From b2f9fbe1e1b43e4bf2c1ea783f03882929d95783 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 23 Jun 2022 16:47:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2017/20xxx/CVE-2017-20085.json | 12 ++- 2017/20xxx/CVE-2017-20086.json | 10 +- 2017/20xxx/CVE-2017-20087.json | 10 +- 2017/20xxx/CVE-2017-20088.json | 12 ++- 2017/20xxx/CVE-2017-20089.json | 10 +- 2017/20xxx/CVE-2017-20090.json | 10 +- 2017/20xxx/CVE-2017-20091.json | 10 +- 2021/29xxx/CVE-2021-29055.json | 61 ++++++++++-- 2021/46xxx/CVE-2021-46824.json | 58 ++++++++++- 2022/1xxx/CVE-2022-1292.json | 5 + 2022/1xxx/CVE-2022-1996.json | 176 +++++++++++++++++---------------- 2022/2xxx/CVE-2022-2175.json | 83 ++++++++++++++-- 2022/2xxx/CVE-2022-2176.json | 18 ++++ 2022/2xxx/CVE-2022-2177.json | 18 ++++ 2022/2xxx/CVE-2022-2178.json | 18 ++++ 2022/2xxx/CVE-2022-2185.json | 18 ++++ 2022/2xxx/CVE-2022-2188.json | 18 ++++ 2022/2xxx/CVE-2022-2189.json | 18 ++++ 2022/2xxx/CVE-2022-2190.json | 18 ++++ 2022/31xxx/CVE-2022-31214.json | 5 + 2022/32xxx/CVE-2022-32284.json | 18 ++++ 2022/33xxx/CVE-2022-33113.json | 56 +++++++++-- 2022/33xxx/CVE-2022-33114.json | 56 +++++++++-- 2022/34xxx/CVE-2022-34005.json | 2 +- 2022/34xxx/CVE-2022-34006.json | 2 +- 2022/34xxx/CVE-2022-34011.json | 56 +++++++++-- 2022/34xxx/CVE-2022-34012.json | 56 +++++++++-- 2022/34xxx/CVE-2022-34013.json | 56 +++++++++-- 2022/34xxx/CVE-2022-34181.json | 5 - 2022/34xxx/CVE-2022-34182.json | 5 - 2022/34xxx/CVE-2022-34183.json | 5 - 2022/34xxx/CVE-2022-34184.json | 5 - 2022/34xxx/CVE-2022-34185.json | 5 - 2022/34xxx/CVE-2022-34186.json | 5 - 2022/34xxx/CVE-2022-34187.json | 5 - 2022/34xxx/CVE-2022-34188.json | 5 - 2022/34xxx/CVE-2022-34189.json | 5 - 2022/34xxx/CVE-2022-34190.json | 5 - 2022/34xxx/CVE-2022-34191.json | 5 - 2022/34xxx/CVE-2022-34192.json | 5 - 2022/34xxx/CVE-2022-34193.json | 5 - 2022/34xxx/CVE-2022-34194.json | 5 - 2022/34xxx/CVE-2022-34195.json | 5 - 2022/34xxx/CVE-2022-34196.json | 5 - 2022/34xxx/CVE-2022-34197.json | 5 - 2022/34xxx/CVE-2022-34198.json | 5 - 2022/34xxx/CVE-2022-34199.json | 5 - 2022/34xxx/CVE-2022-34200.json | 5 - 2022/34xxx/CVE-2022-34201.json | 5 - 2022/34xxx/CVE-2022-34202.json | 5 - 2022/34xxx/CVE-2022-34203.json | 5 - 2022/34xxx/CVE-2022-34204.json | 5 - 2022/34xxx/CVE-2022-34205.json | 5 - 2022/34xxx/CVE-2022-34206.json | 5 - 2022/34xxx/CVE-2022-34207.json | 5 - 2022/34xxx/CVE-2022-34208.json | 5 - 2022/34xxx/CVE-2022-34209.json | 5 - 2022/34xxx/CVE-2022-34210.json | 5 - 2022/34xxx/CVE-2022-34211.json | 5 - 2022/34xxx/CVE-2022-34212.json | 5 - 2022/34xxx/CVE-2022-34213.json | 5 - 2022/34xxx/CVE-2022-34295.json | 71 +++++++++++-- 2022/34xxx/CVE-2022-34301.json | 18 ++++ 2022/34xxx/CVE-2022-34302.json | 18 ++++ 2022/34xxx/CVE-2022-34303.json | 18 ++++ 2022/34xxx/CVE-2022-34304.json | 18 ++++ 2022/34xxx/CVE-2022-34305.json | 88 ++--------------- 2022/34xxx/CVE-2022-34306.json | 18 ++++ 2022/34xxx/CVE-2022-34308.json | 18 ++++ 2022/34xxx/CVE-2022-34309.json | 18 ++++ 2022/34xxx/CVE-2022-34310.json | 18 ++++ 2022/34xxx/CVE-2022-34312.json | 18 ++++ 2022/34xxx/CVE-2022-34313.json | 18 ++++ 2022/34xxx/CVE-2022-34314.json | 18 ++++ 2022/34xxx/CVE-2022-34316.json | 18 ++++ 2022/34xxx/CVE-2022-34318.json | 18 ++++ 2022/34xxx/CVE-2022-34319.json | 18 ++++ 2022/34xxx/CVE-2022-34348.json | 18 ++++ 2022/34xxx/CVE-2022-34349.json | 18 ++++ 2022/34xxx/CVE-2022-34350.json | 18 ++++ 2022/34xxx/CVE-2022-34352.json | 18 ++++ 2022/34xxx/CVE-2022-34353.json | 18 ++++ 2022/34xxx/CVE-2022-34354.json | 18 ++++ 2022/34xxx/CVE-2022-34355.json | 18 ++++ 2022/34xxx/CVE-2022-34357.json | 18 ++++ 2022/34xxx/CVE-2022-34358.json | 18 ++++ 2022/34xxx/CVE-2022-34359.json | 18 ++++ 2022/34xxx/CVE-2022-34360.json | 18 ++++ 2022/34xxx/CVE-2022-34362.json | 18 ++++ 89 files changed, 1279 insertions(+), 403 deletions(-) create mode 100644 2022/2xxx/CVE-2022-2176.json create mode 100644 2022/2xxx/CVE-2022-2177.json create mode 100644 2022/2xxx/CVE-2022-2178.json create mode 100644 2022/2xxx/CVE-2022-2185.json create mode 100644 2022/2xxx/CVE-2022-2188.json create mode 100644 2022/2xxx/CVE-2022-2189.json create mode 100644 2022/2xxx/CVE-2022-2190.json create mode 100644 2022/32xxx/CVE-2022-32284.json create mode 100644 2022/34xxx/CVE-2022-34301.json create mode 100644 2022/34xxx/CVE-2022-34302.json create mode 100644 2022/34xxx/CVE-2022-34303.json create mode 100644 2022/34xxx/CVE-2022-34304.json create mode 100644 2022/34xxx/CVE-2022-34306.json create mode 100644 2022/34xxx/CVE-2022-34308.json create mode 100644 2022/34xxx/CVE-2022-34309.json create mode 100644 2022/34xxx/CVE-2022-34310.json create mode 100644 2022/34xxx/CVE-2022-34312.json create mode 100644 2022/34xxx/CVE-2022-34313.json create mode 100644 2022/34xxx/CVE-2022-34314.json create mode 100644 2022/34xxx/CVE-2022-34316.json create mode 100644 2022/34xxx/CVE-2022-34318.json create mode 100644 2022/34xxx/CVE-2022-34319.json create mode 100644 2022/34xxx/CVE-2022-34348.json create mode 100644 2022/34xxx/CVE-2022-34349.json create mode 100644 2022/34xxx/CVE-2022-34350.json create mode 100644 2022/34xxx/CVE-2022-34352.json create mode 100644 2022/34xxx/CVE-2022-34353.json create mode 100644 2022/34xxx/CVE-2022-34354.json create mode 100644 2022/34xxx/CVE-2022-34355.json create mode 100644 2022/34xxx/CVE-2022-34357.json create mode 100644 2022/34xxx/CVE-2022-34358.json create mode 100644 2022/34xxx/CVE-2022-34359.json create mode 100644 2022/34xxx/CVE-2022-34360.json create mode 100644 2022/34xxx/CVE-2022-34362.json diff --git a/2017/20xxx/CVE-2017-20085.json b/2017/20xxx/CVE-2017-20085.json index e016e2f5151..eda1cae640e 100644 --- a/2017/20xxx/CVE-2017-20085.json +++ b/2017/20xxx/CVE-2017-20085.