"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-06-06 19:01:29 +00:00
parent ace414a108
commit 8f9c8b5ae9
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
7 changed files with 268 additions and 31 deletions

View File

@ -5,13 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2022-1550",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none."
}
]
}

View File

@ -15,11 +15,11 @@
"product": {
"product_data": [
{
"product_name": "Kernel",
"product_name": "kernel",
"version": {
"version_data": [
{
"version_value": "Linux kernel 5.18-rc7"
"version_value": "Linux kernel 5.18-rc8"
}
]
}
@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://lore.kernel.org/lkml/20220507115605.96775-1-tcs.kernel@gmail.com/T/",
"url": "https://lore.kernel.org/lkml/20220507115605.96775-1-tcs.kernel@gmail.com/T/"
},
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2089701",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089701"
}
]
},
@ -55,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "A flaw use after free in the Linux kernel pipes functionality was found in the way user do some manipulations with pipe ex. with the post_one_notification() after free_pipe_info() already called. A local user could use this flaw to crash the system or potentially escalate their privileges on the system."
"value": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system."
}
]
}

View File

@ -1,17 +1,92 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-22396",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"impact": {
"cvssv3": {
"TM": {
"RL": "O",
"E": "U",
"RC": "C"
},
"BM": {
"I": "N",
"A": "N",
"AV": "N",
"AC": "L",
"S": "C",
"UI": "N",
"SCORE": "6.800",
"PR": "H",
"C": "H"
}
}
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.ibm.com/support/pages/node/6591505",
"url": "https://www.ibm.com/support/pages/node/6591505",
"title": "IBM Security Bulletin 6591505 (Spectrum Protect Plus)"
},
{
"refsource": "XF",
"name": "ibm-spectrum-cve202222396-info-disc (222231)",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/222231",
"title": "X-Force Vulnerability Report"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Credentials are printed in clear text in the IBM Spectrum Protect Plus 10.1.0.0 through 10.1.9.3 virgo log file in certain cases. Credentials could be the remote vSnap, offload targets, or VADP credentials depending on the operation performed. Credentials that are using API key or certificate are not printed. IBM X-Force ID: 222231.",
"lang": "eng"
}
]
},
"data_format": "MITRE",
"data_version": "4.0",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "10.1.0.0"
},
{
"version_value": "10.1.9.3"
}
]
},
"product_name": "Spectrum Protect Plus"
}
]
},
"vendor_name": "IBM"
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2022-22396",
"STATE": "PUBLIC",
"DATE_PUBLIC": "2022-06-02T00:00:00",
"ASSIGNER": "psirt@us.ibm.com"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "Obtain Information",
"lang": "eng"
}
]
}
]
}

View File

@ -61,6 +61,11 @@
"url": "https://github.com/horde/Mime_Viewer/commit/02b46cec1a7e8f1a6835b628850cd56b85963bb5",
"refsource": "MISC",
"name": "https://github.com/horde/Mime_Viewer/commit/02b46cec1a7e8f1a6835b628850cd56b85963bb5"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20220606 [SECURITY] [DLA 3045-1] php-horde-mime-viewer security update",
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00007.html"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-30586",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-30586",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Gradle Enterprise through 2022.2.2 has Incorrect Access Control that leads to code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://security.gradle.com",
"refsource": "MISC",
"name": "https://security.gradle.com"
},
{
"refsource": "MISC",
"name": "https://security.gradle.com/advisory/2022-09",
"url": "https://security.gradle.com/advisory/2022-09"
}
]
}

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-31493",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-31493",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "LibreHealth EHR Base 2.0.0 allows gacl/admin/acl_admin.php acl_id XSS."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/LibreHealthIO/lh-ehr/tags",
"refsource": "MISC",
"name": "https://github.com/LibreHealthIO/lh-ehr/tags"
},
{
"url": "https://gitlab.com/librehealth/ehr/lh-ehr/-/tags",
"refsource": "MISC",
"name": "https://gitlab.com/librehealth/ehr/lh-ehr/-/tags"
},
{
"refsource": "MISC",
"name": "https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r",
"url": "https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-32275",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-32275",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Grafana 8.4.3 allows reading files via (for example) a /dashboard/snapshot/%7B%7Bconstructor.constructor'/.. /.. /.. /.. /.. /.. /.. /.. /etc/passwd URI."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://grafana.com",
"refsource": "MISC",
"name": "https://grafana.com"
},
{
"refsource": "MISC",
"name": "https://github.com/BrotherOfJhonny/grafana/blob/main/README.md",
"url": "https://github.com/BrotherOfJhonny/grafana/blob/main/README.md"
}
]
}