133d62cd..9ecad32daf1 100644 --- a/2021/38xxx/CVE-2021-38988.json +++ b/2021/38xxx/CVE-2021-38988.json @@ -1,106 +1,106 @@ { - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "VIOS ", - "version" : { - "version_data" : [ - { - "version_value" : "3.1" - } - ] - } - }, - { - "product_name" : "AIX", - "version" : { - "version_data" : [ - { - "version_value" : "7.1" - }, - { - "version_value" : "7.2" - }, - { - "version_value" : "7.3" - } - ] - } - } - ] - } - } - ] - } - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - }, - "BM" : { - "PR" : "N", - "SCORE" : "6.200", - "AC" : "L", - "A" : "H", - "S" : "U", - "AV" : "L", - "C" : "N", - "I" : "N", - "UI" : "N" - } - } - }, - "CVE_data_meta" : { - "DATE_PUBLIC" : "2022-03-04T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "ID" : "CVE-2021-38988" - }, - "data_version" : "4.0", - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 6561281 (AIX)", - "name" : "https://www.ibm.com/support/pages/node/6561281", - "url" : "https://www.ibm.com/support/pages/node/6561281" - }, - { - "name" : "ibm-aix-cve202138988-dos (212950)", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/212950" - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Denial of Service", - "lang" : "eng" - } + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "VIOS ", + "version": { + "version_data": [ + { + "version_value": "3.1" + } + ] + } + }, + { + "product_name": "AIX", + "version": { + "version_data": [ + { + "version_value": "7.1" + }, + { + "version_value": "7.2" + }, + { + "version_value": "7.3" + } + ] + } + } + ] + } + } ] - } - ] - }, - "data_format" : "MITRE", - "description" : { - "description_data" : [ - { - "value" : "IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 212950.", - "lang" : "eng" - } - ] - }, - "data_type" : "CVE" -} + } + }, + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + }, + "BM": { + "PR": "N", + "SCORE": "6.200", + "AC": "L", + "A": "H", + "S": "U", + "AV": "L", + "C": "N", + "I": "N", + "UI": "N" + } + } + }, + "CVE_data_meta": { + "DATE_PUBLIC": "2022-03-04T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "ID": "CVE-2021-38988" + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 6561281 (AIX)", + "name": "https://www.ibm.com/support/pages/node/6561281", + "url": "https://www.ibm.com/support/pages/node/6561281" + }, + { + "name": "ibm-aix-cve202138988-dos (212950)", + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/212950" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Denial of Service", + "lang": "eng" + } + ] + } + ] + }, + "data_format": "MITRE", + "description": { + "description_data": [ + { + "value": "IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 212950.", + "lang": "eng" + } + ] + }, + "data_type": "CVE" +} \ No newline at end of file diff --git a/2021/38xxx/CVE-2021-38989.json b/2021/38xxx/CVE-2021-38989.json index 257bbfaffe3..0859e4502ea 100644 --- a/2021/38xxx/CVE-2021-38989.json +++ b/2021/38xxx/CVE-2021-38989.json @@ -1,106 +1,106 @@ { - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Denial of Service", - "lang" : "eng" - } - ] - } - ] - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "description" : { - "description_data" : [ - { - "value" : "IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 212951.", - "lang" : "eng" - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "problemtype": { + "problemtype_data": [ { - "product" : { - "product_data" : [ - { - "product_name" : "VIOS ", - "version" : { - "version_data" : [ - { - "version_value" : "3.1" - } - ] - } - }, - { - "version" : { - "version_data" : [ - { - "version_value" : "7.1" - }, - { - "version_value" : "7.2" - }, - { - "version_value" : "7.3" - } - ] - }, - "product_name" : "AIX" - } - ] - }, - "vendor_name" : "IBM" + "description": [ + { + "value": "Denial of Service", + "lang": "eng" + } + ] } - ] - } - }, - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2022-03-04T00:00:00", - "ID" : "CVE-2021-38989" - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RL" : "O", - "E" : "U", - "RC" : "C" - }, - "BM" : { - "C" : "N", - "I" : "N", - "UI" : "N", - "AC" : "L", - "SCORE" : "6.200", - "PR" : "N", - "A" : "H", - "AV" : "L", - "S" : "U" - } - } - }, - "data_version" : "4.0", - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/6561277", - "refsource" : "CONFIRM", - "name" : "https://www.ibm.com/support/pages/node/6561277", - "title" : "IBM