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -58,16 +58,20 @@ "cvss": { "version": "3.1", "baseScore": "3.5", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/83" + "url": "http://seclists.org/fulldisclosure/2017/Feb/83", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Feb/83" }, { - "url": "https:\/\/vuldb.com\/?id.97375" + "url": "https://vuldb.com/?id.97375", + "refsource": "MISC", + "name": "https://vuldb.com/?id.97375" } ] } diff --git a/2017/20xxx/CVE-2017-20086.json b/2017/20xxx/CVE-2017-20086.json index bc83b843c49..247e2dbc2a4 100644 --- a/2017/20xxx/CVE-2017-20086.json +++ b/2017/20xxx/CVE-2017-20086.json @@ -58,16 +58,20 @@ "cvss": { "version": "3.1", "baseScore": "6.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/95" + "url": "http://seclists.org/fulldisclosure/2017/Feb/95", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Feb/95" }, { - "url": "https:\/\/vuldb.com\/?id.97383" + "url": "https://vuldb.com/?id.97383", + "refsource": "MISC", + "name": "https://vuldb.com/?id.97383" } ] } diff --git a/2017/20xxx/CVE-2017-20087.json b/2017/20xxx/CVE-2017-20087.json index c37bd7aa2f9..ad797a7551b 100644 --- a/2017/20xxx/CVE-2017-20087.json +++ b/2017/20xxx/CVE-2017-20087.json @@ -58,16 +58,20 @@ "cvss": { "version": "3.1", "baseScore": "3.5", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/94" + "url": "http://seclists.org/fulldisclosure/2017/Feb/94", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Feb/94" }, { - "url": "https:\/\/vuldb.com\/?id.97382" + "url": "https://vuldb.com/?id.97382", + "refsource": "MISC", + "name": "https://vuldb.com/?id.97382" } ] } diff --git a/2017/20xxx/CVE-2017-20088.json b/2017/20xxx/CVE-2017-20088.json index 6eebb70e3f9..ec57f745583 100644 --- a/2017/20xxx/CVE-2017-20088.json +++ b/2017/20xxx/CVE-2017-20088.json @@ -22,7 +22,7 @@ "version": { "version_data": [ { - "version_value": "n\/a" + "version_value": "n/a" } ] } @@ -58,16 +58,20 @@ "cvss": { "version": "3.1", "baseScore": "4.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/fulldisclosure\/2017\/Feb\/90" + "url": "http://seclists.org/fulldisclosure/2017/Feb/90", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2017/Feb/90" }, { - "url": "https:\/\/vuldb.com\/?id.97380" + "url": "https://vuldb.com/?id.97380", + "refsource": "MISC", + "name": "https://vuldb.com/?id.97380" } ] } diff --git a/2017/20xxx/CVE-2017-20089.json b/2017/20xxx/CVE-2017-20089.json index 7444c28fe3d..a665b38a44e 100644 --- a/2017/20xxx/CVE-2017-20089.json +++ b/2017/20xxx/CVE-2017-20089.json @@ -58,16 +58,20 @@ "cvss": { "version": "3.1", "baseScore": "3.5", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/bugtraq\/2017\/Mar\/1" + "url": "http://seclists.org/bugtraq/2017/Mar/1", + "refsource": "MISC", + "name": "http://seclists.org/bugtraq/2017/Mar/1" }, { - "url": "https:\/\/vuldb.com\/?id.97379" + "url": "https://vuldb.com/?id.97379", + "refsource": "MISC", + "name": "https://vuldb.com/?id.97379" } ] } diff --git a/2017/20xxx/CVE-2017-20090.json b/2017/20xxx/CVE-2017-20090.json index b5a2b6edd66..ef6abcf3aab 100644 --- a/2017/20xxx/CVE-2017-20090.json +++ b/2017/20xxx/CVE-2017-20090.json @@ -58,16 +58,20 @@ "cvss": { "version": "3.1", "baseScore": "4.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/bugtraq\/2017\/Mar\/0" + "url": "http://seclists.org/bugtraq/2017/Mar/0", + "refsource": "MISC", + "name": "http://seclists.org/bugtraq/2017/Mar/0" }, { - "url": "https:\/\/vuldb.com\/?id.97378" + "url": "https://vuldb.com/?id.97378", + "refsource": "MISC", + "name": "https://vuldb.com/?id.97378" } ] } diff --git a/2017/20xxx/CVE-2017-20091.json b/2017/20xxx/CVE-2017-20091.json index 644ab719cba..cb699930d95 100644 --- a/2017/20xxx/CVE-2017-20091.json +++ b/2017/20xxx/CVE-2017-20091.json @@ -58,16 +58,20 @@ "cvss": { "version": "3.1", "baseScore": "4.3", - "vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } }, "references": { "reference_data": [ { - "url": "http:\/\/seclists.org\/bugtraq\/2017\/Feb\/57" + "url": "http://seclists.org/bugtraq/2017/Feb/57", + "refsource": "MISC", + "name": "http://seclists.org/bugtraq/2017/Feb/57" }, { - "url": "https:\/\/vuldb.com\/?id.97377" + "url": "https://vuldb.com/?id.97377", + "refsource": "MISC", + "name": "https://vuldb.com/?id.97377" } ] } diff --git a/2021/29xxx/CVE-2021-29055.json b/2021/29xxx/CVE-2021-29055.json index bb65c59dd86..01dd511fc76 100644 --- a/2021/29xxx/CVE-2021-29055.json +++ b/2021/29xxx/CVE-2021-29055.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-29055", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-29055", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting (XSS) vulnerability in sourcecodester School File Management System 1.0 via the Firtstname parameter to the Update Account form in student_profile.