From e1babbd92470f21a776805cda8c0ace30cc06aeb Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 27 Sep 2022 23:00:30 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2014/2xxx/CVE-2014-2265.json | 15 ++-- 2020/18xxx/CVE-2020-18151.json | 2 +- 2021/27xxx/CVE-2021-27853.json | 24 ++++--- 2021/27xxx/CVE-2021-27854.json | 21 +++--- 2021/27xxx/CVE-2021-27861.json | 21 +++--- 2021/27xxx/CVE-2021-27862.json | 16 +++-- 2021/35xxx/CVE-2021-35036.json | 70 ++++++++++++++++++- 2021/41xxx/CVE-2021-41433.json | 61 +++++++++++++++-- 2022/1xxx/CVE-2022-1941.json | 5 ++ 2022/23xxx/CVE-2022-23006.json | 121 +++++++++++++++++++++++++++++++-- 2022/26xxx/CVE-2022-26375.json | 18 +++++ 2022/30xxx/CVE-2022-30544.json | 18 +++++ 2022/31xxx/CVE-2022-31367.json | 66 ++++++++++++++++-- 2022/34xxx/CVE-2022-34326.json | 61 +++++++++++++++-- 2022/35xxx/CVE-2022-35730.json | 18 +++++ 2022/36xxx/CVE-2022-36399.json | 18 +++++ 2022/37xxx/CVE-2022-37028.json | 61 +++++++++++++++-- 2022/37xxx/CVE-2022-37193.json | 61 +++++++++++++++-- 2022/37xxx/CVE-2022-37209.json | 61 +++++++++++++++-- 2022/37xxx/CVE-2022-37703.json | 5 ++ 2022/38xxx/CVE-2022-38055.json | 18 +++++ 2022/38xxx/CVE-2022-38057.json | 18 +++++ 2022/38xxx/CVE-2022-38141.json | 18 +++++ 2022/38xxx/CVE-2022-38335.json | 66 ++++++++++++++++-- 2022/38xxx/CVE-2022-38456.json | 18 +++++ 2022/38xxx/CVE-2022-38467.json | 18 +++++ 2022/38xxx/CVE-2022-38932.json | 56 +++++++++++++-- 2022/39xxx/CVE-2022-39258.json | 2 +- 2022/39xxx/CVE-2022-39835.json | 61 +++++++++++++++-- 2022/3xxx/CVE-2022-3303.json | 55 ++++++++++++++- 2022/3xxx/CVE-2022-3323.json | 50 +++++++++++++- 2022/3xxx/CVE-2022-3334.json | 18 +++++ 2022/3xxx/CVE-2022-3335.json | 18 +++++ 2022/3xxx/CVE-2022-3336.json | 18 +++++ 2022/3xxx/CVE-2022-3337.json | 18 +++++ 2022/3xxx/CVE-2022-3338.json | 18 +++++ 2022/3xxx/CVE-2022-3339.json | 18 +++++ 2022/3xxx/CVE-2022-3340.json | 18 +++++ 2022/3xxx/CVE-2022-3341.json | 18 +++++ 2022/3xxx/CVE-2022-3342.json | 18 +++++ 2022/3xxx/CVE-2022-3343.json | 18 +++++ 2022/3xxx/CVE-2022-3344.json | 18 +++++ 2022/40xxx/CVE-2022-40128.json | 18 +++++ 2022/40xxx/CVE-2022-40130.json | 18 +++++ 2022/40xxx/CVE-2022-40192.json | 18 +++++ 2022/40xxx/CVE-2022-40203.json | 18 +++++ 2022/40xxx/CVE-2022-40209.json | 18 +++++ 2022/40xxx/CVE-2022-40216.json | 18 +++++ 2022/40xxx/CVE-2022-40218.json | 18 +++++ 2022/40xxx/CVE-2022-40311.json | 18 +++++ 2022/40xxx/CVE-2022-40352.json | 56 +++++++++++++-- 2022/40xxx/CVE-2022-40353.json | 56 +++++++++++++-- 2022/40xxx/CVE-2022-40354.json | 56 +++++++++++++-- 2022/40xxx/CVE-2022-40697.json | 18 +++++ 2022/40xxx/CVE-2022-40699.json | 18 +++++ 2022/40xxx/CVE-2022-40700.json | 18 +++++ 2022/40xxx/CVE-2022-40816.json | 56 +++++++++++++-- 2022/40xxx/CVE-2022-40817.json | 56 +++++++++++++-- 2022/40xxx/CVE-2022-40877.json | 56 +++++++++++++-- 2022/40xxx/CVE-2022-40878.json | 56 +++++++++++++-- 2022/40xxx/CVE-2022-40975.json | 18 +++++ 2022/41xxx/CVE-2022-41132.json | 18 +++++ 2022/41xxx/CVE-2022-41134.json | 18 +++++ 2022/41xxx/CVE-2022-41135.json | 18 +++++ 2022/41xxx/CVE-2022-41155.json | 18 +++++ 2022/41xxx/CVE-2022-41315.json | 18 +++++ 2022/41xxx/CVE-2022-41609.json | 18 +++++ 2022/41xxx/CVE-2022-41612.json | 18 +++++ 2022/41xxx/CVE-2022-41615.json | 18 +++++ 2022/41xxx/CVE-2022-41616.json | 18 +++++ 2022/41xxx/CVE-2022-41618.json | 18 +++++ 2022/41xxx/CVE-2022-41620.json | 18 +++++ 2022/41xxx/CVE-2022-41623.json | 18 +++++ 2022/41xxx/CVE-2022-41633.json | 18 +++++ 2022/41xxx/CVE-2022-41634.json | 18 +++++ 2022/41xxx/CVE-2022-41635.json | 18 +++++ 2022/41xxx/CVE-2022-41638.json | 18 +++++ 2022/41xxx/CVE-2022-41640.json | 18 +++++ 2022/41xxx/CVE-2022-41643.json | 18 +++++ 2022/41xxx/CVE-2022-41647.json | 18 +++++ 2022/41xxx/CVE-2022-41650.json | 18 +++++ 2022/41xxx/CVE-2022-41655.json | 18 +++++ 2022/41xxx/CVE-2022-41656.json | 18 +++++ 2022/41xxx/CVE-2022-41660.json | 18 +++++ 2022/41xxx/CVE-2022-41661.json | 18 +++++ 2022/41xxx/CVE-2022-41662.json | 18 +++++ 2022/41xxx/CVE-2022-41663.json | 18 +++++ 2022/41xxx/CVE-2022-41664.json | 18 +++++ 2022/41xxx/CVE-2022-41665.json | 18 +++++ 2022/41xxx/CVE-2022-41666.json | 18 +++++ 2022/41xxx/CVE-2022-41667.json | 18 +++++ 2022/41xxx/CVE-2022-41668.json | 18 +++++ 2022/41xxx/CVE-2022-41669.json | 18 +++++ 2022/41xxx/CVE-2022-41670.json | 18 +++++ 2022/41xxx/CVE-2022-41671.json | 18 +++++ 95 files changed, 2392 insertions(+), 149 deletions(-) create mode 100644 2022/26xxx/CVE-2022-26375.json create mode 100644 2022/30xxx/CVE-2022-30544.json create mode 100644 2022/35xxx/CVE-2022-35730.json create mode 100644 2022/36xxx/CVE-2022-36399.json create mode 100644 2022/38xxx/CVE-2022-38055.json create mode 100644 2022/38xxx/CVE-2022-38057.json create mode 100644 2022/38xxx/CVE-2022-38141.json create mode 100644 2022/38xxx/CVE-2022-38456.json create mode 100644 2022/38xxx/CVE-2022-38467.json create mode 100644 2022/3xxx/CVE-2022-3334.json create mode 100644 2022/3xxx/CVE-2022-3335.json create mode 100644 2022/3xxx/CVE-2022-3336.json create mode 100644 2022/3xxx/CVE-2022-3337.json create mode 100644 2022/3xxx/CVE-2022-3338.json create mode 100644 2022/3xxx/CVE-2022-3339.json create mode 100644 2022/3xxx/CVE-2022-3340.json create mode 100644 2022/3xxx/CVE-2022-3341.json create mode 100644 2022/3xxx/CVE-2022-3342.json create mode 100644 2022/3xxx/CVE-2022-3343.json create mode 100644 2022/3xxx/CVE-2022-3344.json create mode 100644 2022/40xxx/CVE-2022-40128.json create mode 100644 2022/40xxx/CVE-2022-40130.json create mode 100644 2022/40xxx/CVE-2022-40192.json create mode 100644 2022/40xxx/CVE-2022-40203.json create mode 100644 2022/40xxx/CVE-2022-40209.json create mode 100644 2022/40xxx/CVE-2022-40216.json create mode 100644 2022/40xxx/CVE-2022-40218.json create mode 100644 2022/40xxx/CVE-2022-40311.json create mode 100644 2022/40xxx/CVE-2022-40697.json create mode 100644 2022/40xxx/CVE-2022-40699.json create mode 100644 2022/40xxx/CVE-2022-40700.json create mode 100644 2022/40xxx/CVE-2022-40975.json create mode 100644 2022/41xxx/CVE-2022-41132.json create mode 100644 2022/41xxx/CVE-2022-41134.json create mode 100644 2022/41xxx/CVE-2022-41135.json create mode 100644 2022/41xxx/CVE-2022-41155.json create mode 100644 2022/41xxx/CVE-2022-41315.json create mode 100644 2022/41xxx/CVE-2022-41609.json create mode 100644 2022/41xxx/CVE-2022-41612.json create mode 100644 2022/41xxx/CVE-2022-41615.json create mode 100644 