diff --git a/2022/3xxx/CVE-2022-3541.json b/2022/3xxx/CVE-2022-3541.json index be28f7a6a68..eb01b1e5dd9 100644 --- a/2022/3xxx/CVE-2022-3541.json +++ b/2022/3xxx/CVE-2022-3541.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability classified as critical has been found in Linux Kernel. This affects the function spl2sw_nvmem_get_mac_address of the file drivers\/net\/ethernet\/sunplus\/spl2sw_driver.c of the component BPF. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211041 was assigned to this vulnerability." + "value": "A vulnerability classified as critical has been found in Linux Kernel. This affects the function spl2sw_nvmem_get_mac_address of the file drivers/net/ethernet/sunplus/spl2sw_driver.c of the component BPF. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211041 was assigned to this vulnerability." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "5.5", - "vectorString": "CVSS:3.1\/AV:A\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/bpf\/bpf-next.git\/commit\/?id=12aece8b01507a2d357a1861f470e83621fbb6f2" + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=12aece8b01507a2d357a1861f470e83621fbb6f2", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=12aece8b01507a2d357a1861f470e83621fbb6f2" }, { - "url": "https:\/\/vuldb.com\/?id.211041" + "url": "https://vuldb.com/?id.211041", + "refsource": "MISC", + "name": "https://vuldb.com/?id.211041" } ] } diff --git a/2022/3xxx/CVE-2022-3542.json b/2022/3xxx/CVE-2022-3542.json index f746b8c24bf..2802bda4f5f 100644 --- a/2022/3xxx/CVE-2022-3542.json +++ b/2022/3xxx/CVE-2022-3542.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the function bnx2x_tpa_stop of the file drivers\/net\/ethernet\/broadcom\/bnx2x\/bnx2x_cmn.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211042 is the identifier assigned to this vulnerability." + "value": "A vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the function bnx2x_tpa_stop of the file drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211042 is the identifier assigned to this vulnerability." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "3.5", - "vectorString": "CVSS:3.1\/AV:A\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:L" + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/bpf\/bpf-next.git\/commit\/?id=b43f9acbb8942b05252be83ac25a81cec70cc192" + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=b43f9acbb8942b05252be83ac25a81cec70cc192", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=b43f9acbb8942b05252be83ac25a81cec70cc192" }, { - "url": "https:\/\/vuldb.com\/?id.211042" + "url": "https://vuldb.com/?id.211042", + "refsource": "MISC", + "name": "https://vuldb.com/?id.211042" } ] } diff --git a/2022/3xxx/CVE-2022-3543.json b/2022/3xxx/CVE-2022-3543.json index 0b09c8f34dc..92bd2a4d407 100644 --- a/2022/3xxx/CVE-2022-3543.json +++ b/2022/3xxx/CVE-2022-3543.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function unix_sock_destructor\/unix_release_sock of the file net\/unix\/af_unix.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211043." + "value": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function unix_sock_destructor/unix_release_sock of the file net/unix/af_unix.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211043." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "3.5", - "vectorString": "CVSS:3.1\/AV:A\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:L" + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/bpf\/bpf-next.git\/commit\/?id=7a62ed61367b8fd01bae1e18e30602c25060d824" + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=7a62ed61367b8fd01bae1e18e30602c25060d824", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=7a62ed61367b8fd01bae1e18e30602c25060d824" }, { - "url": "https:\/\/vuldb.com\/?id.211043" + "url": "https://vuldb.com/?id.211043", + "refsource": "MISC", + "name": "https://vuldb.com/?id.211043" } ] } diff --git a/2022/3xxx/CVE-2022-3544.json b/2022/3xxx/CVE-2022-3544.json index 1360419e6e5..d077994b507 100644 --- a/2022/3xxx/CVE-2022-3544.json +++ b/2022/3xxx/CVE-2022-3544.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability, which was classified as problematic, was found in Linux Kernel. Affected is the function damon_sysfs_add_target of the file mm\/damon\/sysfs.c of the component Netfilter. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211044." + "value": "A vulnerability, which was classified as problematic, was found in Linux Kernel. Affected is the function damon_sysfs_add_target of the file mm/damon/sysfs.c of the component Netfilter. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211044." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "3.5", - "vectorString": "CVSS:3.1\/AV:A\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:L" + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/netfilter\/nf-next.git\/commit\/?id=1c8e2349f2d033f634d046063b704b2ca6c46972" + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-next.git/commit/?id=1c8e2349f2d033f634d046063b704b2ca6c46972", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-next.git/commit/?id=1c8e2349f2d033f634d046063b704b2ca6c46972" }, { - "url": "https:\/\/vuldb.com\/?id.211044" + "url": "https://vuldb.com/?id.211044", + "refsource": "MISC", + "name": "https://vuldb.com/?id.211044" } ] } diff --git a/2022/3xxx/CVE-2022-3545.json b/2022/3xxx/CVE-2022-3545.json index 85ee2e2c715..1650b3fcf84 100644 --- a/2022/3xxx/CVE-2022-3545.json +++ b/2022/3xxx/CVE-2022-3545.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers\/net\/ethernet\/netronome\/nfp\/nfpcore\/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability." + "value": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "5.5", - "vectorString": "CVSS:3.1\/AV:A\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/klassert\/ipsec-next.git\/commit\/?id=02e1a114fdb71e59ee6770294166c30d437bf86a" + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a" }, { - "url": "https:\/\/vuldb.com\/?id.211045" + "url": "https://vuldb.com/?id.211045", + "refsource": "MISC", + "name": "https://vuldb.com/?id.211045" } ] } diff --git a/2022/3xxx/CVE-2022-3546.json b/2022/3xxx/CVE-2022-3546.json index 5f2b8348af6..97e4e53e485 100644 --- a/2022/3xxx/CVE-2022-3546.json +++ b/2022/3xxx/CVE-2022-3546.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file \/csms\/admin\/?page=user\/list of the component Create User Handler. The manipulation of the argument First Name\/Last Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-211046 is the identifier assigned to this vulnerability." + "value": "A vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /csms/admin/?page=user/list of the component Create User Handler. The manipulation of the argument First Name/Last Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-211046 is the identifier assigned to this vulnerability." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "2.4", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:H\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/thehackingverse\/Stored-xss-\/blob\/main\/Poc" + "url": "https://github.com/thehackingverse/Stored-xss-/blob/main/Poc", + "refsource": "MISC", + "name": "https://github.com/thehackingverse/Stored-xss-/blob/main/Poc" }, { - "url": "https:\/\/vuldb.com\/?id.211046" + "url": "https://vuldb.com/?id.211046", + "refsource": "MISC", + "name": "https://vuldb.com/?id.211046" } ] } diff --git a/2022/3xxx/CVE-2022-3547.json b/2022/3xxx/CVE-2022-3547.json index db3ca805232..11b6402ec90 100644 --- a/2022/3xxx/CVE-2022-3547.json +++ b/2022/3xxx/CVE-2022-3547.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0. It has been classified as problematic. This affects an unknown part of the file \/csms\/admin\/?page=system_info of the component Setting Handler. The manipulation of the argument System Name\/System Short Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-211047." + "value": "A vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /csms/admin/?page=system_info of the component Setting Handler. The manipulation of the argument System Name/System Short Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-211047." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "2.4", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:H\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/lakshaya0557\/POCs\/blob\/main\/POC" + "url": "https://github.com/lakshaya0557/POCs/blob/main/POC", + "refsource": "MISC", + "name": "https://github.com/lakshaya0557/POCs/blob/main/POC" }, { - "url": "https:\/\/vuldb.com\/?id.211047" + "url": "https://vuldb.com/?id.211047", + "refsource": "MISC", + "name": "https://vuldb.com/?id.211047" } ] } diff --git a/2022/3xxx/CVE-2022-3548.json b/2022/3xxx/CVE-2022-3548.json index 5fb3f50b372..d7596e36a01 100644 --- a/2022/3xxx/CVE-2022-3548.json +++ b/2022/3xxx/CVE-2022-3548.json @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "2.4", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:H\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/Ramansh123454\/POCs\/blob\/main\/POC" + "url": "https://github.com/Ramansh123454/POCs/blob/main/POC", + "refsource": "MISC", + "name": "https://github.com/Ramansh123454/POCs/blob/main/POC" }, { - "url": "https:\/\/vuldb.com\/?id.211048" + "url": "https://vuldb.com/?id.211048", + "refsource": "MISC", + "name": "https://vuldb.com/?id.211048" } ] } diff --git a/2022/3xxx/CVE-2022-3549.json b/2022/3xxx/CVE-2022-3549.json index b05f41fe352..a4a33be81a2 100644 --- a/2022/3xxx/CVE-2022-3549.json +++ b/2022/3xxx/CVE-2022-3549.