From d978c120c93ce8f9e7252ca84f1af87b195ef74d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 1 Nov 2022 01:00:30 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/43xxx/CVE-2022-43353.json | 56 +++++++++++++++++++++++++--- 2022/43xxx/CVE-2022-43354.json | 56 +++++++++++++++++++++++++--- 2022/43xxx/CVE-2022-43355.json | 56 +++++++++++++++++++++++++--- 2022/44xxx/CVE-2022-44542.json | 67 ++++++++++++++++++++++++++++++++++ 2022/44xxx/CVE-2022-44543.json | 18 +++++++++ 2022/44xxx/CVE-2022-44544.json | 18 +++++++++ 2022/44xxx/CVE-2022-44545.json | 18 +++++++++ 7 files changed, 271 insertions(+), 18 deletions(-) create mode 100644 2022/44xxx/CVE-2022-44542.json create mode 100644 2022/44xxx/CVE-2022-44543.json create mode 100644 2022/44xxx/CVE-2022-44544.json create mode 100644 2022/44xxx/CVE-2022-44545.json diff --git a/2022/43xxx/CVE-2022-43353.json b/2022/43xxx/CVE-2022-43353.json index 39e4c398870..21edc84b825 100644 --- a/2022/43xxx/CVE-2022-43353.json +++ b/2022/43xxx/CVE-2022-43353.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-43353", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-43353", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=orders/view_order." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/daytime888/bug_report/blob/main/vendors/oretnom23/sanitization-management-system/SQLi-1.md", + "url": "https://github.com/daytime888/bug_report/blob/main/vendors/oretnom23/sanitization-management-system/SQLi-1.md" } ] } diff --git a/2022/43xxx/CVE-2022-43354.json b/2022/43xxx/CVE-2022-43354.json index 9fd19d6e38e..e818aec77da 100644 --- a/2022/43xxx/CVE-2022-43354.json +++ b/2022/43xxx/CVE-2022-43354.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-43354", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-43354", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=orders/manage_request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/daytime888/bug_report/blob/main/vendors/oretnom23/sanitization-management-system/SQLi-2.md", + "url": "https://github.com/daytime888/bug_report/blob/main/vendors/oretnom23/sanitization-management-system/SQLi-2.md" } ] } diff --git a/2022/43xxx/CVE-2022-43355.json b/2022/43xxx/CVE-2022-43355.json index 599b664b728..18d04182f54 100644 --- a/2022/43xxx/CVE-2022-43355.json +++ b/2022/43xxx/CVE-2022-43355.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-43355", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-43355", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /php-sms/classes/Master.php?f=delete_service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/daytime888/bug_report/blob/main/vendors/oretnom23/sanitization-management-system/SQLi-3.md", + "url": "https://github.com/daytime888/bug_report/blob/main/vendors/oretnom23/sanitization-management-system/SQLi-3.md" } ] } diff --git a/2022/44xxx/CVE-2022-44542.json b/2022/44xxx/CVE-2022-44542.json new file mode 100644 index 00000000000..0648dd47d23 --- /dev/null +++ b/2022/44xxx/CVE-2022-44542.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2022-44542", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "lesspipe before 2.06 allows attackers to execute code via Perl Storable (pst) files, because of deserialized object destructor execution via a key/value pair in a hash." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugs.gentoo.org/865631", + "refsource": "MISC", + "name": "https://bugs.gentoo.org/865631" + }, + { + "url": "https://github.com/wofr06/lesspipe/releases/tag/v2.06", + "refsource": "MISC", + "name": "https://github.com/wofr06/lesspipe/releases/tag/v2.06" + } + ] + } +} \ No newline at end of file diff --git a/2022/44xxx/CVE-2022-44543.json b/2022/44xxx/CVE-2022-44543.json new file mode 100644 index 00000000000..9e5251715b6 --- /dev/null +++ b/2022/44xxx/CVE-2022-44543.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-44543", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/44xxx/CVE-2022-44544.json b/2022/44xxx/CVE-2022-44544.json new file mode 100644 index 00000000000..3fb1b6d3fd1 --- /dev/null +++ b/2022/44xxx/CVE-2022-44544.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-44544", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/44xxx/CVE-2022-44545.json b/2022/44xxx/CVE-2022-44545.json new file mode 100644 index 00000000000..65bd8467586 --- /dev/null +++ b/2022/44xxx/CVE-2022-44545.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-44545", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file