diff --git a/2020/36xxx/CVE-2020-36609.json b/2020/36xxx/CVE-2020-36609.json index ba54d205b12..6159df2ad53 100644 --- a/2020/36xxx/CVE-2020-36609.json +++ b/2020/36xxx/CVE-2020-36609.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in annyshow DuxCMS 2.1. It has been classified as problematic. This affects an unknown part of the file admin.php&r=article\/AdminContent\/edit of the component Article Handler. The manipulation of the argument content leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-215115." + "value": "A vulnerability was found in annyshow DuxCMS 2.1. It has been classified as problematic. This affects an unknown part of the file admin.php&r=article/AdminContent/edit of the component Article Handler. The manipulation of the argument content leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-215115." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "2.4", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:H\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "https:\/\/gitee.com\/annyshow\/DuxCMS2.1\/issues\/I183GG" + "url": "https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG", + "refsource": "MISC", + "name": "https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG" }, { - "url": "https:\/\/vuldb.com\/?id.215115" + "url": "https://vuldb.com/?id.215115", + "refsource": "MISC", + "name": "https://vuldb.com/?id.215115" } ] } diff --git a/2020/36xxx/CVE-2020-36610.json b/2020/36xxx/CVE-2020-36610.json index 31717c45d50..d8c42cef698 100644 --- a/2020/36xxx/CVE-2020-36610.json +++ b/2020/36xxx/CVE-2020-36610.json @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "4.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "https:\/\/gitee.com\/annyshow\/DuxCMS2.1\/issues\/I183GG" + "url": "https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG", + "refsource": "MISC", + "name": "https://gitee.com/annyshow/DuxCMS2.1/issues/I183GG" }, { - "url": "https:\/\/vuldb.com\/?id.215116" + "url": "https://vuldb.com/?id.215116", + "refsource": "MISC", + "name": "https://vuldb.com/?id.215116" } ] } diff --git a/2022/46xxx/CVE-2022-46793.json b/2022/46xxx/CVE-2022-46793.json new file mode 100644 index 00000000000..624ef0409a2 --- /dev/null +++ b/2022/46xxx/CVE-2022-46793.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46793", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46794.json b/2022/46xxx/CVE-2022-46794.json new file mode 100644 index 00000000000..7b011b9374b --- /dev/null +++ b/2022/46xxx/CVE-2022-46794.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46794", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46795.json b/2022/46xxx/CVE-2022-46795.json new file mode 100644 index 00000000000..bbe6698252f --- /dev/null +++ b/2022/46xxx/CVE-2022-46795.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46795", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46796.json b/2022/46xxx/CVE-2022-46796.json new file mode 100644 index 00000000000..64f6c04b6ad --- /dev/null +++ b/2022/46xxx/CVE-2022-46796.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46796", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46797.json b/2022/46xxx/CVE-2022-46797.json new file mode 100644 index 00000000000..dbfd96e8944 --- /dev/null +++ b/2022/46xxx/CVE-2022-46797.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46797", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46798.json b/2022/46xxx/CVE-2022-46798.json new file mode 100644 index 00000000000..926913e031e --- /dev/null +++ b/2022/46xxx/CVE-2022-46798.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46798", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46799.json b/2022/46xxx/CVE-2022-46799.json new file mode 100644 index 00000000000..d4da06460bb --- /dev/null +++ b/2022/46xxx/CVE-2022-46799.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46799", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46800.json b/2022/46xxx/CVE-2022-46800.json new file mode 100644 index 00000000000..a8e8531d828 --- /dev/null +++ b/2022/46xxx/CVE-2022-46800.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46800", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46801.json b/2022/46xxx/CVE-2022-46801.json new file mode 100644 index 00000000000..428b9d0dfe7 --- /dev/null +++ b/2022/46xxx/CVE-2022-46801.