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file \/csms\/admin\/?page=user\/manage_user of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-211049 was assigned to this vulnerability." + "value": "A vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /csms/admin/?page=user/manage_user of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-211049 was assigned to this vulnerability." } ] }, @@ -57,16 +57,20 @@ "cvss": { "version": "3.1", "baseScore": "4.7", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:H\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "https:\/\/github.com\/Ramansh123454\/POCs\/blob\/main\/CSMS_RCE" + "url": "https://github.com/Ramansh123454/POCs/blob/main/CSMS_RCE", + "refsource": "MISC", + "name": "https://github.com/Ramansh123454/POCs/blob/main/CSMS_RCE" }, { - "url": "https:\/\/vuldb.com\/?id.211049" + "url": "https://vuldb.com/?id.211049", + "refsource": "MISC", + "name": "https://vuldb.com/?id.211049" } ] } diff --git a/2022/3xxx/CVE-2022-3550.json b/2022/3xxx/CVE-2022-3550.json new file mode 100644 index 00000000000..3c04bc23b82 --- /dev/null +++ b/2022/3xxx/CVE-2022-3550.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3550", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3551.json b/2022/3xxx/CVE-2022-3551.json new file mode 100644 index 00000000000..d1d7142aad0 --- /dev/null +++ b/2022/3xxx/CVE-2022-3551.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3551", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3552.json b/2022/3xxx/CVE-2022-3552.json new file mode 100644 index 00000000000..80a91fe342b --- /dev/null +++ b/2022/3xxx/CVE-2022-3552.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3552", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3553.json b/2022/3xxx/CVE-2022-3553.json new file mode 100644 index 00000000000..38b3b9b6f30 --- /dev/null +++ b/2022/3xxx/CVE-2022-3553.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3553", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3554.json b/2022/3xxx/CVE-2022-3554.json new file mode 100644 index 00000000000..99134225d0e --- /dev/null +++ b/2022/3xxx/CVE-2022-3554.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3554", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3555.json b/2022/3xxx/CVE-2022-3555.json new file mode 100644 index 00000000000..9cff02a4897 --- /dev/null +++ b/2022/3xxx/CVE-2022-3555.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3555", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/42xxx/CVE-2022-42163.json b/2022/42xxx/CVE-2022-42163.json index 9a9c476e393..65ad81a7a31 100644 --- a/2022/42xxx/CVE-2022-42163.json +++ b/2022/42xxx/CVE-2022-42163.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42163", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42163", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/fromNatStaticSetting." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/fromNatStaticSetting/readme.md", + "refsource": "MISC", + "name": "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/fromNatStaticSetting/readme.md" } ] } diff --git a/2022/42xxx/CVE-2022-42164.json b/2022/42xxx/CVE-2022-42164.json index 8fcf3ea60ea..59b6f545c6c 100644 --- a/2022/42xxx/CVE-2022-42164.json +++ b/2022/42xxx/CVE-2022-42164.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42164", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42164", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetClientState." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetClientState/readme.md", + "refsource": "MISC", + "name": "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetClientState/readme.md" } ] } diff --git a/2022/42xxx/CVE-2022-42165.json b/2022/42xxx/CVE-2022-42165.json index 6bcdf8b2373..c5ee9802a23 100644 --- a/2022/42xxx/CVE-2022-42165.json +++ b/2022/42xxx/CVE-2022-42165.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-42165", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-42165", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetDeviceName." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetDeviceName/readme.md", + "refsource": "MISC", + "name": "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetDeviceName/readme.md" } ] }