Security Bulletin 6561277 (AIX)" - }, - { - "name" : "ibm-aix-cve202138989-dos (212951)", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/212951" - } - ] - } -} + ] + }, + "data_format": "MITRE", + "data_type": "CVE", + "description": { + "description_data": [ + { + "value": "IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 212951.", + "lang": "eng" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "VIOS ", + "version": { + "version_data": [ + { + "version_value": "3.1" + } + ] + } + }, + { + "version": { + "version_data": [ + { + "version_value": "7.1" + }, + { + "version_value": "7.2" + }, + { + "version_value": "7.3" + } + ] + }, + "product_name": "AIX" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2022-03-04T00:00:00", + "ID": "CVE-2021-38989" + }, + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "E": "U", + "RC": "C" + }, + "BM": { + "C": "N", + "I": "N", + "UI": "N", + "AC": "L", + "SCORE": "6.200", + "PR": "N", + "A": "H", + "AV": "L", + "S": "U" + } + } + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/6561277", + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6561277", + "title": "IBM Security Bulletin 6561277 (AIX)" + }, + { + "name": "ibm-aix-cve202138989-dos (212951)", + "title": "X-Force Vulnerability Report", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/212951" + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0848.json b/2022/0xxx/CVE-2022-0848.json index caf044beafb..776926ba423 100644 --- a/2022/0xxx/CVE-2022-0848.json +++ b/2022/0xxx/CVE-2022-0848.json @@ -79,6 +79,11 @@ "name": "https://github.com/part-db/part-db/commit/9cd4eee393028aa4cab70fcbac284b0028c0bc95", "refsource": "MISC", "url": "https://github.com/part-db/part-db/commit/9cd4eee393028aa4cab70fcbac284b0028c0bc95" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/166217/part-db-0.5.11-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/166217/part-db-0.5.11-Remote-Code-Execution.html" } ] }, diff --git a/2022/0xxx/CVE-2022-0879.json b/2022/0xxx/CVE-2022-0879.json new file mode 100644 index 00000000000..4ebe259a616 --- /dev/null +++ b/2022/0xxx/CVE-2022-0879.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0879", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21723.json b/2022/21xxx/CVE-2022-21723.json index 018901a0d80..48923f7568e 100644 --- a/2022/21xxx/CVE-2022-21723.json +++ b/2022/21xxx/CVE-2022-21723.json @@ -83,6 +83,11 @@ "refsource": "FULLDISC", "name": "20220304 AST-2022-006: pjproject: unconstrained malformed multipart SIP message", "url": "http://seclists.org/fulldisclosure/2022/Mar/2" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html", + "url": "http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22351.json b/2022/22xxx/CVE-2022-22351.json index e0fc6ac9173..fa4567e42b4 100644 --- a/2022/22xxx/CVE-2022-22351.json +++ b/2022/22xxx/CVE-2022-22351.json @@ -1,106 +1,106 @@ { - "data_format" : "MITRE", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Denial of Service" - } - ] - } - ] - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged trusted host user to exploit a vulnerability in the nimsh daemon to cause a denial of service in the nimsh daemon on another trusted host. IBM X-Force ID: 220396" - } - ] - }, - "data_type" : "CVE", - "impact" : { - "cvssv3" : { - "TM" : { - "E" : "U", - "RC" : "C", - "RL" : "O" - }, - "BM" : { - "UI" : "N", - "C" : "N", - "I" : "N", - "A" : "H", - "S" : "C", - "AV" : "A", - "PR" : "N", - "SCORE" : "6.100", - "AC" : "H" - } - } - }, - "CVE_data_meta" : { - "DATE_PUBLIC" : "2022-03-04T00:00:00", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2022-22351" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "7.1" - }, - { - "version_value" : "7.2" - }, - { - "version_value" : "7.3" - } - ] - }, - "product_name" : "AIX" - }, - { - "product_name" : "VIOS ", - "version" : { - "version_data" : [ - { - "version_value" : "3.1" - } - ] - } - } - ] - }, - "vendor_name" : "IBM" + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] } - ] - } - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "name" : "https://www.ibm.com/support/pages/node/6561275", - "title" : "IBM