2022/41xxx/CVE-2022-41616.json create mode 100644 2022/41xxx/CVE-2022-41618.json create mode 100644 2022/41xxx/CVE-2022-41620.json create mode 100644 2022/41xxx/CVE-2022-41623.json create mode 100644 2022/41xxx/CVE-2022-41633.json create mode 100644 2022/41xxx/CVE-2022-41634.json create mode 100644 2022/41xxx/CVE-2022-41635.json create mode 100644 2022/41xxx/CVE-2022-41638.json create mode 100644 2022/41xxx/CVE-2022-41640.json create mode 100644 2022/41xxx/CVE-2022-41643.json create mode 100644 2022/41xxx/CVE-2022-41647.json create mode 100644 2022/41xxx/CVE-2022-41650.json create mode 100644 2022/41xxx/CVE-2022-41655.json create mode 100644 2022/41xxx/CVE-2022-41656.json create mode 100644 2022/41xxx/CVE-2022-41660.json create mode 100644 2022/41xxx/CVE-2022-41661.json create mode 100644 2022/41xxx/CVE-2022-41662.json create mode 100644 2022/41xxx/CVE-2022-41663.json create mode 100644 2022/41xxx/CVE-2022-41664.json create mode 100644 2022/41xxx/CVE-2022-41665.json create mode 100644 2022/41xxx/CVE-2022-41666.json create mode 100644 2022/41xxx/CVE-2022-41667.json create mode 100644 2022/41xxx/CVE-2022-41668.json create mode 100644 2022/41xxx/CVE-2022-41669.json create mode 100644 2022/41xxx/CVE-2022-41670.json create mode 100644 2022/41xxx/CVE-2022-41671.json diff --git a/2014/2xxx/CVE-2014-2265.json b/2014/2xxx/CVE-2014-2265.json index af2819b45f6..90083e7301a 100644 --- a/2014/2xxx/CVE-2014-2265.json +++ b/2014/2xxx/CVE-2014-2265.json @@ -57,11 +57,6 @@ "refsource": "CONFIRM", "url": "http://contactform7.com/2014/02/26/contact-form-7-372/" }, - { - "name": "http://www.hedgehogsecurity.co.uk/2014/02/26/contactform7-vulnerability/", - "refsource": "MISC", - "url": "http://www.hedgehogsecurity.co.uk/2014/02/26/contactform7-vulnerability/" - }, { "name": "http://wordpress.org/plugins/contact-form-7/changelog", "refsource": "CONFIRM", @@ -71,6 +66,16 @@ "refsource": "MISC", "name": "http://web.archive.org/web/20140727133642/http://www.hedgehogsecurity.co.uk/2014/02/26/contactform7-vulnerability/", "url": "http://web.archive.org/web/20140727133642/http://www.hedgehogsecurity.co.uk/2014/02/26/contactform7-vulnerability/" + }, + { + "refsource": "MISC", + "name": "https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-contact-form-7-security-bypass-3-7-1/", + "url": "https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-contact-form-7-security-bypass-3-7-1/" + }, + { + "refsource": "MISC", + "name": "https://www.cvedetails.com/cve/CVE-2014-2265/", + "url": "https://www.cvedetails.com/cve/CVE-2014-2265/" } ] } diff --git a/2020/18xxx/CVE-2020-18151.json b/2020/18xxx/CVE-2020-18151.json index 8d4ac820251..7f9dfbaff49 100644 --- a/2020/18xxx/CVE-2020-18151.json +++ b/2020/18xxx/CVE-2020-18151.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Cross Site Request Forgerly (CSRF) vulnerability in ThinkCMF v5.1.0, which can add an admin account." + "value": "Cross Site Request Forgery (CSRF) vulnerability in ThinkCMF v5.1.0, which can add an admin account." } ] }, diff --git a/2021/27xxx/CVE-2021-27853.json b/2021/27xxx/CVE-2021-27853.json index e16873d7e93..485ecd404a4 100644 --- a/2021/27xxx/CVE-2021-27853.json +++ b/2021/27xxx/CVE-2021-27853.json @@ -10,7 +10,7 @@ "STATE": "PUBLIC" }, "source": { - "discovery": "EXTERNAL" + "discovery": "EXTERNAL" }, "affects": { "vendor": { @@ -98,16 +98,24 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/" + "refsource": "MISC", + "url": "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/", + "name": "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/" }, { - "refsource": "CONFIRM", - "url": "https://standards.ieee.org/ieee/802.2/1048/" + "refsource": "MISC", + "url": "https://standards.ieee.org/ieee/802.2/1048/", + "name": "https://standards.ieee.org/ieee/802.2/1048/" }, { - "refsource": "CONFIRM", - "url": "https://standards.ieee.org/ieee/802.1Q/10323/" + "refsource": "MISC", + "url": "https://standards.ieee.org/ieee/802.1Q/10323/", + "name": "https://standards.ieee.org/ieee/802.1Q/10323/" + }, + { + "refsource": "CISCO", + "name": "20220927 Vulnerabilities in Layer 2 Network Security Controls Affecting Cisco Products: September 2022", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-VU855201-J3z8CKTX" } ] }, @@ -117,4 +125,4 @@ "value": "Etienne Champetier (@champtar) " } ] -} +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27854.json b/2021/27xxx/CVE-2021-27854.json index 8c8b91fad5e..838ff773dfe 100644 --- a/2021/27xxx/CVE-2021-27854.json +++ b/2021/27xxx/CVE-2021-27854.json @@ -5,12 +5,12 @@ "CVE_data_meta": { "ID": "CVE-2021-27854", "ASSIGNER": "cert@cert.org", - "DATE_PUBLIC": "2022-09-27T01:00:00.000Z", + "DATE_PUBLIC": "2022-09-27T01:00:00.000Z", "TITLE": "L2 network filtering bypass using stacked VLAN0, LLC/SNAP headers, and Ethernet to Wifi frame translation", "STATE": "PUBLIC" }, "source": { - "discovery": "EXTERNAL" + "discovery": "EXTERNAL" }, "affects": { "vendor": { @@ -98,16 +98,19 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/" + "refsource": "MISC", + "url": "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/", + "name": "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/" }, { - "refsource": "CONFIRM", - "url": "https://standards.ieee.org/ieee/802.2/1048/" + "refsource": "MISC", + "url": "https://standards.ieee.org/ieee/802.2/1048/", + "name": "https://standards.ieee.org/ieee/802.2/1048/" }, { - "refsource": "CONFIRM", - "url": "https://standards.ieee.org/ieee/802.1Q/10323/" + "refsource": "MISC", + "url": "https://standards.ieee.org/ieee/802.1Q/10323/", + "name": "https://standards.ieee.org/ieee/802.1Q/10323/" } ] }, @@ -117,4 +120,4 @@ "value": "Etienne Champetier (@champtar) " } ] -} +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27861.json b/2021/27xxx/CVE-2021-27861.json index 1ac34486060..8280ef2e171 100644 --- a/2021/27xxx/CVE-2021-27861.json +++ b/2021/27xxx/CVE-2021-27861.json @@ -5,12 +5,12 @@ "CVE_data_meta": { "ID": "CVE-2021-27861", "ASSIGNER": "cert@cert.org", - "DATE_PUBLIC": "2022-09-27T01:00:00.000Z", + "DATE_PUBLIC": "2022-09-27T01:00:00.000Z", "TITLE": "L2 network filtering bypass using stacked VLAN0 and LLC/SNAP headers with invalid lengths", "STATE": "PUBLIC" }, "source": { - "discovery": "EXTERNAL" + "discovery": "EXTERNAL" }, "affects": { "vendor": { @@ -106,16 +106,19 