From 8dcd77a7a44a4f2bbb0e50bc2b76113b98f0aabf Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 1 Dec 2022 22:00:35 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/23xxx/CVE-2022-23737.json | 207 +++++++++++++++++---------------- 2022/35xxx/CVE-2022-35120.json | 56 ++++++++- 2022/43xxx/CVE-2022-43333.json | 56 ++++++++- 2022/44xxx/CVE-2022-44211.json | 56 ++++++++- 2022/44xxx/CVE-2022-44212.json | 56 ++++++++- 5 files changed, 306 insertions(+), 125 deletions(-) diff --git a/2022/23xxx/CVE-2022-23737.json b/2022/23xxx/CVE-2022-23737.json index 5c394861b00..8c6f80210aa 100644 --- a/2022/23xxx/CVE-2022-23737.json +++ b/2022/23xxx/CVE-2022-23737.json @@ -1,109 +1,114 @@ { - "CVE_data_meta": { - "ASSIGNER": "product-cna@github.com", - "ID": "CVE-2022-23737", - "STATE": "PUBLIC", - "TITLE": "Improper Privilege Management in GitHub Enterprise Server leading to page creation and deletion" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "GitHub Enterprise Server", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "3.2", - "version_value": "3.2.20" + "CVE_data_meta": { + "ASSIGNER": "product-cna@github.com", + "ID": "CVE-2022-23737", + "STATE": "PUBLIC", + "TITLE": "Improper Privilege Management in GitHub Enterprise Server leading to page creation and deletion" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GitHub Enterprise Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.2", + "version_value": "3.2.20" + }, + { + "version_affected": "<", + "version_name": "3.3", + "version_value": "3.3.15" + }, + { + "version_affected": "<", + "version_name": "3.4", + "version_value": "3.4.10" + }, + { + "version_affected": "<", + "version_name": "3.5", + "version_value": "3.5.7" + }, + { + "version_affected": "<", + "version_name": "3.6", + "version_value": "3.6.3" + } + ] + } + } + ] }, - { - "version_affected": "<", - "version_name": "3.3", - "version_value": "3.3.15" - }, - { - "version_affected": "<", - "version_name": "3.4", - "version_value": "3.4.10" - }, - { - "version_affected": "<", - "version_name": "3.5", - "version_value": "3.5.7" - }, - { - "version_affected": "<", - "version_name": "3.6", - "version_value": "3.6.3" - } - ] + "vendor_name": "GitHub" } - } ] - }, - "vendor_name": "GitHub" } - ] - } - }, - "credit": [ - { - "lang": "eng", - "value": "Ali Shehab and Ali Kalout" - } - ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "An improper privilege management vulnerability was identified in GitHub Enterprise Server that allowed users with improper privileges to create or delete pages via the API. To exploit this vulnerability, an attacker would need to be added to an organization's repo with write permissions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.7 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, and 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { + }, + "credit": [ + { "lang": "eng", - "value": "CWE-269" - } + "value": "Ali Shehab and Ali Kalout" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An improper privilege management vulnerability was identified in GitHub Enterprise Server that allowed users with improper privileges to create or delete pages via the API. To exploit this vulnerability, an attacker would need to be added to an organization's repo with write permissions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.7 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, and 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.20" - }, - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@3.3/admin/release-notes#3.3.15" - }, - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.10" - }, - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@3.5/admin/release-notes#3.5.7" - }, - { - "refsource": "CONFIRM", - "url": "https://docs.github.com/en/enterprise-server@3.6/admin/release-notes#3.6.3" - } - ] - }, - "source": { - "discovery": "EXTERNAL" - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.20", + "name": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.20" + }, + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@3.3/admin/release-notes#3.3.15", + "name": "https://docs.github.com/en/enterprise-server@3.3/admin/release-notes#3.3.15" + }, + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.10", + "name": "https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.10" + }, + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@3.5/admin/release-notes#3.5.7", + "name": "https://docs.github.com/en/enterprise-server@3.5/admin/release-notes#3.5.7" + }, + { + "refsource": "MISC", + "url": "https://docs.github.com/en/enterprise-server@3.6/admin/release-notes#3.6.3", + "name": "https://docs.github.com/en/enterprise-server@3.6/admin/release-notes#3.6.3" + } + ] + }, + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/35xxx/CVE-2022-35120.json b/2022/35xxx/CVE-2022-35120.json index d3011ca11fe..359014dee26 100644 --- a/2022/35xxx/CVE-2022-35120.json +++ b/2022/35xxx/CVE-2022-35120.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-35120", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-35120", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IXPdata EasyInstall 6.6.14725 contains an access control issue." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://la.rsbir.ch/CVE-2022-35120.pdf", + "url": "https://la.rsbir.ch/CVE-2022-35120.pdf" } ] } diff --git a/2022/43xxx/CVE-2022-43333.json b/2022/43xxx/CVE-2022-43333.json index f9f002fb452..d80633397e5 100644 --- a/2022/43xxx/CVE-2022-43333.json +++ b/2022/43xxx/CVE-2022-43333.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-43333", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-43333", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Telenia Software s.r.l TVox before v22.0.17 was discovered to contain a remote code execution (RCE) vulnerability in the component action_export_control.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.teleniasoftware.com/timeline/tvox-22-0-23/", + "url": "https://www.teleniasoftware.com/timeline/tvox-22-0-23/" } ] } diff --git a/2022/44xxx/CVE-2022-44211.json b/2022/44xxx/CVE-2022-44211.json index 7154e4449ed..830d6e2ca59 100644 --- a/2022/44xxx/CVE-2022-44211.json +++ b/2022/44xxx/CVE-2022-44211.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-44211", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-44211", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In GL.iNet Goodcloud 1.1 Incorrect access control allows a remote attacker to access/change devices' settings." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://forum.gl-inet.com/t/security-advisories-vulnerabilities-and-cves-of-gl-inet-software/25518", + "url": "https://forum.gl-inet.com/t/security-advisories-vulnerabilities-and-cves-of-gl-inet-software/25518" } ] } diff --git a/2022/44xxx/CVE-2022-44212.json b/2022/44xxx/CVE-2022-44212.json index 161b83b1e0a..e184308d78b 100644 --- a/2022/44xxx/CVE-2022-44212.json +++ b/2022/44xxx/CVE-2022-44212.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-44212", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-44212", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In GL.iNet Goodcloud 1.0, insecure design allows remote attacker to access devices' admin panel." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://forum.gl-inet.com/t/security-advisories-vulnerabilities-and-cves-of-gl-inet-software/25518/2", + "url": "https://forum.gl-inet.com/t/security-advisories-vulnerabilities-and-cves-of-gl-inet-software/25518/2" } ] }