diff --git a/2022/35xxx/CVE-2022-35261.json b/2022/35xxx/CVE-2022-35261.json index 9d254ac8814..dcb9e9429bd 100644 --- a/2022/35xxx/CVE-2022-35261.json +++ b/2022/35xxx/CVE-2022-35261.json @@ -12,7 +12,7 @@ "description_data": [ { "lang": "eng", - "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_authorized_keys/` API is affected by command injection vulnerability." + "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_authorized_keys/` API." } ] }, @@ -39,7 +39,7 @@ "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "CWE-125: Out-of-bounds Read" } ] } diff --git a/2022/35xxx/CVE-2022-35262.json b/2022/35xxx/CVE-2022-35262.json index c25f3e604e2..4c25a048398 100644 --- a/2022/35xxx/CVE-2022-35262.json +++ b/2022/35xxx/CVE-2022-35262.json @@ -12,7 +12,7 @@ "description_data": [ { "lang": "eng", - "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_xml_file/` API is affected by command injection vulnerability." + "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_xml_file/` API." } ] }, @@ -39,7 +39,7 @@ "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "CWE-125: Out-of-bounds Read" } ] } diff --git a/2022/35xxx/CVE-2022-35263.json b/2022/35xxx/CVE-2022-35263.json index 822a6122bd9..59d45b8837f 100644 --- a/2022/35xxx/CVE-2022-35263.json +++ b/2022/35xxx/CVE-2022-35263.json @@ -12,7 +12,7 @@ "description_data": [ { "lang": "eng", - "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_file/` API is affected by command injection vulnerability." + "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_file/` API." } ] }, @@ -39,7 +39,7 @@ "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "CWE-125: Out-of-bounds Read" } ] } diff --git a/2022/35xxx/CVE-2022-35264.json b/2022/35xxx/CVE-2022-35264.json index 0f6d6a84ced..4d48fcc5b7f 100644 --- a/2022/35xxx/CVE-2022-35264.json +++ b/2022/35xxx/CVE-2022-35264.json @@ -12,7 +12,7 @@ "description_data": [ { "lang": "eng", - "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_aaa_cert_file/` API is affected by command injection vulnerability." + "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_aaa_cert_file/` API." } ] }, @@ -39,7 +39,7 @@ "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "CWE-125: Out-of-bounds Read" } ] } diff --git a/2022/35xxx/CVE-2022-35265.json b/2022/35xxx/CVE-2022-35265.json index 8afce6a62dc..478449b8712 100644 --- a/2022/35xxx/CVE-2022-35265.json +++ b/2022/35xxx/CVE-2022-35265.json @@ -12,7 +12,7 @@ "description_data": [ { "lang": "eng", - "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_nodejs_app/` API is affected by command injection vulnerability." + "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_nodejs_app/` API." } ] }, @@ -39,7 +39,7 @@ "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "CWE-125: Out-of-bounds Read" } ] } diff --git a/2022/35xxx/CVE-2022-35266.json b/2022/35xxx/CVE-2022-35266.json index 87dd29747a8..8396d2cadc4 100644 --- a/2022/35xxx/CVE-2022-35266.json +++ b/2022/35xxx/CVE-2022-35266.json @@ -12,7 +12,7 @@ "description_data": [ { "lang": "eng", - "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_firmware/` API is affected by command injection vulnerability." + "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_firmware/` API." } ] }, @@ -39,7 +39,7 @@ "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "CWE-125: Out-of-bounds Read" } ] } diff --git a/2022/35xxx/CVE-2022-35267.json b/2022/35xxx/CVE-2022-35267.json index ad9c03e9180..3e3cf1bd26c 100644 --- a/2022/35xxx/CVE-2022-35267.json +++ b/2022/35xxx/CVE-2022-35267.json @@ -12,7 +12,7 @@ "description_data": [ { "lang": "eng", - "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_https_cert_file/` API is affected by command injection vulnerability." + "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_https_cert_file/` API." } ] }, @@ -39,7 +39,7 @@ "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "CWE-125: Out-of-bounds Read" } ] } diff --git a/2022/35xxx/CVE-2022-35268.json b/2022/35xxx/CVE-2022-35268.json index 194d24d0f89..48520e9729c 100644 --- a/2022/35xxx/CVE-2022-35268.json +++ b/2022/35xxx/CVE-2022-35268.json @@ -12,7 +12,7 @@ "description_data": [ { "lang": "eng", - "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_sdk_file/` API is affected by command injection vulnerability." + "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_sdk_file/` API." } ] }, @@ -39,7 +39,7 @@ "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "CWE-125: Out-of-bounds Read" } ] } diff --git a/2022/35xxx/CVE-2022-35269.json b/2022/35xxx/CVE-2022-35269.json index 001854208d5..17d799eb8e3 100644 --- a/2022/35xxx/CVE-2022-35269.json +++ b/2022/35xxx/CVE-2022-35269.json @@ -12,7 +12,7 @@ "description_data": [ { "lang": "eng", - "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_e2c_json_file/` API is affected by command injection vulnerability." + "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_e2c_json_file/` API." } ] }, @@ -39,7 +39,7 @@ "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "CWE-125: Out-of-bounds Read" } ] } diff --git a/2022/35xxx/CVE-2022-35270.json b/2022/35xxx/CVE-2022-35270.json index 1b8652821d9..efabe9f398c 100644 --- a/2022/35xxx/CVE-2022-35270.json +++ b/2022/35xxx/CVE-2022-35270.json @@ -12,7 +12,7 @@ "description_data": [ { "lang": "eng", - "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_wireguard_cert_file/` API is affected by command injection vulnerability." + "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_wireguard_cert_file/` API." } ] }, @@ -39,7 +39,7 @@ "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "CWE-125: Out-of-bounds Read" } ] } diff --git a/2022/35xxx/CVE-2022-35271.json b/2022/35xxx/CVE-2022-35271.json index 604d5c49d09..5c166a53d68 100644 --- a/2022/35xxx/CVE-2022-35271.json +++ b/2022/35xxx/CVE-2022-35271.json @@ -12,7 +12,7 @@ "description_data": [ { "lang": "eng", - "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.The `/action/import_cert_file/` API is affected by command injection vulnerability." + "value": "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_cert_file/` API." } ] }, @@ -39,7 +39,7 @@ "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "CWE-125: Out-of-bounds Read" } ] }