diff --git a/2022/2xxx/CVE-2022-2047.json b/2022/2xxx/CVE-2022-2047.json index c243de1a075..3b45758968f 100644 --- a/2022/2xxx/CVE-2022-2047.json +++ b/2022/2xxx/CVE-2022-2047.json @@ -83,7 +83,12 @@ "name": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-cj7v-27pg-wf7q", "refsource": "CONFIRM", "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-cj7v-27pg-wf7q" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5198", + "url": "https://www.debian.org/security/2022/dsa-5198" } ] } -} +} \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2048.json b/2022/2xxx/CVE-2022-2048.json index 0b62d930dc6..7907e694f2c 100644 --- a/2022/2xxx/CVE-2022-2048.json +++ b/2022/2xxx/CVE-2022-2048.json @@ -92,6 +92,11 @@ "name": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j", "refsource": "CONFIRM", "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5198", + "url": "https://www.debian.org/security/2022/dsa-5198" } ] } diff --git a/2022/34xxx/CVE-2022-34924.json b/2022/34xxx/CVE-2022-34924.json index d406f2f9b45..ccdd5c036be 100644 --- a/2022/34xxx/CVE-2022-34924.json +++ b/2022/34xxx/CVE-2022-34924.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34924", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34924", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Lanling OA Landray Office Automation (OA) internal patch number #133383/#137780 contains an arbitrary file read vulnerability via the component /sys/ui/extend/varkind/custom.jsp." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://codeantenna.com/a/DXQfemaZEH", + "refsource": "MISC", + "name": "https://codeantenna.com/a/DXQfemaZEH" + }, + { + "url": "https://developpaper.com/lanling-oa-foreground-arbitrary-file-reading-vulnerability-exploitation/", + "refsource": "MISC", + "name": "https://developpaper.com/lanling-oa-foreground-arbitrary-file-reading-vulnerability-exploitation/" } ] }