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/" + "refsource": "MISC", + "url": "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/", + "name": "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/" }, { - "refsource": "CONFIRM", - "url": "https://standards.ieee.org/ieee/802.2/1048/" + "refsource": "MISC", + "url": "https://standards.ieee.org/ieee/802.2/1048/", + "name": "https://standards.ieee.org/ieee/802.2/1048/" }, { - "refsource": "CONFIRM", - "url": "https://standards.ieee.org/ieee/802.1Q/10323/" + "refsource": "MISC", + "url": "https://standards.ieee.org/ieee/802.1Q/10323/", + "name": "https://standards.ieee.org/ieee/802.1Q/10323/" } ] }, @@ -125,4 +128,4 @@ "value": "Etienne Champetier (@champtar) " } ] -} +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27862.json b/2021/27xxx/CVE-2021-27862.json index 78031a5bcfd..6881d2b7384 100644 --- a/2021/27xxx/CVE-2021-27862.json +++ b/2021/27xxx/CVE-2021-27862.json @@ -5,12 +5,12 @@ "CVE_data_meta": { "ID": "CVE-2021-27862", "ASSIGNER": "cert@cert.org", - "DATE_PUBLIC": "2022-09-27T01:00:00.000Z", + "DATE_PUBLIC": "2022-09-27T01:00:00.000Z", "TITLE": "L2 network filtering bypass using stacked VLAN0 and LLC/SNAP headers with an invalid length during Ethernet to Wifi frame translation", "STATE": "PUBLIC" }, "source": { - "discovery": "EXTERNAL" + "discovery": "EXTERNAL" }, "affects": { "vendor": { @@ -87,12 +87,14 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/" + "refsource": "MISC", + "url": "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/", + "name": "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/" }, { - "refsource": "CONFIRM", - "url": "https://standards.ieee.org/ieee/802.2/1048/" + "refsource": "MISC", + "url": "https://standards.ieee.org/ieee/802.2/1048/", + "name": "https://standards.ieee.org/ieee/802.2/1048/" } ] }, @@ -102,4 +104,4 @@ "value": "Etienne Champetier (@champtar) " } ] -} +} \ No newline at end of file diff --git a/2021/35xxx/CVE-2021-35036.json b/2021/35xxx/CVE-2021-35036.json index 2a49653606c..1959646ac47 100644 --- a/2021/35xxx/CVE-2021-35036.json +++ b/2021/35xxx/CVE-2021-35036.json @@ -1 +1,69 @@ -{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ASSIGNER":"PSIRT@zyxel.com.tw","ID":"CVE-2021-35036"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Zyxel","product":{"product_data":[{"product_name":"VMG3625-T50B firmware","version":{"version_data":[{"version_value":"V5.50(ABTL.0)b2k"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-312: Cleartext Storage of Sensitive Information"}]}]},"references":{"reference_data":[{"refsource":"CONFIRM","name":"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-cleartext-storage-of-information-vulnerability","url":"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-cleartext-storage-of-information-vulnerability"}]},"impact":{"cvss":{"baseScore":"6.5","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}},"description":{"description_data":[{"lang":"eng","value":"A cleartext storage of information vulnerability in the Zyxel VMG3625-T50B firmware version V5.50(ABTL.0)b2k could allow an authenticated attacker to obtain sensitive information from the configuration file."}]}} +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "security@zyxel.com.tw", + "ID": "CVE-2021-35036", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Zyxel", + "product": { + "product_data": [ + { + "product_name": "VMG3625-T50B firmware", + "version": { + "version_data": [ + { + "version_value": "V5.50(ABTL.0)b2k" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-312: Cleartext Storage of Sensitive Information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-cleartext-storage-of-information-vulnerability", + "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-cleartext-storage-of-information-vulnerability" + } + ] + }, + "impact": { + "cvss": { + "baseScore": "6.5", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A cleartext storage of information vulnerability in the Zyxel VMG3625-T50B firmware version V5.50(ABTL.0)b2k could allow an authenticated attacker to obtain sensitive information from the configuration file." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41433.json b/2021/41xxx/CVE-2021-41433.json index 968ab4763bc..372a0aa71c6 100644 --- a/2021/41xxx/CVE-2021-41433.json +++ b/2021/41xxx/CVE-2021-41433.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-41433", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-41433", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SQL Injection vulnerability exists in version 1.0 of the Resumes Management and Job Application Website application login form by EGavilan Media that allows authentication bypass through login.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/martinkubecka/CVE-References/blob/main/Untitled-SQLi.md", + "refsource": "MISC", + "name": "https://github.com/martinkubecka/CVE-References/blob/main/Untitled-SQLi.md" + }, + { + "refsource": "MISC", + "name": "https://github.com/martinkubecka/CVE-References/blob/main/CVE-2021-41433.md", + "url": "https://github.com/martinkubecka/CVE-References/blob/main/CVE-2021-41433.md" } ] } diff --git a/2022/1xxx/CVE-2022-1941.json b/2022/1xxx/CVE-2022-1941.json index 815b3726805..b26a494b2a8 100644 --- a/2022/1xxx/CVE-2022-1941.json +++ b/2022/1xxx/CVE-2022-1941.json @@ -145,6 +145,11 @@ "name": "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf", "refsource": "CONFIRM", "url": "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20220927 CVE-2022-1941: Protobuf C++, Python DoS", + "url": "http://www.openwall.com/lists/oss-security/2022/09/27/1" } ] }, diff --git a/2022/23xxx/CVE-2022-23006.json b/2022/23xxx/CVE-2022-23006.json index 2bed68bc7b4..9dc6d085d65 100644 --- a/2022/23xxx/CVE-2022-23006.json +++ b/2022/23xxx/CVE-2022-23006.json @@ -1,18 +1,127 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@wdc.com", "ID": "CVE-2022-23006", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Buffer Overflow Vulnerability in Western Digital My Cloud Home Products and SanDisk ibi" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "My Cloud Home", + "version": { + "version_data": [ + { + "platform": "Linux", + "version_affected": "<", + "version_name": "8.10.0-117", + "version_value": "8.10.0-117" + } + ] + } + }, + { + "product_name": "My Cloud Home Duo", + "version": { + "version_data": [ + { + "platform": "Linux", + "version_affected": "<", + "version_name": "8.10.0-117", + "version_value": "8.10.0-117" + } + ] + } + } + ] + }, + "vendor_name": "Western