From b5d2f0ed911705813d478939b9fb73d1da042559 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 11 Mar 2022 22:01:17 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/17xxx/CVE-2020-17456.json | 10 ++++++++++ 2022/23xxx/CVE-2022-23296.json | 5 +++++ 2022/24xxx/CVE-2022-24319.json | 5 +++++ 2022/24xxx/CVE-2022-24415.json | 5 +++-- 2022/24xxx/CVE-2022-24416.json | 5 +++-- 2022/24xxx/CVE-2022-24419.json | 5 +++-- 2022/24xxx/CVE-2022-24420.json | 5 +++-- 2022/24xxx/CVE-2022-24421.json | 5 +++-- 2022/26xxx/CVE-2022-26061.json | 18 ++++++++++++++++++ 9 files changed, 53 insertions(+), 10 deletions(-) create mode 100644 2022/26xxx/CVE-2022-26061.json diff --git a/2020/17xxx/CVE-2020-17456.json b/2020/17xxx/CVE-2020-17456.json index 6849389ce81..dca051f306b 100644 --- a/2020/17xxx/CVE-2020-17456.json +++ b/2020/17xxx/CVE-2020-17456.json @@ -66,6 +66,16 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/166273/Seowon-SLR-120-Router-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/166273/Seowon-SLR-120-Router-Remote-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/TAPESH-TEAM/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated", + "url": "https://github.com/TAPESH-TEAM/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/50821", + "url": "https://www.exploit-db.com/exploits/50821" } ] } diff --git a/2022/23xxx/CVE-2022-23296.json b/2022/23xxx/CVE-2022-23296.json index 2d2896700b0..3a621b231c1 100644 --- a/2022/23xxx/CVE-2022-23296.json +++ b/2022/23xxx/CVE-2022-23296.json @@ -318,6 +318,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23296", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23296" + }, + { + "refsource": "MISC", + "name": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0017/MNDT-2022-0017.md", + "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0017/MNDT-2022-0017.md" } ] }, diff --git a/2022/24xxx/CVE-2022-24319.json b/2022/24xxx/CVE-2022-24319.json index 9d0f9290d57..fbbbafbbfa5 100644 --- a/2022/24xxx/CVE-2022-24319.json +++ b/2022/24xxx/CVE-2022-24319.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-05", "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-05" + }, + { + "refsource": "MISC", + "name": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0018/MNDT-2022-0018.md", + "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0018/MNDT-2022-0018.md" } ] }, diff --git a/2022/24xxx/CVE-2022-24415.json b/2022/24xxx/CVE-2022-24415.json index 4ec3952ea4e..b9dd02f8405 100644 --- a/2022/24xxx/CVE-2022-24415.json +++ b/2022/24xxx/CVE-2022-24415.json @@ -63,8 +63,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053", + "name": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053" } ] } diff --git a/2022/24xxx/CVE-2022-24416.json b/2022/24xxx/CVE-2022-24416.json index 0dfc3e73481..b323ae75e6d 100644 --- a/2022/24xxx/CVE-2022-24416.json +++ b/2022/24xxx/CVE-2022-24416.json @@ -63,8 +63,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053", + "name": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053" } ] } diff --git a/2022/24xxx/CVE-2022-24419.json b/2022/24xxx/CVE-2022-24419.json index 0dc24b48265..9c4f0681aa0 100644 --- a/2022/24xxx/CVE-2022-24419.json +++ b/2022/24xxx/CVE-2022-24419.json @@ -63,8 +63,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053", + "name": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053" } ] } diff --git a/2022/24xxx/CVE-2022-24420.json b/2022/24xxx/CVE-2022-24420.json index 6844c9f6fc5..b4ac7d31d04 100644 --- a/2022/24xxx/CVE-2022-24420.json +++ b/2022/24xxx/CVE-2022-24420.json @@ -63,8 +63,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053", + "name": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053" } ] } diff --git a/2022/24xxx/CVE-2022-24421.json b/2022/24xxx/CVE-2022-24421.json index 401eeed4773..e1396ba444a 100644 --- a/2022/24xxx/CVE-2022-24421.json +++ b/2022/24xxx/CVE-2022-24421.json @@ -63,8 +63,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053" + "refsource": "MISC", + "url": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053", + "name": "https://www.dell.com/support/kbdoc/en-us/000197057/dsa-2022-053" } ] } diff --git a/2022/26xxx/CVE-2022-26061.json b/2022/26xxx/CVE-2022-26061.json new file mode 100644 index 00000000000..f6b466b2db6 --- /dev/null +++ b/2022/26xxx/CVE-2022-26061.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26061", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file