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://packetstormsecurity.com/files/161394/School-File-Management-System-1.0-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/161394/School-File-Management-System-1.0-Cross-Site-Scripting.html" + }, + { + "refsource": "MISC", + "name": "https://www.sourcecodester.com/php/14155/school-file-management-system.html", + "url": "https://www.sourcecodester.com/php/14155/school-file-management-system.html" } ] } diff --git a/2021/46xxx/CVE-2021-46824.json b/2021/46xxx/CVE-2021-46824.json index 7a6e2b7d27d..8632ca2759e 100644 --- a/2021/46xxx/CVE-2021-46824.json +++ b/2021/46xxx/CVE-2021-46824.json @@ -5,13 +5,67 @@ "CVE_data_meta": { "ID": "CVE-2021-46824", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49559", + "url": "https://www.exploit-db.com/exploits/49559" + }, + { + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/161394/School-File-Management-System-1.0-Cross-Site-Scripting.html", + "url": "https://packetstormsecurity.com/files/161394/School-File-Management-System-1.0-Cross-Site-Scripting.html" + }, + { + "refsource": "MISC", + "name": "https://www.sourcecodester.com/php/14155/school-file-management-system.html", + "url": "https://www.sourcecodester.com/php/14155/school-file-management-system.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting (XSS) vulnerability in sourcecodester School File Management System 1.0 via the Lastname parameter to the Update Account form in student_profile.php." } ] } diff --git a/2022/1xxx/CVE-2022-1292.json b/2022/1xxx/CVE-2022-1292.json index 9f84ad99822..c80bfd46666 100644 --- a/2022/1xxx/CVE-2022-1292.json +++ b/2022/1xxx/CVE-2022-1292.json @@ -107,6 +107,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220602-0009/", "url": "https://security.netapp.com/advisory/ntap-20220602-0009/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-b651cb69e6", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/" } ] } diff --git a/2022/1xxx/CVE-2022-1996.json b/2022/1xxx/CVE-2022-1996.json index 32901d2cc6d..7b1a080bb12 100644 --- a/2022/1xxx/CVE-2022-1996.json +++ b/2022/1xxx/CVE-2022-1996.json @@ -1,89 +1,99 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@huntr.dev", - "ID": "CVE-2022-1996", - "STATE": "PUBLIC", - "TITLE": "Authorization Bypass Through User-Controlled Key in emicklei/go-restful" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "emicklei/go-restful", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "v3.8.0" - } - ] + "CVE_data_meta": { + "ASSIGNER": "security@huntr.dev", + "ID": "CVE-2022-1996", + "STATE": "PUBLIC", + "TITLE": "Authorization Bypass Through User-Controlled Key in emicklei/go-restful" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "emicklei/go-restful", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "v3.8.0" + } + ] + } + } + ] + }, + "vendor_name": "emicklei" } - } ] - }, - "vendor_name": "emicklei" } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "baseScore": 9.3, - "baseSeverity": "CRITICAL", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "NONE", - "scope": "CHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-639 Authorization Bypass Through User-Controlled Key" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1", - "refsource": "CONFIRM", - "url": "https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1" - }, - { - "name": "https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10", - "refsource": "MISC", - "url": "https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10" - } - ] - }, - "source": { - "advisory": "be837427-415c-4d8c-808b-62ce20aa84f1", - "discovery": "EXTERNAL" - } + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-639 Authorization Bypass Through User-Controlled Key" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1", + "refsource": "CONFIRM", + "url": "https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1" + }, + { + "name": "https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10", + "refsource": "MISC", + "url": "https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-185697ef56", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBDD3Q23RCGAGHIXUCWBU6N3S4RNAKXB/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-589a0ad690", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/575BLJ3Y2EQBRNTFR2OSQQ6L2W6UCST3/" + } + ] + }, + "source": { + "advisory": "be837427-415c-4d8c-808b-62ce20aa84f1", + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2175.json b/2022/2xxx/CVE-2022-2175.json index cd192ac1b00..84983a3f503 100644 --- a/2022/2xxx/CVE-2022-2175.json +++ b/2022/2xxx/CVE-2022-2175.json @@ -1,18 +1,89 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-2175", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Buffer Over-read in vim/vim" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "vim/vim", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.2" + } + ] + } + } + ] + }, + "vendor_name": "vim" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Buffer Over-read in GitHub repository vim/vim prior to 8.2." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-126 Buffer Over-read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://huntr.dev/bounties/7f0481c2-8b57-4324-b47c-795d1ea67e55", + "refsource": "CONFIRM", + "url": "https://huntr.dev/bounties/7f0481c2-8b57-4324-b47c-795d1ea67e55" + }, + { + "name": "https://github.com/vim/vim/commit/6046aded8da002b08d380db29de2ba0268b6616e", + "refsource": "MISC", + "url": "https://github.com/vim/vim/commit/6046aded8da002b08d380db29de2ba0268b6616e" + } + ] + }, + "source": { + "advisory": "7f0481c2-8b57-4324-b47c-795d1ea67e55", + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2176.json b/2022/2xxx/CVE-2022-2176.json new file mode 100644 index 00000000000..f87a6d34a0c --- /dev/null +++ b/2022/2xxx/CVE-2022-2176.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2176", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2177.json b/2022/2xxx/CVE-2022-2177.json new file mode 100644 index 00000000000..1cccfa2e4a5 --- /dev/null +++ b/2022/2xxx/CVE-2022-2177.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2177", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2178.json b/2022/2xxx/CVE-2022-2178.json new file mode 100644 index 00000000000..6b338cc095b --- /dev/null +++ b/2022/2xxx/CVE-2022-2178.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2178", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2185.json b/2022/2xxx/CVE-2022-2185.json new file mode 100644 index 00000000000..c3749bf4279 --- /dev/null +++ b/2022/2xxx/CVE-2022-2185.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2185", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2188.json b/2022/2xxx/CVE-2022-2188.json new file mode 100644 index 00000000000..a3a3376c25b --- /dev/null +++ b/2022/2xxx/CVE-2022-2188.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2188", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2189.json b/2022/2xxx/CVE-2022-2189.json new file mode 100644 index 00000000000..4c931c115c9 --- /dev/null +++ b/2022/2xxx/CVE-2022-2189.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2189", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2190.json b/2022/2xxx/CVE-2022-2190.json new file mode 100644 index 00000000000..ff3be1d0315 --- /dev/null +++ b/2022/2xxx/CVE-2022-2190.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2190", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/31xxx/CVE-2022-31214.json b/2022/31xxx/CVE-2022-31214.json index 31281ebbfb3..7861adebad3 100644 --- a/2022/31xxx/CVE-2022-31214.json +++ b/2022/31xxx/CVE-2022-31214.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.openwall.com/lists/oss-security/2022/06/08/10", "url": "https://www.openwall.com/lists/oss-security/2022/06/08/10" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5167", + "url": "https://www.debian.org/security/2022/dsa-5167" } ] } diff --git a/2022/32xxx/CVE-2022-32284.json b/2022/32xxx/CVE-2022-32284.json new file mode 100644 index 00000000000..036317968dd --- /dev/null +++ b/2022/32xxx/CVE-2022-32284.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-32284", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33113.json b/2022/33xxx/CVE-2022-33113.json index baeefa4231d..7fd888241a5 100644 --- a/2022/33xxx/CVE-2022-33113.json +++ b/2022/33xxx/CVE-2022-33113.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-33113", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-33113", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the keyword text field under the publish blog module." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/jflyfox/jfinal_cms/issues/39", + "refsource": "MISC", + "name": "https://github.com/jflyfox/jfinal_cms/issues/39" } ] } diff --git a/2022/33xxx/CVE-2022-33114.json b/2022/33xxx/CVE-2022-33114.json index 1c4d076883d..d547ea156e0 100644 --- a/2022/33xxx/CVE-2022-33114.json +++ b/2022/33xxx/CVE-2022-33114.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-33114", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-33114", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jfinal CMS v5.1.0 was discovered to contain a SQL injection vulnerability via the attrVal parameter at /jfinal_cms/system/dict/list." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/jflyfox/jfinal_cms/issues/38", + "refsource": "MISC", + "name": "https://github.com/jflyfox/jfinal_cms/issues/38" } ] } diff --git a/2022/34xxx/CVE-2022-34005.json b/2022/34xxx/CVE-2022-34005.json index 24b40cf0943..a941ebfc688 100644 --- a/2022/34xxx/CVE-2022-34005.json +++ b/2022/34xxx/CVE-2022-34005.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. There is Remote Code Execution due to a hardcoded password for the sa account on the Microsoft SQL Express 2019 instance installed by default during TitanFTP NextGen installation, aka NX-I674 (sub-issue 1)." + "value": "An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. There is Remote Code Execution due to a hardcoded password for the sa account on the Microsoft SQL Express 2019 instance installed by default during TitanFTP NextGen installation, aka NX-I674 (sub-issue 1). NOTE: as of 2022-06-21, the 1.2.1050 release corrects this vulnerability in a new installation, but not in an upgrade installation." } ] }, diff --git a/2022/34xxx/CVE-2022-34006.json b/2022/34xxx/CVE-2022-34006.json index 719d44aada6..2d73a36b5bd 100644 --- a/2022/34xxx/CVE-2022-34006.json +++ b/2022/34xxx/CVE-2022-34006.