Digital" + }, + { + "product": { + "product_data": [ + { + "product_name": "ibi", + "version": { + "version_data": [ + { + "platform": "Linux", + "version_affected": "<", + "version_name": "8.10.0-117", + "version_value": "8.10.0-117" + } + ] + } + } + ] + }, + "vendor_name": "SanDisk" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A stack-based buffer overflow vulnerability was found on Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi that could allow an attacker accessing the system locally to read information from /etc/version file. This vulnerability can only be exploited by chaining it with another issue. If an attacker is able to carry out a remote code execution attack, they can gain access to the vulnerable file, due to the presence of insecure functions in code. User interaction is required for exploitation. Exploiting the vulnerability could result in exposure of information, ability to modify files, memory access errors, or system crashes." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 1.8, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121 Stack-based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23006", + "name": "https://nvd.nist.gov/vuln/detail/CVE-2022-23006" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Your device will be automatically updated to the latest firmware version." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/26xxx/CVE-2022-26375.json b/2022/26xxx/CVE-2022-26375.json new file mode 100644 index 00000000000..31db37e30a0 --- /dev/null +++ b/2022/26xxx/CVE-2022-26375.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-26375", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/30xxx/CVE-2022-30544.json b/2022/30xxx/CVE-2022-30544.json new file mode 100644 index 00000000000..3b8cd5c46b0 --- /dev/null +++ b/2022/30xxx/CVE-2022-30544.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-30544", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/31xxx/CVE-2022-31367.json b/2022/31xxx/CVE-2022-31367.json index 0f6760ee4af..6b9ab1a946e 100644 --- a/2022/31xxx/CVE-2022-31367.json +++ b/2022/31xxx/CVE-2022-31367.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-31367", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-31367", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/strapi/strapi/releases/tag/v4.1.10", + "refsource": "MISC", + "name": "https://github.com/strapi/strapi/releases/tag/v4.1.10" + }, + { + "url": "https://github.com/strapi/strapi/releases/tag/v3.6.10", + "refsource": "MISC", + "name": "https://github.com/strapi/strapi/releases/tag/v3.6.10" + }, + { + "refsource": "MISC", + "name": "https://github.com/kos0ng/CVEs/tree/main/CVE-2022-31367", + "url": "https://github.com/kos0ng/CVEs/tree/main/CVE-2022-31367" } ] } diff --git a/2022/34xxx/CVE-2022-34326.json b/2022/34xxx/CVE-2022-34326.json index 64be3c1de56..f6be5a0dfa3 100644 --- a/2022/34xxx/CVE-2022-34326.json +++ b/2022/34xxx/CVE-2022-34326.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34326", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34326", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "On Realtek RTL8195AM devices before 284241d70308ff2519e40afd7b284ba892c730a3, the timer task can be locked when there are frequent and continuous Wi-Fi connection failures for the Soft AP mode." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.realtek.com/en", + "refsource": "MISC", + "name": "https://www.realtek.com/en" + }, + { + "refsource": "MISC", + "name": "https://www.amebaiot.com/en/security_bulletin/cve-2022-34326/", + "url": "https://www.amebaiot.com/en/security_bulletin/cve-2022-34326/" } ] } diff --git a/2022/35xxx/CVE-2022-35730.json b/2022/35xxx/CVE-2022-35730.json new file mode 100644 index 00000000000..3d1ecef7d3d --- /dev/null +++ b/2022/35xxx/CVE-2022-35730.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-35730", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36399.json b/2022/36xxx/CVE-2022-36399.json new file mode 100644 index 00000000000..13eaf22340a --- /dev/null +++ b/2022/36xxx/CVE-2022-36399.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36399", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37028.json b/2022/37xxx/CVE-2022-37028.json index 43398056d8a..c0ecd4e68da 100644 --- a/2022/37xxx/CVE-2022-37028.json +++ b/2022/37xxx/CVE-2022-37028.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-37028", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-37028", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ISAMS 22.2.3.2 is prone to stored Cross-site Scripting (XSS) attack on the title field for groups, allowing an attacker to store a JavaScript payload that will be executed when another user uses the application." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://excellium-services.com/cert-xlm-advisory/CVE-2022-37028", + "refsource": "MISC", + "name": "https://excellium-services.com/cert-xlm-advisory/CVE-2022-37028" + }, + { + "url": "https://www.isams.com/", + "refsource": "MISC", + "name": "https://www.isams.com/" } ] } diff --git a/2022/37xxx/CVE-2022-37193.json b/2022/37xxx/CVE-2022-37193.json index a432fd21932..8f5253a30dd 100644 --- a/2022/37xxx/CVE-2022-37193.json +++ b/2022/37xxx/CVE-2022-37193.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-37193", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-37193", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Chipolo ONE Bluetooth tracker (2020) Chipolo iOS app version 4.13.0 is vulnerable to Incorrect Access Control. Chipolo devices suffer from access revocation evasion attacks once the malicious sharee obtains the access credentials." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://chipolo.net/en-us/products/chipolo-one-4-pack", + "refsource": "MISC", + "name": "https://chipolo.net/en-us/products/chipolo-one-4-pack" + }, + { + "refsource": "MISC", + "name": "https://github.com/zhouxinan/CCS22MaaGIoT/blob/main/ChipoloONE.md", + "url": "https://github.com/zhouxinan/CCS22MaaGIoT/blob/main/ChipoloONE.md" } ] } diff --git a/2022/37xxx/CVE-2022-37209.json b/2022/37xxx/CVE-2022-37209.json index 7eb27f596e6..3836ca239d8 100644 --- a/2022/37xxx/CVE-2022-37209.json +++ b/2022/37xxx/CVE-2022-37209.