From a9878d1d6e9c486fe06b097cf9252ed933b349ba Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 2 Dec 2022 23:00:50 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/32xxx/CVE-2021-32907.json | 4 +- 2021/32xxx/CVE-2021-32908.json | 4 +- 2021/32xxx/CVE-2021-32909.json | 4 +- 2021/32xxx/CVE-2021-32910.json | 4 +- 2021/32xxx/CVE-2021-32911.json | 4 +- 2021/32xxx/CVE-2021-32912.json | 4 +- 2021/32xxx/CVE-2021-32913.json | 4 +- 2021/32xxx/CVE-2021-32914.json | 4 +- 2021/32xxx/CVE-2021-32915.json | 4 +- 2021/43xxx/CVE-2021-43864.json | 4 +- 2021/43xxx/CVE-2021-43865.json | 4 +- 2021/43xxx/CVE-2021-43866.json | 4 +- 2021/43xxx/CVE-2021-43867.json | 4 +- 2021/43xxx/CVE-2021-43868.json | 4 +- 2021/43xxx/CVE-2021-43869.json | 4 +- 2021/43xxx/CVE-2021-43870.json | 4 +- 2021/43xxx/CVE-2021-43871.json | 4 +- 2021/43xxx/CVE-2021-43872.json | 4 +- 2021/43xxx/CVE-2021-43873.json | 4 +- 2021/43xxx/CVE-2021-43874.json | 4 +- 2022/23xxx/CVE-2022-23465.json | 81 ++++++++++++++++++++++++++++++++-- 21 files changed, 117 insertions(+), 44 deletions(-) diff --git a/2021/32xxx/CVE-2021-32907.json b/2021/32xxx/CVE-2021-32907.json index c7c1555cd3c..26a2ab5f5db 100644 --- a/2021/32xxx/CVE-2021-32907.json +++ b/2021/32xxx/CVE-2021-32907.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-32907", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32908.json b/2021/32xxx/CVE-2021-32908.json index d599168a977..288bd3d5063 100644 --- a/2021/32xxx/CVE-2021-32908.json +++ b/2021/32xxx/CVE-2021-32908.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-32908", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32909.json b/2021/32xxx/CVE-2021-32909.json index 498be6eba72..5dc220e98b3 100644 --- a/2021/32xxx/CVE-2021-32909.json +++ b/2021/32xxx/CVE-2021-32909.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-32909", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32910.json b/2021/32xxx/CVE-2021-32910.json index 3f0594efeb3..a16516bed46 100644 --- a/2021/32xxx/CVE-2021-32910.json +++ b/2021/32xxx/CVE-2021-32910.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-32910", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32911.json b/2021/32xxx/CVE-2021-32911.json index 28b3534c78e..4229d39d057 100644 --- a/2021/32xxx/CVE-2021-32911.json +++ b/2021/32xxx/CVE-2021-32911.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-32911", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32912.json b/2021/32xxx/CVE-2021-32912.json index 835d55e79b0..90de8708b36 100644 --- a/2021/32xxx/CVE-2021-32912.json +++ b/2021/32xxx/CVE-2021-32912.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-32912", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32913.json b/2021/32xxx/CVE-2021-32913.json index 1315d09722b..7ad5f884394 100644 --- a/2021/32xxx/CVE-2021-32913.json +++ b/2021/32xxx/CVE-2021-32913.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-32913", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32914.json b/2021/32xxx/CVE-2021-32914.json index 71cb213e216..e19f7e886cf 100644 --- a/2021/32xxx/CVE-2021-32914.json +++ b/2021/32xxx/CVE-2021-32914.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-32914", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/32xxx/CVE-2021-32915.json b/2021/32xxx/CVE-2021-32915.json index 9253078daae..f880816f7ee 100644 --- a/2021/32xxx/CVE-2021-32915.json +++ b/2021/32xxx/CVE-2021-32915.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-32915", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43864.json b/2021/43xxx/CVE-2021-43864.json index 4673f171277..d6ec1a02d27 100644 --- a/2021/43xxx/CVE-2021-43864.json +++ b/2021/43xxx/CVE-2021-43864.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-43864", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43865.json b/2021/43xxx/CVE-2021-43865.json index f97c66ab04c..b7ba41e6e5d 100644 --- a/2021/43xxx/CVE-2021-43865.json +++ b/2021/43xxx/CVE-2021-43865.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-43865", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43866.json b/2021/43xxx/CVE-2021-43866.json index 37fa1d6d12f..54f485f6b82 100644 --- a/2021/43xxx/CVE-2021-43866.json +++ b/2021/43xxx/CVE-2021-43866.