Security Bulletin 6561275 (AIX)", - "url" : "https://www.ibm.com/support/pages/node/6561275" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/220396", - "name" : "ibm-aix-cve202222351-dos (220396)", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF" - } - ] - }, - "data_version" : "4.0" -} + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged trusted host user to exploit a vulnerability in the nimsh daemon to cause a denial of service in the nimsh daemon on another trusted host. IBM X-Force ID: 220396" + } + ] + }, + "data_type": "CVE", + "impact": { + "cvssv3": { + "TM": { + "E": "U", + "RC": "C", + "RL": "O" + }, + "BM": { + "UI": "N", + "C": "N", + "I": "N", + "A": "H", + "S": "C", + "AV": "A", + "PR": "N", + "SCORE": "6.100", + "AC": "H" + } + } + }, + "CVE_data_meta": { + "DATE_PUBLIC": "2022-03-04T00:00:00", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2022-22351" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "7.1" + }, + { + "version_value": "7.2" + }, + { + "version_value": "7.3" + } + ] + }, + "product_name": "AIX" + }, + { + "product_name": "VIOS ", + "version": { + "version_data": [ + { + "version_value": "3.1" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/6561275", + "title": "IBM Security Bulletin 6561275 (AIX)", + "url": "https://www.ibm.com/support/pages/node/6561275" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/220396", + "name": "ibm-aix-cve202222351-dos (220396)", + "title": "X-Force Vulnerability Report", + "refsource": "XF" + } + ] + }, + "data_version": "4.0" +} \ No newline at end of file diff --git a/2022/22xxx/CVE-2022-22947.json b/2022/22xxx/CVE-2022-22947.json index e76a48c9ad6..cbe0329b5f1 100644 --- a/2022/22xxx/CVE-2022-22947.json +++ b/2022/22xxx/CVE-2022-22947.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://tanzu.vmware.com/security/cve-2022-22947", "url": "https://tanzu.vmware.com/security/cve-2022-22947" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23608.json b/2022/23xxx/CVE-2022-23608.json index 5fd04591adf..925b323b6d6 100644 --- a/2022/23xxx/CVE-2022-23608.json +++ b/2022/23xxx/CVE-2022-23608.json @@ -83,6 +83,11 @@ "refsource": "FULLDISC", "name": "20220304 AST-2022-005: pjproject: undefined behavior after freeing a dialog set", "url": "http://seclists.org/fulldisclosure/2022/Mar/1" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html", + "url": "http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23940.json b/2022/23xxx/CVE-2022-23940.json index 3924b5971ae..ce544bcdbd4 100644 --- a/2022/23xxx/CVE-2022-23940.json +++ b/2022/23xxx/CVE-2022-23940.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-23940", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-23940", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SuiteCRM through 7.12.1 and 8.x through 8.0.1 allows Remote Code Execution. Authenticated users with access to the Scheduled Reports module can achieve this by leveraging PHP deserialization in the email_recipients property. By using a crafted request, they can create a malicious report, containing a PHP-deserialization payload in the email_recipients field. Once someone accesses this report, the backend will deserialize the content of the email_recipients field and the payload gets executed. Project dependencies include a number of interesting PHP deserialization gadgets (e.g., Monolog/RCE1 from phpggc) that can be used for Code Execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/manuelz120", + "refsource": "MISC", + "name": "https://github.com/manuelz120" + }, + { + "refsource": "MISC", + "name": "https://docs.suitecrm.com/8.x/admin/releases/8.0/", + "url": "https://docs.suitecrm.com/8.x/admin/releases/8.0/" } ] } diff --git a/2022/24xxx/CVE-2022-24112.json b/2022/24xxx/CVE-2022-24112.json index c95ed7607fd..611292ea065 100644 --- a/2022/24xxx/CVE-2022-24112.json +++ b/2022/24xxx/CVE-2022-24112.json @@ -88,6 +88,11 @@ "refsource": "MLIST", "name": "[oss-security] 20220211 CVE-2022-24112: Apache APISIX: apisix/batch-requests plugin allows overwriting the X-REAL-IP header", "url": "http://www.openwall.com/lists/oss-security/2022/02/11/3" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24177.json b/2022/24xxx/CVE-2022-24177.json index 0f6e7a34b7b..8044c83e8a7 100644 --- a/2022/24xxx/CVE-2022-24177.json +++ b/2022/24xxx/CVE-2022-24177.