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-37209", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-37209", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "JFinal CMS 5.1.0 is affected by: SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql9.md", + "refsource": "MISC", + "name": "https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql9.md" + }, + { + "refsource": "MISC", + "name": "https://github.com/AgainstTheLight/CVE-2022-37209/tree/main", + "url": "https://github.com/AgainstTheLight/CVE-2022-37209/tree/main" } ] } diff --git a/2022/37xxx/CVE-2022-37703.json b/2022/37xxx/CVE-2022-37703.json index 5e019d51d50..48a2f42f2f4 100644 --- a/2022/37xxx/CVE-2022-37703.json +++ b/2022/37xxx/CVE-2022-37703.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/MaherAzzouzi/CVE-2022-37703", "url": "https://github.com/MaherAzzouzi/CVE-2022-37703" + }, + { + "refsource": "MISC", + "name": "https://bugs.gentoo.org/870037", + "url": "https://bugs.gentoo.org/870037" } ] } diff --git a/2022/38xxx/CVE-2022-38055.json b/2022/38xxx/CVE-2022-38055.json new file mode 100644 index 00000000000..180f279ee6e --- /dev/null +++ b/2022/38xxx/CVE-2022-38055.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38055", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38057.json b/2022/38xxx/CVE-2022-38057.json new file mode 100644 index 00000000000..3c5e9c43fe2 --- /dev/null +++ b/2022/38xxx/CVE-2022-38057.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38057", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38141.json b/2022/38xxx/CVE-2022-38141.json new file mode 100644 index 00000000000..ffb4ba713c3 --- /dev/null +++ b/2022/38xxx/CVE-2022-38141.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38141", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38335.json b/2022/38xxx/CVE-2022-38335.json index dbfff28b88b..c6cc3ac8504 100644 --- a/2022/38xxx/CVE-2022-38335.json +++ b/2022/38xxx/CVE-2022-38335.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-38335", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-38335", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vtiger CRM v7.4.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the e-mail template modules." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.vtiger.com/", + "refsource": "MISC", + "name": "https://www.vtiger.com/" + }, + { + "url": "https://code.vtiger.com/vtiger/vtigercrm", + "refsource": "MISC", + "name": "https://code.vtiger.com/vtiger/vtigercrm" + }, + { + "refsource": "MISC", + "name": "https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220328-01_Vtiger_CRM_Stored_Cross-Site_Scripting", + "url": "https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220328-01_Vtiger_CRM_Stored_Cross-Site_Scripting" } ] } diff --git a/2022/38xxx/CVE-2022-38456.json b/2022/38xxx/CVE-2022-38456.json new file mode 100644 index 00000000000..0b27dae1f83 --- /dev/null +++ b/2022/38xxx/CVE-2022-38456.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38456", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38467.json b/2022/38xxx/CVE-2022-38467.json new file mode 100644 index 00000000000..bb9ee9bd81d --- /dev/null +++ b/2022/38xxx/CVE-2022-38467.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38467", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38932.json b/2022/38xxx/CVE-2022-38932.json index adc22fd1294..72a5d307a55 100644 --- a/2022/38xxx/CVE-2022-38932.json +++ b/2022/38xxx/CVE-2022-38932.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-38932", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-38932", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "readelf in ToaruOS 2.0.1 has a global overflow allowing RCE when parsing a crafted ELF file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/klange/toaruos/issues/243", + "refsource": "MISC", + "name": "https://github.com/klange/toaruos/issues/243" } ] } diff --git a/2022/39xxx/CVE-2022-39258.json b/2022/39xxx/CVE-2022-39258.json index 6b257718ca1..5848cfc5b76 100644 --- a/2022/39xxx/CVE-2022-39258.json +++ b/2022/39xxx/CVE-2022-39258.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "mailcow is a mailserver suite. A vulnerability innversions prior to 2022-09 allows an attacker to craft a custom Swagger API template to spoof Authorize links. This could redirect a victim to an attacker controller place to steal Swagger authorization credentials or create a phishing page to steal other information. The issue has been fixed with the 2022-09 mailcow Mootember Update. As a workaround, one may delete the Swapper API Documentation from their e-mail server.\n" + "value": "mailcow is a mailserver suite. A vulnerability innversions prior to 2022-09 allows an attacker to craft a custom Swagger API template to spoof Authorize links. This could redirect a victim to an attacker controller place to steal Swagger authorization credentials or create a phishing page to steal other information. The issue has been fixed with the 2022-09 mailcow Mootember Update. As a workaround, one may delete the Swapper API Documentation from their e-mail server." } ] }, diff --git a/2022/39xxx/CVE-2022-39835.json b/2022/39xxx/CVE-2022-39835.json index 4853e9c0d49..5b72c9d8350 100644 --- a/2022/39xxx/CVE-2022-39835.json +++ b/2022/39xxx/CVE-2022-39835.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-39835", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-39835", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Gajim through 1.4.7. The vulnerability allows attackers, via crafted XML stanzas, to correct messages that were not sent by them. The attacker needs to be part of the group chat or single chat." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://dev.gajim.org/gajim/gajim/-/tags", + "refsource": "MISC", + "name": "https://dev.gajim.org/gajim/gajim/-/tags" + }, + { + "refsource": "MISC", + "name": "https://dev.gajim.org/gajim/gajim/-/blob/master/ChangeLog", + "url": "https://dev.gajim.org/gajim/gajim/-/blob/master/ChangeLog" } ] } diff --git a/2022/3xxx/CVE-2022-3303.json b/2022/3xxx/CVE-2022-3303.json index 8dc5571a5d8..60bbc1caa18 100644 --- a/2022/3xxx/CVE-2022-3303.json +++ b/2022/3xxx/CVE-2022-3303.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3303", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Linux kernel", + "version": { + "version_data": [ + { + "version_value": "Fixed in kernel 6.0-rc5" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-667->CWE-362->CWE-476" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d", + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d" + }, + { + "refsource": "MISC", + "name": "https://lore.kernel.org/all/CAFcO6XN7JDM4xSXGhtusQfS2mSBcx50VJKwQpCq=WeLt57aaZA@mail.gmail.com/", + "url": "https://lore.kernel.org/all/CAFcO6XN7JDM4xSXGhtusQfS2mSBcx50VJKwQpCq=WeLt57aaZA@mail.gmail.com/" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition" } ] } diff --git a/2022/3xxx/CVE-2022-3323.json b/2022/3xxx/CVE-2022-3323.json index e14a71659d8..f4b6549d0f3 100644 --- a/2022/3xxx/CVE-2022-3323.json +++ b/2022/3xxx/CVE-2022-3323.