From 96ccb32d57ba1ff5f0481db5a1bb90e5f8003def Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 26 Jul 2022 13:00:48 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/33xxx/CVE-2021-33437.json | 61 +++++++++- 2021/33xxx/CVE-2021-33438.json | 61 +++++++++- 2021/33xxx/CVE-2021-33439.json | 61 +++++++++- 2021/33xxx/CVE-2021-33440.json | 61 +++++++++- 2021/33xxx/CVE-2021-33441.json | 61 +++++++++- 2021/33xxx/CVE-2021-33442.json | 61 +++++++++- 2021/33xxx/CVE-2021-33443.json | 61 +++++++++- 2021/33xxx/CVE-2021-33444.json | 61 +++++++++- 2021/33xxx/CVE-2021-33445.json | 61 +++++++++- 2021/33xxx/CVE-2021-33446.json | 61 +++++++++- 2021/33xxx/CVE-2021-33447.json | 61 +++++++++- 2021/33xxx/CVE-2021-33448.json | 61 +++++++++- 2021/33xxx/CVE-2021-33449.json | 61 +++++++++- 2021/33xxx/CVE-2021-33450.json | 61 +++++++++- 2021/33xxx/CVE-2021-33451.json | 61 +++++++++- 2021/33xxx/CVE-2021-33452.json | 61 +++++++++- 2021/33xxx/CVE-2021-33453.json | 61 +++++++++- 2021/33xxx/CVE-2021-33454.json | 61 +++++++++- 2021/33xxx/CVE-2021-33455.json | 61 +++++++++- 2021/33xxx/CVE-2021-33456.json | 61 +++++++++- 2021/33xxx/CVE-2021-33457.json | 61 +++++++++- 2021/33xxx/CVE-2021-33458.json | 61 +++++++++- 2021/33xxx/CVE-2021-33459.json | 61 +++++++++- 2021/33xxx/CVE-2021-33460.json | 61 +++++++++- 2021/33xxx/CVE-2021-33461.json | 61 +++++++++- 2021/33xxx/CVE-2021-33462.json | 61 +++++++++- 2021/33xxx/CVE-2021-33463.json | 61 +++++++++- 2021/33xxx/CVE-2021-33464.json | 61 +++++++++- 2021/33xxx/CVE-2021-33465.json | 61 +++++++++- 2021/33xxx/CVE-2021-33466.json | 61 +++++++++- 2021/33xxx/CVE-2021-33467.json | 61 +++++++++- 2021/33xxx/CVE-2021-33468.json | 61 +++++++++- 2022/2xxx/CVE-2022-2543.json | 18 +++ 2022/31xxx/CVE-2022-31879.json | 56 ++++++++- 2022/33xxx/CVE-2022-33745.json | 215 +++++++++++++++++---------------- 2022/34xxx/CVE-2022-34067.json | 56 ++++++++- 2022/34xxx/CVE-2022-34988.json | 56 ++++++++- 2022/34xxx/CVE-2022-34989.json | 56 ++++++++- 2022/34xxx/CVE-2022-34991.json | 56 ++++++++- 2022/36xxx/CVE-2022-36161.json | 56 ++++++++- 40 files changed, 2187 insertions(+), 334 deletions(-) create mode 100644 2022/2xxx/CVE-2022-2543.json diff --git a/2021/33xxx/CVE-2021-33437.json b/2021/33xxx/CVE-2021-33437.json index 12e38c337ae..c1a8eab1a5a 100644 --- a/2021/33xxx/CVE-2021-33437.json +++ b/2021/33xxx/CVE-2021-33437.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33437", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33437", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There are memory leaks in frozen_cb() in mjs.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cesanta/mjs/issues/160", + "refsource": "MISC", + "name": "https://github.com/cesanta/mjs/issues/160" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33438.json b/2021/33xxx/CVE-2021-33438.json index 663fd773124..6c8890e7c67 100644 --- a/2021/33xxx/CVE-2021-33438.json +++ b/2021/33xxx/CVE-2021-33438.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33438", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33438", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow in json_parse_array() in mjs.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cesanta/mjs/issues/158", + "refsource": "MISC", + "name": "https://github.com/cesanta/mjs/issues/158" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33439.json b/2021/33xxx/CVE-2021-33439.json index 62607e318af..fbd614bb96c 100644 --- a/2021/33xxx/CVE-2021-33439.json +++ b/2021/33xxx/CVE-2021-33439.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33439", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33439", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is Integer overflow in gc_compact_strings() in mjs.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cesanta/mjs/issues/159", + "refsource": "MISC", + "name": "https://github.com/cesanta/mjs/issues/159" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33440.json b/2021/33xxx/CVE-2021-33440.json index b1796b6318d..eea738edfbd 100644 --- a/2021/33xxx/CVE-2021-33440.json +++ b/2021/33xxx/CVE-2021-33440.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33440", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33440", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_commit() in mjs.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cesanta/mjs/issues/163", + "refsource": "MISC", + "name": "https://github.com/cesanta/mjs/issues/163" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33441.json b/2021/33xxx/CVE-2021-33441.json index 05b268a4cb8..ab85fd5191f 100644 --- a/2021/33xxx/CVE-2021-33441.json +++ b/2021/33xxx/CVE-2021-33441.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33441", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33441", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in exec_expr() in mjs.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cesanta/mjs/issues/165", + "refsource": "MISC", + "name": "https://github.com/cesanta/mjs/issues/165" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33442.json b/2021/33xxx/CVE-2021-33442.json index cdccaa5d3cc..c34d267d8b2 100644 --- a/2021/33xxx/CVE-2021-33442.json +++ b/2021/33xxx/CVE-2021-33442.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33442", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33442", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in json_printf() in mjs.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cesanta/mjs/issues/161", + "refsource": "MISC", + "name": "https://github.com/cesanta/mjs/issues/161" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33443.json b/2021/33xxx/CVE-2021-33443.json index 66fa701a7d0..14bf478f387 100644 --- a/2021/33xxx/CVE-2021-33443.json +++ b/2021/33xxx/CVE-2021-33443.