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-24177", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-24177", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability in the component cgi-bin/ej.cgi of Ex libris ALEPH 500 v18.1 and v20 allows attackers to execute arbitrary web scripts or HTML." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/zhao1231/cve_payload/issues/1", + "url": "https://github.com/zhao1231/cve_payload/issues/1" } ] } diff --git a/2022/25xxx/CVE-2022-25294.json b/2022/25xxx/CVE-2022-25294.json index 2c1a6da2eb9..62420f7e0ee 100644 --- a/2022/25xxx/CVE-2022-25294.json +++ b/2022/25xxx/CVE-2022-25294.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-25294", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-25294", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Proofpoint Insider Threat Management Agent for Windows relies on an inherently dangerous function that could enable an unprivileged local Windows user to run arbitrary code with SYSTEM privileges. All versions prior to 7.12.1 are affected. Agents for MacOS and Linux and Cloud are unaffected. Proofpoint has released fixed software version 7.12.1. The fixed software versions are available through the customer support portal." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2022-0001", + "url": "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2022-0001" } ] } diff --git a/2022/25xxx/CVE-2022-25960.json b/2022/25xxx/CVE-2022-25960.json new file mode 100644 index 00000000000..7424ad0ba92 --- /dev/null +++ b/2022/25xxx/CVE-2022-25960.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-25960", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26488.json b/2022/26xxx/CVE-2022-26488.json index a561c4c1834..afafaa56d9e 100644 --- a/2022/26xxx/CVE-2022-26488.json +++ b/2022/26xxx/CVE-2022-26488.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-26488", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-26488", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://mail.python.org/archives/list/security-announce@python.org/thread/657Z4XULWZNIY5FRP3OWXHYKUSIH6DMN/", + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/657Z4XULWZNIY5FRP3OWXHYKUSIH6DMN/" } ] } diff --git a/2022/26xxx/CVE-2022-26520.json b/2022/26xxx/CVE-2022-26520.json index 364dee135a1..40af27b149a 100644 --- a/2022/26xxx/CVE-2022-26520.json +++ b/2022/26xxx/CVE-2022-26520.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-26520", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-26520", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** DISPUTED ** In pgjdbc before 42.3.3, an attacker (who controls the jdbc URL or properties) can call java.util.logging.FileHandler to write to arbitrary files through the loggerFile and loggerLevel connection properties. An example situation is that an attacker could create an executable JSP file under a Tomcat web root. NOTE: the vendor's position is that there is no pgjdbc vulnerability; instead, it is a vulnerability for any application to use the pgjdbc driver with untrusted connection properties." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://jdbc.postgresql.org/documentation/changelog.html#version_42.3.3", + "refsource": "MISC", + "name": "https://jdbc.postgresql.org/documentation/changelog.html#version_42.3.3" + }, + { + "url": "https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8", + "refsource": "MISC", + "name": "https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8" + }, + { + "url": "https://github.com/pgjdbc/pgjdbc/pull/2454/commits/017b929977b4f85795f9ad2fa5de6e80978b8ccc", + "refsource": "MISC", + "name": "https://github.com/pgjdbc/pgjdbc/pull/2454/commits/017b929977b4f85795f9ad2fa5de6e80978b8ccc" + }, + { + "url": "https://jdbc.postgresql.org/documentation/head/tomcat.html", + "refsource": "MISC", + "name": "https://jdbc.postgresql.org/documentation/head/tomcat.html" } ] } diff --git a/2022/26xxx/CVE-2022-26612.json b/2022/26xxx/CVE-2022-26612.json new file mode 100644 index 00000000000..8520397ab20 --- /dev/null +++ b/2022/26xxx/CVE-2022-26612.