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3323", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnreport@tenable.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Advantech iView", + "version": { + "version_data": [ + { + "version_value": "Advantech iView 5.7.04.6469" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.tenable.com/security/research/tra-2022-32", + "url": "https://www.tenable.com/security/research/tra-2022-32" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An SQL injection vulnerability in Advantech iView 5.7.04.6469. The specific flaw exists within the ConfigurationServlet endpoint, which listens on TCP port 8080 by default. An unauthenticated remote attacker can craft a special column_value parameter in the setConfiguration action to bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform SQL injection. For example, the attacker can exploit the vulnerability to retrieve the iView admin password." } ] } diff --git a/2022/3xxx/CVE-2022-3334.json b/2022/3xxx/CVE-2022-3334.json new file mode 100644 index 00000000000..09c9f143946 --- /dev/null +++ b/2022/3xxx/CVE-2022-3334.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3334", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3335.json b/2022/3xxx/CVE-2022-3335.json new file mode 100644 index 00000000000..9600bd7473f --- /dev/null +++ b/2022/3xxx/CVE-2022-3335.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3335", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3336.json b/2022/3xxx/CVE-2022-3336.json new file mode 100644 index 00000000000..19e07e9eb66 --- /dev/null +++ b/2022/3xxx/CVE-2022-3336.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3336", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3337.json b/2022/3xxx/CVE-2022-3337.json new file mode 100644 index 00000000000..00de376a2ee --- /dev/null +++ b/2022/3xxx/CVE-2022-3337.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3337", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3338.json b/2022/3xxx/CVE-2022-3338.json new file mode 100644 index 00000000000..5a30ee01d2c --- /dev/null +++ b/2022/3xxx/CVE-2022-3338.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3338", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3339.json b/2022/3xxx/CVE-2022-3339.json new file mode 100644 index 00000000000..803bd1aabc0 --- /dev/null +++ b/2022/3xxx/CVE-2022-3339.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3339", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3340.json b/2022/3xxx/CVE-2022-3340.json new file mode 100644 index 00000000000..57389825a66 --- /dev/null +++ b/2022/3xxx/CVE-2022-3340.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3340", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3341.json b/2022/3xxx/CVE-2022-3341.json new file mode 100644 index 00000000000..751daaddcf5 --- /dev/null +++ b/2022/3xxx/CVE-2022-3341.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3341", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3342.json b/2022/3xxx/CVE-2022-3342.json new file mode 100644 index 00000000000..448c19b6f4b --- /dev/null +++ b/2022/3xxx/CVE-2022-3342.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3342", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3343.json b/2022/3xxx/CVE-2022-3343.json new file mode 100644 index 00000000000..74a36a40e70 --- /dev/null +++ b/2022/3xxx/CVE-2022-3343.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3343", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3344.json b/2022/3xxx/CVE-2022-3344.json new file mode 100644 index 00000000000..332c9eff7da --- /dev/null +++ b/2022/3xxx/CVE-2022-3344.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3344", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40128.json b/2022/40xxx/CVE-2022-40128.json new file mode 100644 index 00000000000..0edee2dd8e4 --- /dev/null +++ b/2022/40xxx/CVE-2022-40128.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40128", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40130.json b/2022/40xxx/CVE-2022-40130.json new file mode 100644 index 00000000000..16bb399e493 --- /dev/null +++ b/2022/40xxx/CVE-2022-40130.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40130", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40192.json b/2022/40xxx/CVE-2022-40192.json new file mode 100644 index 00000000000..120cb36a071 --- /dev/null +++ b/2022/40xxx/CVE-2022-40192.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40192", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40203.json b/2022/40xxx/CVE-2022-40203.json new file mode 100644 index 00000000000..b99680b6aef --- /dev/null +++ b/2022/40xxx/CVE-2022-40203.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40203", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40209.json b/2022/40xxx/CVE-2022-40209.json new file mode 100644 index 00000000000..48b8cfad144 --- /dev/null +++ b/2022/40xxx/CVE-2022-40209.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40209", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40216.json b/2022/40xxx/CVE-2022-40216.json new file mode 100644 index 00000000000..f591c7414bf --- /dev/null +++ b/2022/40xxx/CVE-2022-40216.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40216", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40218.json b/2022/40xxx/CVE-2022-40218.json new file mode 100644 index 00000000000..ce1a6991404 --- /dev/null +++ b/2022/40xxx/CVE-2022-40218.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40218", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40311.json b/2022/40xxx/CVE-2022-40311.json new file mode 100644 index 00000000000..11ab043ac69 --- /dev/null +++ b/2022/40xxx/CVE-2022-40311.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40311", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40352.json b/2022/40xxx/CVE-2022-40352.json index 9adfb76f1d0..dd116ebd0ce 100644 --- a/2022/40xxx/CVE-2022-40352.json +++ b/2022/40xxx/CVE-2022-40352.