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33443", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33443", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow in mjs_execute() in mjs.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cesanta/mjs/issues/167", + "refsource": "MISC", + "name": "https://github.com/cesanta/mjs/issues/167" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33444.json b/2021/33xxx/CVE-2021-33444.json index 2b7d14494d7..39fe9273ff3 100644 --- a/2021/33xxx/CVE-2021-33444.json +++ b/2021/33xxx/CVE-2021-33444.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33444", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33444", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in getprop_builtin_foreign() in mjs.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cesanta/mjs/issues/166", + "refsource": "MISC", + "name": "https://github.com/cesanta/mjs/issues/166" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33445.json b/2021/33xxx/CVE-2021-33445.json index fdd83b06819..ec0325025e6 100644 --- a/2021/33xxx/CVE-2021-33445.json +++ b/2021/33xxx/CVE-2021-33445.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33445", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33445", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_string_char_code_at() in mjs.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cesanta/mjs/issues/169", + "refsource": "MISC", + "name": "https://github.com/cesanta/mjs/issues/169" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33446.json b/2021/33xxx/CVE-2021-33446.json index 74f5c8f3c38..617e7a74963 100644 --- a/2021/33xxx/CVE-2021-33446.json +++ b/2021/33xxx/CVE-2021-33446.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33446", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33446", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_next() in mjs.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cesanta/mjs/issues/168", + "refsource": "MISC", + "name": "https://github.com/cesanta/mjs/issues/168" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33447.json b/2021/33xxx/CVE-2021-33447.json index e037fdb65f3..234bb601939 100644 --- a/2021/33xxx/CVE-2021-33447.json +++ b/2021/33xxx/CVE-2021-33447.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33447", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33447", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_print() in mjs.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cesanta/mjs/issues/164", + "refsource": "MISC", + "name": "https://github.com/cesanta/mjs/issues/164" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33448.json b/2021/33xxx/CVE-2021-33448.json index 6529a908318..4c047a34472 100644 --- a/2021/33xxx/CVE-2021-33448.json +++ b/2021/33xxx/CVE-2021-33448.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33448", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33448", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in mjs(mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow at 0x7fffe9049390." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cesanta/mjs/issues/170", + "refsource": "MISC", + "name": "https://github.com/cesanta/mjs/issues/170" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33449.json b/2021/33xxx/CVE-2021-33449.json index d95dc844c85..8d921471301 100644 --- a/2021/33xxx/CVE-2021-33449.json +++ b/2021/33xxx/CVE-2021-33449.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33449", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33449", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_part_get_by_offset() in mjs.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cesanta/mjs/issues/162", + "refsource": "MISC", + "name": "https://github.com/cesanta/mjs/issues/162" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33450.json b/2021/33xxx/CVE-2021-33450.json index a95a43cfd16..34fa3c72f21 100644 --- a/2021/33xxx/CVE-2021-33450.json +++ b/2021/33xxx/CVE-2021-33450.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33450", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33450", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in NASM version 2.16rc0. There are memory leaks in nasm_calloc() in nasmlib/alloc.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392758", + "refsource": "MISC", + "name": "https://bugzilla.nasm.us/show_bug.cgi?id=3392758" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33451.json b/2021/33xxx/CVE-2021-33451.json index 5f098b87bf5..87a58033fff 100644 --- a/2021/33xxx/CVE-2021-33451.json +++ b/2021/33xxx/CVE-2021-33451.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33451", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33451", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in lrzip version 0.641. There are memory leaks in fill_buffer() in stream.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ckolivas/lrzip/issues/198", + "refsource": "MISC", + "name": "https://github.com/ckolivas/lrzip/issues/198" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33452.json b/2021/33xxx/CVE-2021-33452.json index b227ae7e455..4b2cbd5443e 100644 --- a/2021/33xxx/CVE-2021-33452.json +++ b/2021/33xxx/CVE-2021-33452.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33452", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33452", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in NASM version 2.16rc0. There are memory leaks in nasm_malloc() in nasmlib/alloc.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392757", + "refsource": "MISC", + "name": "https://bugzilla.nasm.us/show_bug.cgi?id=3392757" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33453.json b/2021/33xxx/CVE-2021-33453.json index db6072683ee..64c32604b9e 100644 --- a/2021/33xxx/CVE-2021-33453.json +++ b/2021/33xxx/CVE-2021-33453.