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46801", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46802.json b/2022/46xxx/CVE-2022-46802.json new file mode 100644 index 00000000000..9c3946e4016 --- /dev/null +++ b/2022/46xxx/CVE-2022-46802.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46802", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46803.json b/2022/46xxx/CVE-2022-46803.json new file mode 100644 index 00000000000..00ae0707ea1 --- /dev/null +++ b/2022/46xxx/CVE-2022-46803.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46803", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46804.json b/2022/46xxx/CVE-2022-46804.json new file mode 100644 index 00000000000..29e13d84db5 --- /dev/null +++ b/2022/46xxx/CVE-2022-46804.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46804", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46805.json b/2022/46xxx/CVE-2022-46805.json new file mode 100644 index 00000000000..2410dc9061c --- /dev/null +++ b/2022/46xxx/CVE-2022-46805.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46805", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46806.json b/2022/46xxx/CVE-2022-46806.json new file mode 100644 index 00000000000..a9a25441756 --- /dev/null +++ b/2022/46xxx/CVE-2022-46806.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46806", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46807.json b/2022/46xxx/CVE-2022-46807.json new file mode 100644 index 00000000000..5dc42d67a77 --- /dev/null +++ b/2022/46xxx/CVE-2022-46807.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46807", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46808.json b/2022/46xxx/CVE-2022-46808.json new file mode 100644 index 00000000000..6e1e788f16a --- /dev/null +++ b/2022/46xxx/CVE-2022-46808.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46808", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46809.json b/2022/46xxx/CVE-2022-46809.json new file mode 100644 index 00000000000..34ddddbace1 --- /dev/null +++ b/2022/46xxx/CVE-2022-46809.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46809", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46810.json b/2022/46xxx/CVE-2022-46810.json new file mode 100644 index 00000000000..a14de77f7a0 --- /dev/null +++ b/2022/46xxx/CVE-2022-46810.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46810", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46811.json b/2022/46xxx/CVE-2022-46811.json new file mode 100644 index 00000000000..ec7b58080a5 --- /dev/null +++ b/2022/46xxx/CVE-2022-46811.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46811", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46812.json b/2022/46xxx/CVE-2022-46812.json new file mode 100644 index 00000000000..f0bf051d040 --- /dev/null +++ b/2022/46xxx/CVE-2022-46812.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46812", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46813.json b/2022/46xxx/CVE-2022-46813.json new file mode 100644 index 00000000000..b2d3cd8ca75 --- /dev/null +++ b/2022/46xxx/CVE-2022-46813.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46813", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46814.json b/2022/46xxx/CVE-2022-46814.json new file mode 100644 index 00000000000..5c694dff462 --- /dev/null +++ b/2022/46xxx/CVE-2022-46814.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46814", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46815.json b/2022/46xxx/CVE-2022-46815.json new file mode 100644 index 00000000000..32fc687b214 --- /dev/null +++ b/2022/46xxx/CVE-2022-46815.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46815", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46816.json b/2022/46xxx/CVE-2022-46816.json new file mode 100644 index 00000000000..c3f3fad0828 --- /dev/null +++ b/2022/46xxx/CVE-2022-46816.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46816", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46817.json b/2022/46xxx/CVE-2022-46817.json new file mode 100644 index 00000000000..b7fd17060ab --- /dev/null +++ b/2022/46xxx/CVE-2022-46817.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46817", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46818.json b/2022/46xxx/CVE-2022-46818.json new file mode 100644 index 00000000000..d319c27e117 --- /dev/null +++ b/2022/46xxx/CVE-2022-46818.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46818", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46819.json b/2022/46xxx/CVE-2022-46819.json new file mode 100644 index 00000000000..e871dbf351e --- /dev/null +++ b/2022/46xxx/CVE-2022-46819.