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-40352", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-40352", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_traveller.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/songbingxue/Bug_report/blob/main/vendors/mayuri_k/online-tours-travels-management-system/SQLi-1.md", + "url": "https://github.com/songbingxue/Bug_report/blob/main/vendors/mayuri_k/online-tours-travels-management-system/SQLi-1.md" } ] } diff --git a/2022/40xxx/CVE-2022-40353.json b/2022/40xxx/CVE-2022-40353.json index 6bba5863061..a450e855459 100644 --- a/2022/40xxx/CVE-2022-40353.json +++ b/2022/40xxx/CVE-2022-40353.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-40353", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-40353", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/up_booking.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/songbingxue/Bug_report/blob/main/vendors/mayuri_k/online-tours-travels-management-system/SQLi-2.md", + "url": "https://github.com/songbingxue/Bug_report/blob/main/vendors/mayuri_k/online-tours-travels-management-system/SQLi-2.md" } ] } diff --git a/2022/40xxx/CVE-2022-40354.json b/2022/40xxx/CVE-2022-40354.json index 715c913c0d9..df28babd7f4 100644 --- a/2022/40xxx/CVE-2022-40354.json +++ b/2022/40xxx/CVE-2022-40354.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-40354", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-40354", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_booking.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/songbingxue/Bug_report/blob/main/vendors/mayuri_k/online-tours-travels-management-system/SQLi-3.md", + "url": "https://github.com/songbingxue/Bug_report/blob/main/vendors/mayuri_k/online-tours-travels-management-system/SQLi-3.md" } ] } diff --git a/2022/40xxx/CVE-2022-40697.json b/2022/40xxx/CVE-2022-40697.json new file mode 100644 index 00000000000..fc8c447aca2 --- /dev/null +++ b/2022/40xxx/CVE-2022-40697.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40697", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40699.json b/2022/40xxx/CVE-2022-40699.json new file mode 100644 index 00000000000..2010cd00235 --- /dev/null +++ b/2022/40xxx/CVE-2022-40699.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40699", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40700.json b/2022/40xxx/CVE-2022-40700.json new file mode 100644 index 00000000000..ff7c8c414b3 --- /dev/null +++ b/2022/40xxx/CVE-2022-40700.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40700", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/40xxx/CVE-2022-40816.json b/2022/40xxx/CVE-2022-40816.json index dd306bb520b..63968117d43 100644 --- a/2022/40xxx/CVE-2022-40816.json +++ b/2022/40xxx/CVE-2022-40816.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-40816", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-40816", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zammad 5.2.1 is vulnerable to Incorrect Access Control. Zammad's asset handling mechanism has logic to ensure that customer users are not able to see personal information of other users. This logic was not effective when used through a web socket connection, so that a logged-in attacker would be able to fetch personal data of other users by querying the Zammad API. This issue is fixed in , 5.2.2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/de/advisories/zaa-2022-09", + "refsource": "MISC", + "name": "https://zammad.com/de/advisories/zaa-2022-09" } ] } diff --git a/2022/40xxx/CVE-2022-40817.json b/2022/40xxx/CVE-2022-40817.json index dfd9ac59e51..3bc2d712c68 100644 --- a/2022/40xxx/CVE-2022-40817.json +++ b/2022/40xxx/CVE-2022-40817.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-40817", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-40817", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zammad 5.2.1 has a fine-grained permission model that allows to configure read-only access to tickets. However, agents were still wrongly able to perform some operations on such tickets, like adding and removing links, tags. and related answers. This issue has been fixed in 5.2.2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://zammad.com/de/advisories/zaa-2022-10", + "refsource": "MISC", + "name": "https://zammad.com/de/advisories/zaa-2022-10" } ] } diff --git a/2022/40xxx/CVE-2022-40877.json b/2022/40xxx/CVE-2022-40877.json index 43a5d341da3..a350d9af228 100644 --- a/2022/40xxx/CVE-2022-40877.json +++ b/2022/40xxx/CVE-2022-40877.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-40877", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-40877", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Exam Reviewer Management System 1.0 is vulnerable to SQL Injection via the \u2018id\u2019 parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.exploit-db.com/exploits/50725", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/50725" } ] } diff --git a/2022/40xxx/CVE-2022-40878.json b/2022/40xxx/CVE-2022-40878.json index 554082a0eb6..d5a639e8a27 100644 --- a/2022/40xxx/CVE-2022-40878.json +++ b/2022/40xxx/CVE-2022-40878.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-40878", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-40878", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Exam Reviewer Management System 1.0, an authenticated attacker can upload a web-shell php file in profile page to achieve Remote Code Execution (RCE)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.exploit-db.com/exploits/50726", + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/50726" } ] } diff --git a/2022/40xxx/CVE-2022-40975.json b/2022/40xxx/CVE-2022-40975.json new file mode 100644 index 00000000000..e7ffe0c4b2f --- /dev/null +++ b/2022/40xxx/CVE-2022-40975.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40975", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41132.json b/2022/41xxx/CVE-2022-41132.json new file mode 100644 index 00000000000..76d1f46c4a1 --- /dev/null +++ b/2022/41xxx/CVE-2022-41132.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41132", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41134.json b/2022/41xxx/CVE-2022-41134.json new file mode 100644 index 00000000000..35d781b3bb6 --- /dev/null +++ b/2022/41xxx/CVE-2022-41134.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41134", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41135.json b/2022/41xxx/CVE-2022-41135.json new file mode 100644 index 00000000000..9b58ff6293e --- /dev/null +++ b/2022/41xxx/CVE-2022-41135.