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33453", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33453", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in lrzip version 0.641. There is a use-after-free in ucompthread() in stream.c:1538." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ckolivas/lrzip/issues/199", + "refsource": "MISC", + "name": "https://github.com/ckolivas/lrzip/issues/199" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33454.json b/2021/33xxx/CVE-2021-33454.json index 4470c12d8c6..b572e7df683 100644 --- a/2021/33xxx/CVE-2021-33454.json +++ b/2021/33xxx/CVE-2021-33454.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33454", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33454", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in yasm_expr_get_intnum() in libyasm/expr.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/166", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/166" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33455.json b/2021/33xxx/CVE-2021-33455.json index 1bf293576a1..ea969c63c1f 100644 --- a/2021/33xxx/CVE-2021-33455.json +++ b/2021/33xxx/CVE-2021-33455.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33455", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33455", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in do_directive() in modules/preprocs/nasm/nasm-pp.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/169", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/169" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33456.json b/2021/33xxx/CVE-2021-33456.json index 3596cdb0874..dc03321ef62 100644 --- a/2021/33xxx/CVE-2021-33456.json +++ b/2021/33xxx/CVE-2021-33456.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33456", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33456", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in hash() in modules/preprocs/nasm/nasm-pp.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/175", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/175" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33457.json b/2021/33xxx/CVE-2021-33457.json index 9883dbad17b..6f39f1da1a9 100644 --- a/2021/33xxx/CVE-2021-33457.json +++ b/2021/33xxx/CVE-2021-33457.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33457", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33457", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_mmac_params() in modules/preprocs/nasm/nasm-pp.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/171", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/171" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33458.json b/2021/33xxx/CVE-2021-33458.json index d04df1d2e83..51823948c9e 100644 --- a/2021/33xxx/CVE-2021-33458.json +++ b/2021/33xxx/CVE-2021-33458.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33458", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33458", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in find_cc() in modules/preprocs/nasm/nasm-pp.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/170", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/170" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33459.json b/2021/33xxx/CVE-2021-33459.json index cf01a4d9297..c709cbadfc7 100644 --- a/2021/33xxx/CVE-2021-33459.json +++ b/2021/33xxx/CVE-2021-33459.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33459", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33459", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in nasm_parser_directive() in modules/parsers/nasm/nasm-parse.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/167", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/167" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33460.json b/2021/33xxx/CVE-2021-33460.json index 6690c6e1795..fb97a8b0527 100644 --- a/2021/33xxx/CVE-2021-33460.json +++ b/2021/33xxx/CVE-2021-33460.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33460", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33460", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in if_condition() in modules/preprocs/nasm/nasm-pp.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/168", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/168" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33461.json b/2021/33xxx/CVE-2021-33461.json index ae3a7ba5c0c..802172b1e9f 100644 --- a/2021/33xxx/CVE-2021-33461.json +++ b/2021/33xxx/CVE-2021-33461.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33461", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33461", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a use-after-free in yasm_intnum_destroy() in libyasm/intnum.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/161", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/161" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33462.json b/2021/33xxx/CVE-2021-33462.json index fae7dca7fae..b828b723f3f 100644 --- a/2021/33xxx/CVE-2021-33462.json +++ b/2021/33xxx/CVE-2021-33462.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33462", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33462", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a use-after-free in expr_traverse_nodes_post() in libyasm/expr.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/165", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/165" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33463.json b/2021/33xxx/CVE-2021-33463.json index 39d7ae793d9..c1b94b792b0 100644 --- a/2021/33xxx/CVE-2021-33463.json +++ b/2021/33xxx/CVE-2021-33463.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33463", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33463", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in yasm_expr__copy_except() in libyasm/expr.