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-43866", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43867.json b/2021/43xxx/CVE-2021-43867.json index 4499578cdbc..2d0c2cf51df 100644 --- a/2021/43xxx/CVE-2021-43867.json +++ b/2021/43xxx/CVE-2021-43867.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-43867", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43868.json b/2021/43xxx/CVE-2021-43868.json index b25d2e034d1..f309a82354b 100644 --- a/2021/43xxx/CVE-2021-43868.json +++ b/2021/43xxx/CVE-2021-43868.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-43868", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43869.json b/2021/43xxx/CVE-2021-43869.json index f5e89192dc8..14fce07008b 100644 --- a/2021/43xxx/CVE-2021-43869.json +++ b/2021/43xxx/CVE-2021-43869.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-43869", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43870.json b/2021/43xxx/CVE-2021-43870.json index 6d84c2dab56..b5cbf57d8a8 100644 --- a/2021/43xxx/CVE-2021-43870.json +++ b/2021/43xxx/CVE-2021-43870.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-43870", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43871.json b/2021/43xxx/CVE-2021-43871.json index ac81bf2e3f4..39adf491137 100644 --- a/2021/43xxx/CVE-2021-43871.json +++ b/2021/43xxx/CVE-2021-43871.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-43871", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43872.json b/2021/43xxx/CVE-2021-43872.json index e0db6461020..ce1a18a16e0 100644 --- a/2021/43xxx/CVE-2021-43872.json +++ b/2021/43xxx/CVE-2021-43872.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-43872", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43873.json b/2021/43xxx/CVE-2021-43873.json index 9cc345b59ec..4b00da407b1 100644 --- a/2021/43xxx/CVE-2021-43873.json +++ b/2021/43xxx/CVE-2021-43873.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-43873", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43874.json b/2021/43xxx/CVE-2021-43874.json index 0f45fc8ddf9..98d6e1d0175 100644 --- a/2021/43xxx/CVE-2021-43874.json +++ b/2021/43xxx/CVE-2021-43874.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-43874", - "ASSIGNER": "security-advisories@github.com", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } - } \ No newline at end of file +} \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23465.json b/2022/23xxx/CVE-2022-23465.json index a6f38aafc12..0cb2168ddf0 100644 --- a/2022/23xxx/CVE-2022-23465.json +++ b/2022/23xxx/CVE-2022-23465.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23465", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SwiftTerm is a Xterm/VT100 Terminal emulator. Prior to commit a94e6b24d24ce9680ad79884992e1dff8e150a31, an attacker could modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. Version a94e6b24d24ce9680ad79884992e1dff8e150a31 contains a patch for this issue. There are no known workarounds available." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-94: Improper Control of Generation of Code ('Code Injection')", + "cweId": "CWE-94" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "migueldeicaza", + "product": { + "product_data": [ + { + "product_name": "SwiftTerm", + "version": { + "version_data": [ + { + "version_value": "< a94e6b24d24ce9680ad79884992e1dff8e150a31", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/migueldeicaza/SwiftTerm/security/advisories/GHSA-jq43-q8mx-r7mq", + "refsource": "MISC", + "name": "https://github.com/migueldeicaza/SwiftTerm/security/advisories/GHSA-jq43-q8mx-r7mq" + }, + { + "url": "https://github.com/migueldeicaza/SwiftTerm/commit/a94e6b24d24ce9680ad79884992e1dff8e150a31", + "refsource": "MISC", + "name": "https://github.com/migueldeicaza/SwiftTerm/commit/a94e6b24d24ce9680ad79884992e1dff8e150a31" + } + ] + }, + "source": { + "advisory": "GHSA-jq43-q8mx-r7mq", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", + "version": "3.1" } ] }