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46819", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46820.json b/2022/46xxx/CVE-2022-46820.json new file mode 100644 index 00000000000..3281f8bfe86 --- /dev/null +++ b/2022/46xxx/CVE-2022-46820.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46820", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46821.json b/2022/46xxx/CVE-2022-46821.json new file mode 100644 index 00000000000..cb4b5fc83cc --- /dev/null +++ b/2022/46xxx/CVE-2022-46821.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46821", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/46xxx/CVE-2022-46822.json b/2022/46xxx/CVE-2022-46822.json new file mode 100644 index 00000000000..9920f21f4e2 --- /dev/null +++ b/2022/46xxx/CVE-2022-46822.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-46822", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/4xxx/CVE-2022-4350.json b/2022/4xxx/CVE-2022-4350.json index 7510e7df63e..083c01ccf15 100644 --- a/2022/4xxx/CVE-2022-4350.json +++ b/2022/4xxx/CVE-2022-4350.json @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "3.5", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "https:\/\/gitee.com\/mingSoft\/MCMS\/issues\/I5MT8Y" + "url": "https://gitee.com/mingSoft/MCMS/issues/I5MT8Y", + "refsource": "MISC", + "name": "https://gitee.com/mingSoft/MCMS/issues/I5MT8Y" }, { - "url": "https:\/\/vuldb.com\/?id.215112" + "url": "https://vuldb.com/?id.215112", + "refsource": "MISC", + "name": "https://vuldb.com/?id.215112" } ] } diff --git a/2022/4xxx/CVE-2022-4353.json b/2022/4xxx/CVE-2022-4353.json index 9e6905feb7e..35d318bda7d 100644 --- a/2022/4xxx/CVE-2022-4353.json +++ b/2022/4xxx/CVE-2022-4353.json @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "3.5", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "https:\/\/gitee.com\/LinZhaoguan\/pb-cms\/issues\/I52422" + "url": "https://gitee.com/LinZhaoguan/pb-cms/issues/I52422", + "refsource": "MISC", + "name": "https://gitee.com/LinZhaoguan/pb-cms/issues/I52422" }, { - "url": "https:\/\/vuldb.com\/?id.215113" + "url": "https://vuldb.com/?id.215113", + "refsource": "MISC", + "name": "https://vuldb.com/?id.215113" } ] } diff --git a/2022/4xxx/CVE-2022-4354.json b/2022/4xxx/CVE-2022-4354.json index a085c348e42..df878d69929 100644 --- a/2022/4xxx/CVE-2022-4354.json +++ b/2022/4xxx/CVE-2022-4354.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in LinZhaoguan pb-cms 2.0 and classified as problematic. Affected by this issue is some unknown functionality of the file \/blog\/comment of the component Message Board. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-215114 is the identifier assigned to this vulnerability." + "value": "A vulnerability was found in LinZhaoguan pb-cms 2.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /blog/comment of the component Message Board. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-215114 is the identifier assigned to this vulnerability." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "4.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "https:\/\/gitee.com\/LinZhaoguan\/pb-cms\/issues\/I4XWJ7" + "url": "https://gitee.com/LinZhaoguan/pb-cms/issues/I4XWJ7", + "refsource": "MISC", + "name": "https://gitee.com/LinZhaoguan/pb-cms/issues/I4XWJ7" }, { - "url": "https:\/\/vuldb.com\/?id.215114" + "url": "https://vuldb.com/?id.215114", + "refsource": "MISC", + "name": "https://vuldb.com/?id.215114" } ] } diff --git a/2022/4xxx/CVE-2022-4358.json b/2022/4xxx/CVE-2022-4358.json new file mode 100644 index 00000000000..e40738e104f --- /dev/null +++ b/2022/4xxx/CVE-2022-4358.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-4358", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/4xxx/CVE-2022-4359.json b/2022/4xxx/CVE-2022-4359.json new file mode 100644 index 00000000000..fd865f3d222 --- /dev/null +++ b/2022/4xxx/CVE-2022-4359.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-4359", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/4xxx/CVE-2022-4360.json b/2022/4xxx/CVE-2022-4360.json new file mode 100644 index 00000000000..8084134ade7 --- /dev/null +++ b/2022/4xxx/CVE-2022-4360.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-4360", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file