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. When installing, Microsoft SQL Express 2019 installs by default with an SQL instance running as SYSTEM with BUILTIN\\Users as sysadmin, thus enabling unprivileged Windows users to execute commands locally as NT AUTHORITY\\SYSTEM, aka NX-I674 (sub-issue 2)." + "value": "An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. When installing, Microsoft SQL Express 2019 installs by default with an SQL instance running as SYSTEM with BUILTIN\\Users as sysadmin, thus enabling unprivileged Windows users to execute commands locally as NT AUTHORITY\\SYSTEM, aka NX-I674 (sub-issue 2). NOTE: as of 2022-06-21, the 1.2.1050 release corrects this vulnerability in a new installation, but not in an upgrade installation." } ] }, diff --git a/2022/34xxx/CVE-2022-34011.json b/2022/34xxx/CVE-2022-34011.json index 8baad1a0801..f06a359ba00 100644 --- a/2022/34xxx/CVE-2022-34011.json +++ b/2022/34xxx/CVE-2022-34011.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34011", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34011", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OneBlog v2.3.4 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the parameter entryUrls." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitee.com/yadong.zhang/DBlog/issues/I5CB2A", + "refsource": "MISC", + "name": "https://gitee.com/yadong.zhang/DBlog/issues/I5CB2A" } ] } diff --git a/2022/34xxx/CVE-2022-34012.json b/2022/34xxx/CVE-2022-34012.json index 6adfaeaaf0d..5d626758727 100644 --- a/2022/34xxx/CVE-2022-34012.json +++ b/2022/34xxx/CVE-2022-34012.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34012", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34012", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insecure permissions in OneBlog v2.3.4 allows low-level administrators to reset the passwords of high-level administrators who hold greater privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitee.com/yadong.zhang/DBlog/issues/I5CB2O", + "refsource": "MISC", + "name": "https://gitee.com/yadong.zhang/DBlog/issues/I5CB2O" } ] } diff --git a/2022/34xxx/CVE-2022-34013.json b/2022/34xxx/CVE-2022-34013.json index 3bfe802795c..a8f53ac0e47 100644 --- a/2022/34xxx/CVE-2022-34013.json +++ b/2022/34xxx/CVE-2022-34013.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34013", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34013", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OneBlog v2.3.4 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the Logo parameter under the Link module." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitee.com/yadong.zhang/DBlog/issues/I5CB2A", + "refsource": "MISC", + "name": "https://gitee.com/yadong.zhang/DBlog/issues/I5CB2A" } ] } diff --git a/2022/34xxx/CVE-2022-34181.json b/2022/34xxx/CVE-2022-34181.json index fd520dcfd8a..6234ba99113 100644 --- a/2022/34xxx/CVE-2022-34181.json +++ b/2022/34xxx/CVE-2022-34181.json @@ -57,11 +57,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2549", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2549", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34182.json b/2022/34xxx/CVE-2022-34182.json index 3251d3a0d12..687e07b07fc 100644 --- a/2022/34xxx/CVE-2022-34182.json +++ b/2022/34xxx/CVE-2022-34182.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2768", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2768", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34183.json b/2022/34xxx/CVE-2022-34183.json index 0f85644087a..6f83624d9ea 100644 --- a/2022/34xxx/CVE-2022-34183.json +++ b/2022/34xxx/CVE-2022-34183.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34184.json b/2022/34xxx/CVE-2022-34184.json index 6e88b23360a..b1f7e6f2e4d 100644 --- a/2022/34xxx/CVE-2022-34184.json +++ b/2022/34xxx/CVE-2022-34184.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34185.json b/2022/34xxx/CVE-2022-34185.json index 7721e2eefb4..3ed8a65b395 100644 --- a/2022/34xxx/CVE-2022-34185.json +++ b/2022/34xxx/CVE-2022-34185.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34186.json b/2022/34xxx/CVE-2022-34186.json index 038a73806df..f7e4d7042f5 100644 --- a/2022/34xxx/CVE-2022-34186.json +++ b/2022/34xxx/CVE-2022-34186.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34187.json b/2022/34xxx/CVE-2022-34187.json index 86f73d5562d..44a16e4cf8d 100644 --- a/2022/34xxx/CVE-2022-34187.json +++ b/2022/34xxx/CVE-2022-34187.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34188.json b/2022/34xxx/CVE-2022-34188.json index abfe8119672..fa2a611266c 100644 --- a/2022/34xxx/CVE-2022-34188.json +++ b/2022/34xxx/CVE-2022-34188.json @@ -57,11 +57,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34189.json b/2022/34xxx/CVE-2022-34189.json index 50eb6febf53..60f79e2dd49 100644 --- a/2022/34xxx/CVE-2022-34189.json +++ b/2022/34xxx/CVE-2022-34189.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34190.json b/2022/34xxx/CVE-2022-34190.json index 6ab739ee1ca..e2d438b2b00 100644 --- a/2022/34xxx/CVE-2022-34190.json +++ b/2022/34xxx/CVE-2022-34190.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34191.json b/2022/34xxx/CVE-2022-34191.json index 0beab2efb37..fa6bd5e4489 100644 --- a/2022/34xxx/CVE-2022-34191.json +++ b/2022/34xxx/CVE-2022-34191.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34192.json b/2022/34xxx/CVE-2022-34192.json index bdd1606afaf..0e774589906 100644 --- a/2022/34xxx/CVE-2022-34192.json +++ b/2022/34xxx/CVE-2022-34192.