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26612", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26618.json b/2022/26xxx/CVE-2022-26618.json new file mode 100644 index 00000000000..6016d802c56 --- /dev/null +++ b/2022/26xxx/CVE-2022-26618.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26618", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26619.json b/2022/26xxx/CVE-2022-26619.json new file mode 100644 index 00000000000..cadd09386c9 --- /dev/null +++ b/2022/26xxx/CVE-2022-26619.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26619", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26620.json b/2022/26xxx/CVE-2022-26620.json new file mode 100644 index 00000000000..1d3f7ceaac8 --- /dev/null +++ b/2022/26xxx/CVE-2022-26620.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26620", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26621.json b/2022/26xxx/CVE-2022-26621.json new file mode 100644 index 00000000000..5cef3077562 --- /dev/null +++ b/2022/26xxx/CVE-2022-26621.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26621", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26622.json b/2022/26xxx/CVE-2022-26622.json new file mode 100644 index 00000000000..75959f901cb --- /dev/null +++ b/2022/26xxx/CVE-2022-26622.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26622", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26623.json b/2022/26xxx/CVE-2022-26623.json new file mode 100644 index 00000000000..8d91d88114c --- /dev/null +++ b/2022/26xxx/CVE-2022-26623.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26623", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26624.json b/2022/26xxx/CVE-2022-26624.json new file mode 100644 index 00000000000..f692b4464b4 --- /dev/null +++ b/2022/26xxx/CVE-2022-26624.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26624", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26625.json b/2022/26xxx/CVE-2022-26625.json new file mode 100644 index 00000000000..01f0eeb33f3 --- /dev/null +++ b/2022/26xxx/CVE-2022-26625.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26625", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26626.json b/2022/26xxx/CVE-2022-26626.json new file mode 100644 index 00000000000..d25a8751e03 --- /dev/null +++ b/2022/26xxx/CVE-2022-26626.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26626", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26627.json b/2022/26xxx/CVE-2022-26627.json new file mode 100644 index 00000000000..93831dbdf1a --- /dev/null +++ b/2022/26xxx/CVE-2022-26627.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26627", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26628.json b/2022/26xxx/CVE-2022-26628.json new file mode 100644 index 00000000000..5bd2013fecd --- /dev/null +++ b/2022/26xxx/CVE-2022-26628.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26628", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26629.json b/2022/26xxx/CVE-2022-26629.json new file mode 100644 index 00000000000..aa98a20d65b --- /dev/null +++ b/2022/26xxx/CVE-2022-26629.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26629", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26630.json b/2022/26xxx/CVE-2022-26630.json new file mode 100644 index 00000000000..802a61201be --- /dev/null +++ b/2022/26xxx/CVE-2022-26630.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26630", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26631.json b/2022/26xxx/CVE-2022-26631.json new file mode 100644 index 00000000000..71e3954259e --- /dev/null +++ b/2022/26xxx/CVE-2022-26631.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26631", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26632.json b/2022/26xxx/CVE-2022-26632.json new file mode 100644 index 00000000000..5939151db29 --- /dev/null +++ b/2022/26xxx/CVE-2022-26632.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26632", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26633.json b/2022/26xxx/CVE-2022-26633.json new file mode 100644 index 00000000000..b60a7b246b3 --- /dev/null +++ b/2022/26xxx/CVE-2022-26633.