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/174", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/174" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33464.json b/2021/33xxx/CVE-2021-33464.json index c3f7974e245..a8a8fccda78 100644 --- a/2021/33xxx/CVE-2021-33464.json +++ b/2021/33xxx/CVE-2021-33464.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33464", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33464", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a heap-buffer-overflow in inc_fopen() in modules/preprocs/nasm/nasm-pp.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/164", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/164" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33465.json b/2021/33xxx/CVE-2021-33465.json index 8d75d930d46..2790f931df8 100644 --- a/2021/33xxx/CVE-2021-33465.json +++ b/2021/33xxx/CVE-2021-33465.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33465", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33465", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_mmacro() in modules/preprocs/nasm/nasm-pp.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/173", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/173" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33466.json b/2021/33xxx/CVE-2021-33466.json index f0fc56ebb5f..56ef323e4b1 100644 --- a/2021/33xxx/CVE-2021-33466.json +++ b/2021/33xxx/CVE-2021-33466.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33466", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33466", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_smacro() in modules/preprocs/nasm/nasm-pp.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/172", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/172" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33467.json b/2021/33xxx/CVE-2021-33467.json index db18d6e9360..8409265018f 100644 --- a/2021/33xxx/CVE-2021-33467.json +++ b/2021/33xxx/CVE-2021-33467.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33467", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33467", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a use-after-free in pp_getline() in modules/preprocs/nasm/nasm-pp.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/163", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/163" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2021/33xxx/CVE-2021-33468.json b/2021/33xxx/CVE-2021-33468.json index 7aed23180f5..eb162dbeb54 100644 --- a/2021/33xxx/CVE-2021-33468.json +++ b/2021/33xxx/CVE-2021-33468.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-33468", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-33468", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in yasm version 1.3.0. There is a use-after-free in error() in modules/preprocs/nasm/nasm-pp.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/yasm/yasm/issues/162", + "refsource": "MISC", + "name": "https://github.com/yasm/yasm/issues/162" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d", + "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" } ] } diff --git a/2022/2xxx/CVE-2022-2543.json b/2022/2xxx/CVE-2022-2543.json new file mode 100644 index 00000000000..bac8d423c1d --- /dev/null +++ b/2022/2xxx/CVE-2022-2543.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2543", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/31xxx/CVE-2022-31879.json b/2022/31xxx/CVE-2022-31879.json index 347ce9604cc..574a8909043 100644 --- a/2022/31xxx/CVE-2022-31879.json +++ b/2022/31xxx/CVE-2022-31879.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-31879", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-31879", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Online Fire Reporting System 1.0 is vulnerable to SQL Injection via the date parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Fire-Reporting", + "refsource": "MISC", + "name": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Fire-Reporting" } ] } diff --git a/2022/33xxx/CVE-2022-33745.json b/2022/33xxx/CVE-2022-33745.json index a19f2bb7a46..659f29119d1 100644 --- a/2022/33xxx/CVE-2022-33745.json +++ b/2022/33xxx/CVE-2022-33745.json @@ -1,108 +1,111 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "security@xenproject.org", - "ID" : "CVE-2022-33745" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "xen", - "version" : { - "version_data" : [ - { - "version_affected" : "?", - "version_value" : "consult Xen advisory XSA-408" - } - ] - } - } - ] - }, - "vendor_name" : "Xen" + "CVE_data_meta": { + "ASSIGNER": "security@xen.org", + "ID": "CVE-2022-33745", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "xen", + "version": { + "version_data": [ + { + "version_affected": "?", + "version_value": "consult Xen advisory XSA-408" + } + ] + } + } + ] + }, + "vendor_name": "Xen" + } + ] + } + }, + "configuration": { + "configuration_data": { + "description": { + "description_data": [ + { + "lang": "eng", + "value": "All versions of Xen with the XSA-401 fixes applied are vulnerable.\n\nOnly x86 PV guests can trigger this vulnerability, and only when running\nin shadow mode. Shadow mode would be in use when migrating guests or as\na workaround for XSA-273 (L1TF)." + } + ] } - ] - } - }, - "configuration" : { - "configuration_data" : { - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "All versions of Xen with the XSA-401 fixes applied are vulnerable.