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34193.json b/2022/34xxx/CVE-2022-34193.json index 70507f4ccb9..ce494f32a1f 100644 --- a/2022/34xxx/CVE-2022-34193.json +++ b/2022/34xxx/CVE-2022-34193.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34194.json b/2022/34xxx/CVE-2022-34194.json index 2bd77564599..8a5ce27c12f 100644 --- a/2022/34xxx/CVE-2022-34194.json +++ b/2022/34xxx/CVE-2022-34194.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34195.json b/2022/34xxx/CVE-2022-34195.json index 0a534b505e8..704e10636fa 100644 --- a/2022/34xxx/CVE-2022-34195.json +++ b/2022/34xxx/CVE-2022-34195.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34196.json b/2022/34xxx/CVE-2022-34196.json index 9d579eeb206..6d04e074e6e 100644 --- a/2022/34xxx/CVE-2022-34196.json +++ b/2022/34xxx/CVE-2022-34196.json @@ -57,11 +57,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34197.json b/2022/34xxx/CVE-2022-34197.json index 5e6dcdbbea0..28a4c464dfb 100644 --- a/2022/34xxx/CVE-2022-34197.json +++ b/2022/34xxx/CVE-2022-34197.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34198.json b/2022/34xxx/CVE-2022-34198.json index f2d254c05fe..c997c1053ec 100644 --- a/2022/34xxx/CVE-2022-34198.json +++ b/2022/34xxx/CVE-2022-34198.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34199.json b/2022/34xxx/CVE-2022-34199.json index 5b031a8c7f6..2247d322873 100644 --- a/2022/34xxx/CVE-2022-34199.json +++ b/2022/34xxx/CVE-2022-34199.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2064", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2064", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34200.json b/2022/34xxx/CVE-2022-34200.json index 3bacc2b2037..e3161b0081d 100644 --- a/2022/34xxx/CVE-2022-34200.json +++ b/2022/34xxx/CVE-2022-34200.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2276", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2276", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34201.json b/2022/34xxx/CVE-2022-34201.json index 45eba26b6ce..5c1c6498a92 100644 --- a/2022/34xxx/CVE-2022-34201.json +++ b/2022/34xxx/CVE-2022-34201.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2276", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2276", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34202.json b/2022/34xxx/CVE-2022-34202.json index d4dc53b4e47..609cc7987b2 100644 --- a/2022/34xxx/CVE-2022-34202.json +++ b/2022/34xxx/CVE-2022-34202.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2066", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2066", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34203.json b/2022/34xxx/CVE-2022-34203.json index d2f4da5b026..b97e08ffea7 100644 --- a/2022/34xxx/CVE-2022-34203.json +++ b/2022/34xxx/CVE-2022-34203.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2281", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2281", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34204.json b/2022/34xxx/CVE-2022-34204.json index 930a45b8ee6..b8d207e2608 100644 --- a/2022/34xxx/CVE-2022-34204.json +++ b/2022/34xxx/CVE-2022-34204.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2281", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2281", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34205.json b/2022/34xxx/CVE-2022-34205.json index eace30e5182..2f914dae54b 100644 --- a/2022/34xxx/CVE-2022-34205.json +++ b/2022/34xxx/CVE-2022-34205.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2240", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2240", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34206.json b/2022/34xxx/CVE-2022-34206.json index 469b9e42b30..2bd71b33236 100644 --- a/2022/34xxx/CVE-2022-34206.json +++ b/2022/34xxx/CVE-2022-34206.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2240", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2240", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34207.json b/2022/34xxx/CVE-2022-34207.json index 90a453f8a0c..7fdf20928f0 100644 --- a/2022/34xxx/CVE-2022-34207.json +++ b/2022/34xxx/CVE-2022-34207.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2248", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2248", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34208.json b/2022/34xxx/CVE-2022-34208.json index 46458b507d0..cd179e09e2b 100644 --- a/2022/34xxx/CVE-2022-34208.json +++ b/2022/34xxx/CVE-2022-34208.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2248", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2248", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34209.json b/2022/34xxx/CVE-2022-34209.json index abbd475f632..45dbeb44411 100644 --- a/2022/34xxx/CVE-2022-34209.json +++ b/2022/34xxx/CVE-2022-34209.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2249", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2249", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34210.json b/2022/34xxx/CVE-2022-34210.json index afca34411bb..55e566d9578 100644 --- a/2022/34xxx/CVE-2022-34210.json +++ b/2022/34xxx/CVE-2022-34210.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2249", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2249", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34211.json b/2022/34xxx/CVE-2022-34211.json index b72aeae37a6..b76fa2a1a15 100644 --- a/2022/34xxx/CVE-2022-34211.json +++ b/2022/34xxx/CVE-2022-34211.