diff --git a/2021/39xxx/CVE-2021-39327.json b/2021/39xxx/CVE-2021-39327.json index 32e162c804c..2326720aba0 100644 --- a/2021/39xxx/CVE-2021-39327.json +++ b/2021/39xxx/CVE-2021-39327.json @@ -96,6 +96,16 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html", "url": "http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/Hacker5preme/Exploits/tree/main/Wordpress/CVE-2021-39327", + "url": "https://github.com/Hacker5preme/Exploits/tree/main/Wordpress/CVE-2021-39327" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/50382", + "url": "https://www.exploit-db.com/exploits/50382" } ] }, diff --git a/2021/39xxx/CVE-2021-39352.json b/2021/39xxx/CVE-2021-39352.json index feaa11f08d5..e4145a78591 100644 --- a/2021/39xxx/CVE-2021-39352.json +++ b/2021/39xxx/CVE-2021-39352.json @@ -106,6 +106,16 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/165463/WordPress-Catch-Themes-Demo-Import-Shell-Upload.html", "url": "http://packetstormsecurity.com/files/165463/WordPress-Catch-Themes-Demo-Import-Shell-Upload.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/Hacker5preme/Exploits/tree/main/Wordpress/CVE-2021-39352", + "url": "https://github.com/Hacker5preme/Exploits/tree/main/Wordpress/CVE-2021-39352" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/50580", + "url": "https://www.exploit-db.com/exploits/50580" } ] }, diff --git a/2021/41xxx/CVE-2021-41495.json b/2021/41xxx/CVE-2021-41495.json index 968565b72f7..2cefc334edf 100644 --- a/2021/41xxx/CVE-2021-41495.json +++ b/2021/41xxx/CVE-2021-41495.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Null Pointer Dereference vulnerability exists in numpy.sort in NumPy < and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays." + "value": "** DISPUTED ** Null Pointer Dereference vulnerability exists in numpy.sort in NumPy < and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place." } ] }, diff --git a/2022/0xxx/CVE-2022-0516.json b/2022/0xxx/CVE-2022-0516.json new file mode 100644 index 00000000000..9313ce17d48 --- /dev/null +++ b/2022/0xxx/CVE-2022-0516.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0516", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0517.json b/2022/0xxx/CVE-2022-0517.json new file mode 100644 index 00000000000..4a54ca0d936 --- /dev/null +++ b/2022/0xxx/CVE-2022-0517.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-0517", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24663.json b/2022/24xxx/CVE-2022-24663.json new file mode 100644 index 00000000000..13ce7de002c --- /dev/null +++ b/2022/24xxx/CVE-2022-24663.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24663", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24664.json b/2022/24xxx/CVE-2022-24664.json new file mode 100644 index 00000000000..0b57d9b5fb1 --- /dev/null +++ b/2022/24xxx/CVE-2022-24664.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24664", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24665.json b/2022/24xxx/CVE-2022-24665.json new file mode 100644 index 00000000000..98efb282a67 --- /dev/null +++ b/2022/24xxx/CVE-2022-24665.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24665", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24666.json b/2022/24xxx/CVE-2022-24666.json new file mode 100644 index 00000000000..2d20645f120 --- /dev/null +++ b/2022/24xxx/CVE-2022-24666.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24666", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24667.json b/2022/24xxx/CVE-2022-24667.json new file mode 100644 index 00000000000..64906d4c713 --- /dev/null +++ b/2022/24xxx/CVE-2022-24667.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24667", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24668.json b/2022/24xxx/CVE-2022-24668.json new file mode 100644 index 00000000000..c8097053d68 --- /dev/null +++ b/2022/24xxx/CVE-2022-24668.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-24668", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file