diff --git a/2020/28xxx/CVE-2020-28102.json b/2020/28xxx/CVE-2020-28102.json index 388965db1cb..f4fada211dc 100644 --- a/2020/28xxx/CVE-2020-28102.json +++ b/2020/28xxx/CVE-2020-28102.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28102", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28102", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "cscms v4.1 allows for SQL injection via the \"js_del\" function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/chshcms/cscms/issues/9", + "refsource": "MISC", + "name": "https://github.com/chshcms/cscms/issues/9" } ] } diff --git a/2020/28xxx/CVE-2020-28103.json b/2020/28xxx/CVE-2020-28103.json index cd00d83841d..ea214df1af7 100644 --- a/2020/28xxx/CVE-2020-28103.json +++ b/2020/28xxx/CVE-2020-28103.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-28103", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-28103", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "cscms v4.1 allows for SQL injection via the \"page_del\" function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/chshcms/cscms/issues/8", + "refsource": "MISC", + "name": "https://github.com/chshcms/cscms/issues/8" } ] } diff --git a/2021/43xxx/CVE-2021-43566.json b/2021/43xxx/CVE-2021-43566.json index 50100a961f9..d713854a374 100644 --- a/2021/43xxx/CVE-2021-43566.json +++ b/2021/43xxx/CVE-2021-43566.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-43566", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-43566", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.samba.org/samba/history/", + "refsource": "MISC", + "name": "https://www.samba.org/samba/history/" + }, + { + "url": "https://bugzilla.samba.org/show_bug.cgi?id=13979", + "refsource": "MISC", + "name": "https://bugzilla.samba.org/show_bug.cgi?id=13979" + }, + { + "refsource": "MISC", + "name": "https://www.samba.org/samba/security/CVE-2021-43566.html", + "url": "https://www.samba.org/samba/security/CVE-2021-43566.html" } ] } diff --git a/2022/0xxx/CVE-2022-0193.json b/2022/0xxx/CVE-2022-0193.json new file mode 100644 index 00000000000..5c3cccfea27 --- /dev/null +++ b/2022/0xxx/CVE-2022-0193.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0193", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/21xxx/CVE-2022-21661.json b/2022/21xxx/CVE-2022-21661.json index ceffc5f4950..20c2f5bcd36 100644 --- a/2022/21xxx/CVE-2022-21661.json +++ b/2022/21xxx/CVE-2022-21661.json @@ -88,6 +88,11 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-020/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-020/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5039", + "url": "https://www.debian.org/security/2022/dsa-5039" } ] }, diff --git a/2022/21xxx/CVE-2022-21662.json b/2022/21xxx/CVE-2022-21662.json index 86e3e8f35df..9c63405675c 100644 --- a/2022/21xxx/CVE-2022-21662.json +++ b/2022/21xxx/CVE-2022-21662.json @@ -78,6 +78,11 @@ "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-699q-3hj9-889w", "refsource": "CONFIRM", "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-699q-3hj9-889w" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5039", + "url": "https://www.debian.org/security/2022/dsa-5039" } ] }, diff --git a/2022/21xxx/CVE-2022-21663.json b/2022/21xxx/CVE-2022-21663.json index 69fc839b36a..e25b5a899d1 100644 --- a/2022/21xxx/CVE-2022-21663.json +++ b/2022/21xxx/CVE-2022-21663.json @@ -78,6 +78,11 @@ "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-jmmq-m8p8-332h", "refsource": "CONFIRM", "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-jmmq-m8p8-332h" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5039", + "url": "https://www.debian.org/security/2022/dsa-5039" } ] }, diff --git a/2022/21xxx/CVE-2022-21664.json b/2022/21xxx/CVE-2022-21664.json index 832dfd1cd5b..3fe3e1047b4 100644 --- a/2022/21xxx/CVE-2022-21664.json +++ b/2022/21xxx/CVE-2022-21664.json @@ -83,6 +83,11 @@ "name": "https://github.com/WordPress/wordpress-develop/commit/c09ccfbc547d75b392dbccc1ef0b4442ccd3c957", "refsource": "MISC", "url": "https://github.com/WordPress/wordpress-develop/commit/c09ccfbc547d75b392dbccc1ef0b4442ccd3c957" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5039", + "url": "https://www.debian.org/security/2022/dsa-5039" } ] },