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2279", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2279", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34212.json b/2022/34xxx/CVE-2022-34212.json index e237e66820e..934ce1afde1 100644 --- a/2022/34xxx/CVE-2022-34212.json +++ b/2022/34xxx/CVE-2022-34212.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2279", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2279", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34213.json b/2022/34xxx/CVE-2022-34213.json index 75ec8a17ed5..be84fa79c8b 100644 --- a/2022/34xxx/CVE-2022-34213.json +++ b/2022/34xxx/CVE-2022-34213.json @@ -61,11 +61,6 @@ "name": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2089", "url": "https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2089", "refsource": "CONFIRM" - }, - { - "refsource": "MLIST", - "name": "[oss-security] 20220622 Multiple vulnerabilities in Jenkins and Jenkins plugins", - "url": "http://www.openwall.com/lists/oss-security/2022/06/22/3" } ] } diff --git a/2022/34xxx/CVE-2022-34295.json b/2022/34xxx/CVE-2022-34295.json index dc906f8f5fa..34a2759e657 100644 --- a/2022/34xxx/CVE-2022-34295.json +++ b/2022/34xxx/CVE-2022-34295.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34295", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34295", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "totd before 1.5.3 does not properly randomize mesg IDs." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner", + "refsource": "MISC", + "name": "https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner" + }, + { + "url": "http://www.hit.bme.hu/~lencse/publications/JCST-Apr14-2.pdf", + "refsource": "MISC", + "name": "http://www.hit.bme.hu/~lencse/publications/JCST-Apr14-2.pdf" + }, + { + "url": "https://github.com/fwdillema/totd/commit/afd8a10a6a21f82a70940d1b43cff48143250399", + "refsource": "MISC", + "name": "https://github.com/fwdillema/totd/commit/afd8a10a6a21f82a70940d1b43cff48143250399" + }, + { + "url": "https://github.com/fwdillema/totd/releases/tag/1.5.3", + "refsource": "MISC", + "name": "https://github.com/fwdillema/totd/releases/tag/1.5.3" } ] } diff --git a/2022/34xxx/CVE-2022-34301.json b/2022/34xxx/CVE-2022-34301.json new file mode 100644 index 00000000000..c4dbdd952ef --- /dev/null +++ b/2022/34xxx/CVE-2022-34301.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34301", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34302.json b/2022/34xxx/CVE-2022-34302.json new file mode 100644 index 00000000000..5dfdaa235a1 --- /dev/null +++ b/2022/34xxx/CVE-2022-34302.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34302", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34303.json b/2022/34xxx/CVE-2022-34303.json new file mode 100644 index 00000000000..84ab0c6ddfc --- /dev/null +++ b/2022/34xxx/CVE-2022-34303.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34303", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34304.json b/2022/34xxx/CVE-2022-34304.json new file mode 100644 index 00000000000..2877f3784bf --- /dev/null +++ b/2022/34xxx/CVE-2022-34304.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34304", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34305.json b/2022/34xxx/CVE-2022-34305.json index ba201568331..f4a4fa7e126 100644 --- a/2022/34xxx/CVE-2022-34305.json +++ b/2022/34xxx/CVE-2022-34305.json @@ -1,90 +1,18 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@apache.org", - "ID": "CVE-2022-34305", - "STATE": "PUBLIC", - "TITLE": "XSS in examples web application" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Apache Tomcat", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_name": "Apache Tomcat 8.5", - "version_value": "8.5.50 to 8.5.81" - }, - { - "version_affected": "=", - "version_name": "Apache Tomcat 9", - "version_value": "9.0.30 to 9.0.64" - }, - { - "version_affected": "=", - "version_name": "Apache Tomcat 10.0", - "version_value": "10.0.0-M1 to 10.0.22" - }, - { - "version_affected": "=", - "version_name": "Apache Tomcat 10.1", - "version_value": "10.1.0-M1 to 10.1.0-M16" - } - ] - } - } - ] - }, - "vendor_name": "Apache Software Foundation" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34305", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, "description": { "description_data": [ { "lang": "eng", - "value": "In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability. " + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." } ] - }, - "generator": { - "engine": "Vulnogram 0.0.9" - }, - "impact": [ - { - "other": "low" - } - ], - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "CONFIRM", - "url": "https://lists.apache.org/thread/k04zk0nq6w57m72w5gb0r6z9ryhmvr4k" - } - ] - }, - "source": { - "discovery": "UNKNOWN" } -} +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34306.json b/2022/34xxx/CVE-2022-34306.json new file mode 100644 index 00000000000..0d721517886 --- /dev/null +++ b/2022/34xxx/CVE-2022-34306.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34306", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34308.json b/2022/34xxx/CVE-2022-34308.json new file mode 100644 index 00000000000..eeac84e4bb5 --- /dev/null +++ b/2022/34xxx/CVE-2022-34308.