\n\nOnly x86 PV guests can trigger this vulnerability, and only when running\nin shadow mode. Shadow mode would be in use when migrating guests or as\na workaround for XSA-273 (L1TF)." - } - ] - } - } - }, - "credit" : { - "credit_data" : { - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "This issue was discovered by Charles Arnold of SUSE." - } - ] - } - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "insufficient TLB flush for x86 PV guests in shadow mode\n\nFor migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. To address\nXSA-401, code was moved inside a function in Xen. This code movement\nmissed a variable changing meaning / value between old and new code\npositions. The now wrong use of the variable did lead to a wrong TLB\nflush condition, omitting flushes where such are necessary." - } - ] - }, - "impact" : { - "impact_data" : { - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "The known (observed) impact would be a Denial of Service (DoS) affecting\nthe entire host, due to running out of memory. Privilege escalation and\ninformation leaks cannot be ruled out." - } - ] - } - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "unknown" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "https://xenbits.xenproject.org/xsa/advisory-408.txt" - } - ] - }, - "workaround" : { - "workaround_data" : { - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Not running x86 PV guests will avoid the vulnerability." - } - ] - } - } - } -} + } + }, + "credit": { + "credit_data": { + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This issue was discovered by Charles Arnold of SUSE." + } + ] + } + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary." + } + ] + }, + "impact": { + "impact_data": { + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The known (observed) impact would be a Denial of Service (DoS) affecting\nthe entire host, due to running out of memory. Privilege escalation and\ninformation leaks cannot be ruled out." + } + ] + } + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "unknown" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://xenbits.xenproject.org/xsa/advisory-408.txt", + "refsource": "MISC", + "name": "https://xenbits.xenproject.org/xsa/advisory-408.txt" + } + ] + }, + "workaround": { + "workaround_data": { + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Not running x86 PV guests will avoid the vulnerability." + } + ] + } + } + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34067.json b/2022/34xxx/CVE-2022-34067.json index 582c9e23928..1f978f5cea6 100644 --- a/2022/34xxx/CVE-2022-34067.json +++ b/2022/34xxx/CVE-2022-34067.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34067", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34067", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Warehouse Management System v1.0 was discovered to contain a SQL injection vulnerability via the cari parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Warehouse-Management-System", + "refsource": "MISC", + "name": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Warehouse-Management-System" } ] } diff --git a/2022/34xxx/CVE-2022-34988.json b/2022/34xxx/CVE-2022-34988.json index b4ecc95d5c1..6215cf05a10 100644 --- a/2022/34xxx/CVE-2022-34988.json +++ b/2022/34xxx/CVE-2022-34988.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34988", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34988", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Inout Blockchain AltExchanger v1.2.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/js." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Inout-Blockchain-AltExchanger/2022/Cross-site-scripting-DOM-based-IG-js", + "refsource": "MISC", + "name": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Inout-Blockchain-AltExchanger/2022/Cross-site-scripting-DOM-based-IG-js" } ] } diff --git a/2022/34xxx/CVE-2022-34989.json b/2022/34xxx/CVE-2022-34989.json index a012c61999a..2e66534efef 100644 --- a/2022/34xxx/CVE-2022-34989.json +++ b/2022/34xxx/CVE-2022-34989.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34989", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34989", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Fruits Bazar v1.0 was discovered to contain a SQL injection vulnerability via the recover_email parameter at user_password_recover.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Md-Saiful-Islam-creativesaiful/2021/Ecommerce-project-with-php-and-mysqli-Fruits-Bazar", + "refsource": "MISC", + "name": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Md-Saiful-Islam-creativesaiful/2021/Ecommerce-project-with-php-and-mysqli-Fruits-Bazar" } ] } diff --git a/2022/34xxx/CVE-2022-34991.json b/2022/34xxx/CVE-2022-34991.json index afee85379c9..6bbb04a2703 100644 --- a/2022/34xxx/CVE-2022-34991.json +++ b/2022/34xxx/CVE-2022-34991.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34991", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34991", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Paymoney v3.3 was discovered to contain multiple reflected cross-site scripting (XSS) vulnerabilities via the first_name and last_name parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/paymoney/2022/paymoney-3.3", + "refsource": "MISC", + "name": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/paymoney/2022/paymoney-3.3" } ] } diff --git a/2022/36xxx/CVE-2022-36161.json b/2022/36xxx/CVE-2022-36161.json index e19b419e291..e0d36c231ac 100644 --- a/2022/36xxx/CVE-2022-36161.json +++ b/2022/36xxx/CVE-2022-36161.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-36161", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-36161", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Orange Station 1.0 was discovered to contain a SQL injection vulnerability via the username parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2022/Orange-Station-1.0", + "refsource": "MISC", + "name": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2022/Orange-Station-1.0" } ] }