From 7c2dd83b55e00a9f80374bda18cb09540917393c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 28 Jan 2022 13:01:11 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2017/9xxx/CVE-2017-9380.json | 5 +++++ 2018/15xxx/CVE-2018-15139.json | 5 +++++ 2018/15xxx/CVE-2018-15152.json | 5 +++++ 2018/6xxx/CVE-2018-6383.json | 5 +++++ 2019/14xxx/CVE-2019-14530.json | 5 +++++ 2019/19xxx/CVE-2019-19208.json | 5 +++++ 2020/29xxx/CVE-2020-29607.json | 5 +++++ 2022/0xxx/CVE-2022-0402.json | 18 ++++++++++++++++++ 2022/24xxx/CVE-2022-24112.json | 18 ++++++++++++++++++ 9 files changed, 71 insertions(+) create mode 100644 2022/0xxx/CVE-2022-0402.json create mode 100644 2022/24xxx/CVE-2022-24112.json diff --git a/2017/9xxx/CVE-2017-9380.json b/2017/9xxx/CVE-2017-9380.json index eefb8471bc7..1ffea8b820b 100644 --- a/2017/9xxx/CVE-2017-9380.json +++ b/2017/9xxx/CVE-2017-9380.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/163087/OpenEMR-5.0.0-Remote-Shell-Upload.html", "url": "http://packetstormsecurity.com/files/163087/OpenEMR-5.0.0-Remote-Shell-Upload.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/Hacker5preme/Exploits/tree/main/CVE-2017-9380-Exploit", + "url": "https://github.com/Hacker5preme/Exploits/tree/main/CVE-2017-9380-Exploit" } ] } diff --git a/2018/15xxx/CVE-2018-15139.json b/2018/15xxx/CVE-2018-15139.json index 04c7bb3089b..f42faabafe2 100644 --- a/2018/15xxx/CVE-2018-15139.json +++ b/2018/15xxx/CVE-2018-15139.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/163482/OpenEMR-5.0.1.3-Shell-Upload.html", "url": "http://packetstormsecurity.com/files/163482/OpenEMR-5.0.1.3-Shell-Upload.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/Hacker5preme/Exploits/tree/main/CVE-2018-15139-Exploit", + "url": "https://github.com/Hacker5preme/Exploits/tree/main/CVE-2018-15139-Exploit" } ] } diff --git a/2018/15xxx/CVE-2018-15152.json b/2018/15xxx/CVE-2018-15152.json index d96fa8395e7..a29bba95638 100644 --- a/2018/15xxx/CVE-2018-15152.json +++ b/2018/15xxx/CVE-2018-15152.json @@ -76,6 +76,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/163181/OpenEMR-5.0.1.3-Authentication-Bypass.html", "url": "http://packetstormsecurity.com/files/163181/OpenEMR-5.0.1.3-Authentication-Bypass.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/Hacker5preme/Exploits/tree/main/CVE-2018-15152-Exploit", + "url": "https://github.com/Hacker5preme/Exploits/tree/main/CVE-2018-15152-Exploit" } ] } diff --git a/2018/6xxx/CVE-2018-6383.json b/2018/6xxx/CVE-2018-6383.json index 244e85bde41..775ab6cf9aa 100644 --- a/2018/6xxx/CVE-2018-6383.json +++ b/2018/6xxx/CVE-2018-6383.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/162968/Monstra-CMS-3.0.4-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/162968/Monstra-CMS-3.0.4-Remote-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/Hacker5preme/Exploits/tree/main/CVE-2018-6383-Exploit", + "url": "https://github.com/Hacker5preme/Exploits/tree/main/CVE-2018-6383-Exploit" } ] } diff --git a/2019/14xxx/CVE-2019-14530.json b/2019/14xxx/CVE-2019-14530.json index 5fe35789b67..d0ebce34caf 100644 --- a/2019/14xxx/CVE-2019-14530.json +++ b/2019/14xxx/CVE-2019-14530.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/163375/OpenEMR-5.0.1.7-Path-Traversal.html", "url": "http://packetstormsecurity.com/files/163375/OpenEMR-5.0.1.7-Path-Traversal.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-14530-Exploit", + "url": "https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-14530-Exploit" } ] } diff --git a/2019/19xxx/CVE-2019-19208.json b/2019/19xxx/CVE-2019-19208.json index 48b65d9dccd..0f981763178 100644 --- a/2019/19xxx/CVE-2019-19208.json +++ b/2019/19xxx/CVE-2019-19208.json @@ -76,6 +76,11 @@ "refsource": "MISC", "name": "https://www.exploit-db.com/exploits/49902", "url": "https://www.exploit-db.com/exploits/49902" + }, + { + "refsource": "MISC", + "name": "https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-19208-Exploit", + "url": "https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-19208-Exploit" } ] } diff --git a/2020/29xxx/CVE-2020-29607.json b/2020/29xxx/CVE-2020-29607.json index f6f155b96cc..83176dabe8c 100644 --- a/2020/29xxx/CVE-2020-29607.json +++ b/2020/29xxx/CVE-2020-29607.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html", "url": "http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/Hacker5preme/Exploits/tree/main/CVE-2020-29607-Exploit", + "url": "https://github.com/Hacker5preme/Exploits/tree/main/CVE-2020-29607-Exploit" } ] } diff --git a/2022/0xxx/CVE-2022-0402.json b/2022/0xxx/CVE-2022-0402.json new file mode 100644 index 00000000000..cacaf37a726 --- /dev/null +++ b/2022/0xxx/CVE-2022-0402.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0402", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24112.json b/2022/24xxx/CVE-2022-24112.json new file mode 100644 index 00000000000..cf698d9e625 --- /dev/null +++ b/2022/24xxx/CVE-2022-24112.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24112", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file