From 93e00b04531237d09ab96ff631044ee57e41bc2f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 5 Jun 2022 22:01:28 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/32xxx/CVE-2022-32290.json | 18 +++++++++ 2022/32xxx/CVE-2022-32291.json | 62 +++++++++++++++++++++++++++++++ 2022/32xxx/CVE-2022-32292.json | 18 +++++++++ 2022/32xxx/CVE-2022-32293.json | 18 +++++++++ 2022/32xxx/CVE-2022-32294.json | 18 +++++++++ 2022/32xxx/CVE-2022-32295.json | 18 +++++++++ 2022/32xxx/CVE-2022-32296.json | 67 ++++++++++++++++++++++++++++++++++ 7 files changed, 219 insertions(+) create mode 100644 2022/32xxx/CVE-2022-32290.json create mode 100644 2022/32xxx/CVE-2022-32291.json create mode 100644 2022/32xxx/CVE-2022-32292.json create mode 100644 2022/32xxx/CVE-2022-32293.json create mode 100644 2022/32xxx/CVE-2022-32294.json create mode 100644 2022/32xxx/CVE-2022-32295.json create mode 100644 2022/32xxx/CVE-2022-32296.json diff --git a/2022/32xxx/CVE-2022-32290.json b/2022/32xxx/CVE-2022-32290.json new file mode 100644 index 00000000000..2e325abe401 --- /dev/null +++ b/2022/32xxx/CVE-2022-32290.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-32290", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/32xxx/CVE-2022-32291.json b/2022/32xxx/CVE-2022-32291.json new file mode 100644 index 00000000000..98b1732ec70 --- /dev/null +++ b/2022/32xxx/CVE-2022-32291.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2022-32291", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Real Player through 20.1.0.312, attackers can execute arbitrary code by placing a UNC share pathname (for a DLL file) in a RAM file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Edubr2020/RP_RecordClip_DLL_Hijack", + "refsource": "MISC", + "name": "https://github.com/Edubr2020/RP_RecordClip_DLL_Hijack" + } + ] + } +} \ No newline at end of file diff --git a/2022/32xxx/CVE-2022-32292.json b/2022/32xxx/CVE-2022-32292.json new file mode 100644 index 00000000000..1e0ef3b606d --- /dev/null +++ b/2022/32xxx/CVE-2022-32292.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-32292", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/32xxx/CVE-2022-32293.json b/2022/32xxx/CVE-2022-32293.json new file mode 100644 index 00000000000..0b519c50dd6 --- /dev/null +++ b/2022/32xxx/CVE-2022-32293.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-32293", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/32xxx/CVE-2022-32294.json b/2022/32xxx/CVE-2022-32294.json new file mode 100644 index 00000000000..7b55c57a3bb --- /dev/null +++ b/2022/32xxx/CVE-2022-32294.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-32294", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/32xxx/CVE-2022-32295.json b/2022/32xxx/CVE-2022-32295.json new file mode 100644 index 00000000000..57ef68cba4a --- /dev/null +++ b/2022/32xxx/CVE-2022-32295.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-32295", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/32xxx/CVE-2022-32296.json b/2022/32xxx/CVE-2022-32296.json new file mode 100644 index 00000000000..3d0fdf62d88 --- /dev/null +++ b/2022/32xxx/CVE-2022-32296.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2022-32296", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4c2c8f03a5ab7cb04ec64724d7d176d00bcc91e5", + "refsource": "MISC", + "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4c2c8f03a5ab7cb04ec64724d7d176d00bcc91e5" + }, + { + "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9", + "refsource": "MISC", + "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9" + } + ] + } +} \ No newline at end of file