From 6b58a7b5b60f48d7996c907ffd8d0e2bae32617f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 6 Jul 2022 19:00:41 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/2xxx/CVE-2022-2316.json | 61 ++++++++++++++++++++++++++++++---- 2022/2xxx/CVE-2022-2318.json | 50 ++++++++++++++++++++++++++-- 2022/2xxx/CVE-2022-2332.json | 18 ++++++++++ 2022/2xxx/CVE-2022-2333.json | 18 ++++++++++ 2022/31xxx/CVE-2022-31127.json | 10 +++--- 2022/32xxx/CVE-2022-32765.json | 18 ++++++++++ 2022/33xxx/CVE-2022-33047.json | 61 ++++++++++++++++++++++++++++++---- 2022/33xxx/CVE-2022-33150.json | 18 ++++++++++ 2022/33xxx/CVE-2022-33897.json | 18 ++++++++++ 2022/33xxx/CVE-2022-33975.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34845.json | 18 ++++++++++ 2022/34xxx/CVE-2022-34850.json | 18 ++++++++++ 2022/35xxx/CVE-2022-35278.json | 18 ++++++++++ 13 files changed, 324 insertions(+), 20 deletions(-) create mode 100644 2022/2xxx/CVE-2022-2332.json create mode 100644 2022/2xxx/CVE-2022-2333.json create mode 100644 2022/32xxx/CVE-2022-32765.json create mode 100644 2022/33xxx/CVE-2022-33150.json create mode 100644 2022/33xxx/CVE-2022-33897.json create mode 100644 2022/33xxx/CVE-2022-33975.json create mode 100644 2022/34xxx/CVE-2022-34845.json create mode 100644 2022/34xxx/CVE-2022-34850.json create mode 100644 2022/35xxx/CVE-2022-35278.json diff --git a/2022/2xxx/CVE-2022-2316.json b/2022/2xxx/CVE-2022-2316.json index 5de73609475..7238c21c181 100644 --- a/2022/2xxx/CVE-2022-2316.json +++ b/2022/2xxx/CVE-2022-2316.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@devolutions.net", "ID": "CVE-2022-2316", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Devolutions Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2022.2", + "version_value": "2022.2" + } + ] + } + } + ] + }, + "vendor_name": "Devolutions" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "HTML injection vulnerability in secure messages of Devolutions Server before 2022.2 allows attackers to alter the rendering of the page or redirect a user to another site." + } + ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "HTML injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://devolutions.net/security/advisories/DEVO-2022-0006", + "name": "https://devolutions.net/security/advisories/DEVO-2022-0006" } ] } diff --git a/2022/2xxx/CVE-2022-2318.json b/2022/2xxx/CVE-2022-2318.json index 21835e6f0c5..b2e777f0d53 100644 --- a/2022/2xxx/CVE-2022-2318.json +++ b/2022/2xxx/CVE-2022-2318.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-2318", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Kernel", + "version": { + "version_data": [ + { + "version_value": "Linux Kernel version prior to kernel 5.19 rc5" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-416" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/torvalds/linux/commit/9cc02ede696272c5271a401e4f27c262359bc2f6", + "url": "https://github.com/torvalds/linux/commit/9cc02ede696272c5271a401e4f27c262359bc2f6" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges." } ] } diff --git a/2022/2xxx/CVE-2022-2332.json b/2022/2xxx/CVE-2022-2332.json new file mode 100644 index 00000000000..4ef2704e2c8 --- /dev/null +++ b/2022/2xxx/CVE-2022-2332.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2332", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2333.json b/2022/2xxx/CVE-2022-2333.json new file mode 100644 index 00000000000..c23e716390e --- /dev/null +++ b/2022/2xxx/CVE-2022-2333.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2333", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/31xxx/CVE-2022-31127.json b/2022/31xxx/CVE-2022-31127.json index 7ca0d3c36aa..40f53c33439 100644 --- a/2022/31xxx/CVE-2022-31127.json +++ b/2022/31xxx/CVE-2022-31127.json @@ -72,6 +72,11 @@ }, "references": { "reference_data": [ + { + "name": "https://next-auth.js.org/getting-started/upgrade-v4", + "refsource": "MISC", + "url": "https://next-auth.js.org/getting-started/upgrade-v4" + }, { "name": "https://github.com/nextauthjs/next-auth/security/advisories/GHSA-pgjx-7f9g-9463", "refsource": "CONFIRM", @@ -87,11 +92,6 @@ "refsource": "MISC", "url": "https://github.com/nextauthjs/next-auth/releases/tag/next-auth%40v4.9.0" }, - { - "name": "https://next-auth.js.org/getting-started/upgrade-v4", - "refsource": "MISC", - "url": "https://next-auth.js.org/getting-started/upgrade-v4" - }, { "name": "https://next-auth.js.org/providers/email#customizing-emails", "refsource": "MISC", diff --git a/2022/32xxx/CVE-2022-32765.json b/2022/32xxx/CVE-2022-32765.json new file mode 100644 index 00000000000..6a1cd8739b2 --- /dev/null +++ b/2022/32xxx/CVE-2022-32765.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-32765", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33047.json b/2022/33xxx/CVE-2022-33047.json index 85a66bb9e07..6c9d9f646e3 100644 --- a/2022/33xxx/CVE-2022-33047.json +++ b/2022/33xxx/CVE-2022-33047.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-33047", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-33047", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OTFCC v0.10.4 was discovered to contain a heap buffer overflow after free via otfccbuild.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://otfcc.com", + "refsource": "MISC", + "name": "http://otfcc.com" + }, + { + "url": "https://drive.google.com/file/d/1g3MQajVLZAaZMRfIQHSLT6XRw-B4Dmz8/view?usp=sharing", + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1g3MQajVLZAaZMRfIQHSLT6XRw-B4Dmz8/view?usp=sharing" } ] } diff --git a/2022/33xxx/CVE-2022-33150.json b/2022/33xxx/CVE-2022-33150.json new file mode 100644 index 00000000000..4b410321ca7 --- /dev/null +++ b/2022/33xxx/CVE-2022-33150.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33150", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33897.json b/2022/33xxx/CVE-2022-33897.json new file mode 100644 index 00000000000..f4374ab06ac --- /dev/null +++ b/2022/33xxx/CVE-2022-33897.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33897", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33975.json b/2022/33xxx/CVE-2022-33975.json new file mode 100644 index 00000000000..a01279fc99e --- /dev/null +++ b/2022/33xxx/CVE-2022-33975.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33975", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34845.json b/2022/34xxx/CVE-2022-34845.json new file mode 100644 index 00000000000..280c01e911e --- /dev/null +++ b/2022/34xxx/CVE-2022-34845.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34845", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34850.json b/2022/34xxx/CVE-2022-34850.json new file mode 100644 index 00000000000..654c22d667c --- /dev/null +++ b/2022/34xxx/CVE-2022-34850.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34850", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/35xxx/CVE-2022-35278.json b/2022/35xxx/CVE-2022-35278.json new file mode 100644 index 00000000000..c7cafd39b8b --- /dev/null +++ b/2022/35xxx/CVE-2022-35278.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-35278", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file