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26633", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26634.json b/2022/26xxx/CVE-2022-26634.json new file mode 100644 index 00000000000..2845adb1fbb --- /dev/null +++ b/2022/26xxx/CVE-2022-26634.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26634", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26635.json b/2022/26xxx/CVE-2022-26635.json new file mode 100644 index 00000000000..82a42f359d9 --- /dev/null +++ b/2022/26xxx/CVE-2022-26635.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26635", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26636.json b/2022/26xxx/CVE-2022-26636.json new file mode 100644 index 00000000000..3b6ddd43ccd --- /dev/null +++ b/2022/26xxx/CVE-2022-26636.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26636", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26637.json b/2022/26xxx/CVE-2022-26637.json new file mode 100644 index 00000000000..5e74d7d0834 --- /dev/null +++ b/2022/26xxx/CVE-2022-26637.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26637", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26638.json b/2022/26xxx/CVE-2022-26638.json new file mode 100644 index 00000000000..25836f838c5 --- /dev/null +++ b/2022/26xxx/CVE-2022-26638.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26638", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26639.json b/2022/26xxx/CVE-2022-26639.json new file mode 100644 index 00000000000..d07e2283452 --- /dev/null +++ b/2022/26xxx/CVE-2022-26639.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26639", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26640.json b/2022/26xxx/CVE-2022-26640.json new file mode 100644 index 00000000000..d8bde51f178 --- /dev/null +++ b/2022/26xxx/CVE-2022-26640.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26640", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26641.json b/2022/26xxx/CVE-2022-26641.json new file mode 100644 index 00000000000..d4beef9b359 --- /dev/null +++ b/2022/26xxx/CVE-2022-26641.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26641", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26642.json b/2022/26xxx/CVE-2022-26642.json new file mode 100644 index 00000000000..74a348024f1 --- /dev/null +++ b/2022/26xxx/CVE-2022-26642.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26642", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26643.json b/2022/26xxx/CVE-2022-26643.json new file mode 100644 index 00000000000..9ef44bfb310 --- /dev/null +++ b/2022/26xxx/CVE-2022-26643.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26643", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26644.json b/2022/26xxx/CVE-2022-26644.json new file mode 100644 index 00000000000..ee44cf8306a --- /dev/null +++ b/2022/26xxx/CVE-2022-26644.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26644", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26645.json b/2022/26xxx/CVE-2022-26645.json new file mode 100644 index 00000000000..ed6e3493193 --- /dev/null +++ b/2022/26xxx/CVE-2022-26645.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26645", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26646.json b/2022/26xxx/CVE-2022-26646.json new file mode 100644 index 00000000000..9b6195b50d1 --- /dev/null +++ b/2022/26xxx/CVE-2022-26646.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26646", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26651.json b/2022/26xxx/CVE-2022-26651.json new file mode 100644 index 00000000000..ef3ddb5d2ab --- /dev/null +++ b/2022/26xxx/CVE-2022-26651.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26651", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26652.json b/2022/26xxx/CVE-2022-26652.json new file mode 100644 index 00000000000..c6b60cfba3e --- /dev/null +++ b/2022/26xxx/CVE-2022-26652.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26652", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26653.json b/2022/26xxx/CVE-2022-26653.json new file mode 100644 index 00000000000..5d8ab5c849a --- /dev/null +++ b/2022/26xxx/CVE-2022-26653.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26653", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file