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34308", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34309.json b/2022/34xxx/CVE-2022-34309.json new file mode 100644 index 00000000000..acfce4f8b9d --- /dev/null +++ b/2022/34xxx/CVE-2022-34309.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34309", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34310.json b/2022/34xxx/CVE-2022-34310.json new file mode 100644 index 00000000000..c96bf036b3f --- /dev/null +++ b/2022/34xxx/CVE-2022-34310.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34310", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34312.json b/2022/34xxx/CVE-2022-34312.json new file mode 100644 index 00000000000..70caf1ade43 --- /dev/null +++ b/2022/34xxx/CVE-2022-34312.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34312", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34313.json b/2022/34xxx/CVE-2022-34313.json new file mode 100644 index 00000000000..337685cdfce --- /dev/null +++ b/2022/34xxx/CVE-2022-34313.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34313", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34314.json b/2022/34xxx/CVE-2022-34314.json new file mode 100644 index 00000000000..e6cfe23d851 --- /dev/null +++ b/2022/34xxx/CVE-2022-34314.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34314", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34316.json b/2022/34xxx/CVE-2022-34316.json new file mode 100644 index 00000000000..d2a6d453809 --- /dev/null +++ b/2022/34xxx/CVE-2022-34316.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34316", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34318.json b/2022/34xxx/CVE-2022-34318.json new file mode 100644 index 00000000000..8f51a13d5c1 --- /dev/null +++ b/2022/34xxx/CVE-2022-34318.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34318", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34319.json b/2022/34xxx/CVE-2022-34319.json new file mode 100644 index 00000000000..0a37ccbc528 --- /dev/null +++ b/2022/34xxx/CVE-2022-34319.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34319", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34348.json b/2022/34xxx/CVE-2022-34348.json new file mode 100644 index 00000000000..124d060e12e --- /dev/null +++ b/2022/34xxx/CVE-2022-34348.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34348", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34349.json b/2022/34xxx/CVE-2022-34349.json new file mode 100644 index 00000000000..356f75d2632 --- /dev/null +++ b/2022/34xxx/CVE-2022-34349.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34349", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34350.json b/2022/34xxx/CVE-2022-34350.json new file mode 100644 index 00000000000..5a941930e1f --- /dev/null +++ b/2022/34xxx/CVE-2022-34350.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34350", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34352.json b/2022/34xxx/CVE-2022-34352.json new file mode 100644 index 00000000000..0142473f3ba --- /dev/null +++ b/2022/34xxx/CVE-2022-34352.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34352", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34353.json b/2022/34xxx/CVE-2022-34353.json new file mode 100644 index 00000000000..9d2b461c31c --- /dev/null +++ b/2022/34xxx/CVE-2022-34353.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34353", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34354.json b/2022/34xxx/CVE-2022-34354.json new file mode 100644 index 00000000000..202563c9495 --- /dev/null +++ b/2022/34xxx/CVE-2022-34354.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34354", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34355.json b/2022/34xxx/CVE-2022-34355.json new file mode 100644 index 00000000000..251f0acd6ff --- /dev/null +++ b/2022/34xxx/CVE-2022-34355.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34355", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34357.json b/2022/34xxx/CVE-2022-34357.json new file mode 100644 index 00000000000..ff3c4220281 --- /dev/null +++ b/2022/34xxx/CVE-2022-34357.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34357", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34358.json b/2022/34xxx/CVE-2022-34358.json new file mode 100644 index 00000000000..cb9a575b0dd --- /dev/null +++ b/2022/34xxx/CVE-2022-34358.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34358", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34359.json b/2022/34xxx/CVE-2022-34359.json new file mode 100644 index 00000000000..1dc30a05f6a --- /dev/null +++ b/2022/34xxx/CVE-2022-34359.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34359", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34360.json b/2022/34xxx/CVE-2022-34360.json new file mode 100644 index 00000000000..edf7338362f --- /dev/null +++ b/2022/34xxx/CVE-2022-34360.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34360", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34362.json b/2022/34xxx/CVE-2022-34362.json new file mode 100644 index 00000000000..d7674ce6ffe --- /dev/null +++ b/2022/34xxx/CVE-2022-34362.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-34362", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file