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41135", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41155.json b/2022/41xxx/CVE-2022-41155.json new file mode 100644 index 00000000000..a43926dc64c --- /dev/null +++ b/2022/41xxx/CVE-2022-41155.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41155", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41315.json b/2022/41xxx/CVE-2022-41315.json new file mode 100644 index 00000000000..742c78dff50 --- /dev/null +++ b/2022/41xxx/CVE-2022-41315.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41315", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41609.json b/2022/41xxx/CVE-2022-41609.json new file mode 100644 index 00000000000..e45a3faba63 --- /dev/null +++ b/2022/41xxx/CVE-2022-41609.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41609", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41612.json b/2022/41xxx/CVE-2022-41612.json new file mode 100644 index 00000000000..9b0e715a2bd --- /dev/null +++ b/2022/41xxx/CVE-2022-41612.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41612", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41615.json b/2022/41xxx/CVE-2022-41615.json new file mode 100644 index 00000000000..c5550cb71bd --- /dev/null +++ b/2022/41xxx/CVE-2022-41615.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41615", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41616.json b/2022/41xxx/CVE-2022-41616.json new file mode 100644 index 00000000000..4220e040a38 --- /dev/null +++ b/2022/41xxx/CVE-2022-41616.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41616", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41618.json b/2022/41xxx/CVE-2022-41618.json new file mode 100644 index 00000000000..1eb632eab7a --- /dev/null +++ b/2022/41xxx/CVE-2022-41618.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41618", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41620.json b/2022/41xxx/CVE-2022-41620.json new file mode 100644 index 00000000000..9ff75e05b19 --- /dev/null +++ b/2022/41xxx/CVE-2022-41620.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41620", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41623.json b/2022/41xxx/CVE-2022-41623.json new file mode 100644 index 00000000000..8cf97567e08 --- /dev/null +++ b/2022/41xxx/CVE-2022-41623.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41623", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41633.json b/2022/41xxx/CVE-2022-41633.json new file mode 100644 index 00000000000..1dac77459b9 --- /dev/null +++ b/2022/41xxx/CVE-2022-41633.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41633", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41634.json b/2022/41xxx/CVE-2022-41634.json new file mode 100644 index 00000000000..72d078148df --- /dev/null +++ b/2022/41xxx/CVE-2022-41634.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41634", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41635.json b/2022/41xxx/CVE-2022-41635.json new file mode 100644 index 00000000000..58d6d87cef1 --- /dev/null +++ b/2022/41xxx/CVE-2022-41635.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41635", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41638.json b/2022/41xxx/CVE-2022-41638.json new file mode 100644 index 00000000000..c527f7bda89 --- /dev/null +++ b/2022/41xxx/CVE-2022-41638.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41638", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41640.json b/2022/41xxx/CVE-2022-41640.json new file mode 100644 index 00000000000..8fce3e7505e --- /dev/null +++ b/2022/41xxx/CVE-2022-41640.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41640", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41643.json b/2022/41xxx/CVE-2022-41643.json new file mode 100644 index 00000000000..1f7cb693698 --- /dev/null +++ b/2022/41xxx/CVE-2022-41643.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41643", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41647.json b/2022/41xxx/CVE-2022-41647.json new file mode 100644 index 00000000000..37752fbd1c1 --- /dev/null +++ b/2022/41xxx/CVE-2022-41647.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41647", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41650.json b/2022/41xxx/CVE-2022-41650.json new file mode 100644 index 00000000000..3755688967e --- /dev/null +++ b/2022/41xxx/CVE-2022-41650.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41650", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41655.json b/2022/41xxx/CVE-2022-41655.json new file mode 100644 index 00000000000..606f13830a6 --- /dev/null +++ b/2022/41xxx/CVE-2022-41655.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41655", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41656.json b/2022/41xxx/CVE-2022-41656.json new file mode 100644 index 00000000000..cde88b9248d --- /dev/null +++ b/2022/41xxx/CVE-2022-41656.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41656", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41660.json b/2022/41xxx/CVE-2022-41660.json new file mode 100644 index 00000000000..94dc7e14f1d --- /dev/null +++ b/2022/41xxx/CVE-2022-41660.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41660", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41661.json b/2022/41xxx/CVE-2022-41661.json new file mode 100644 index 00000000000..b6f052a195d --- /dev/null +++ b/2022/41xxx/CVE-2022-41661.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41661", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41662.json b/2022/41xxx/CVE-2022-41662.json new file mode 100644 index 00000000000..e794a43e311 --- /dev/null +++ b/2022/41xxx/CVE-2022-41662.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41662", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41663.json b/2022/41xxx/CVE-2022-41663.json new file mode 100644 index 00000000000..e87fc14d4d5 --- /dev/null +++ b/2022/41xxx/CVE-2022-41663.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41663", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41664.json b/2022/41xxx/CVE-2022-41664.json new file mode 100644 index 00000000000..3f587e2d1ba --- /dev/null +++ b/2022/41xxx/CVE-2022-41664.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41664", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41665.json b/2022/41xxx/CVE-2022-41665.json new file mode 100644 index 00000000000..0539b7457c3 --- /dev/null +++ b/2022/41xxx/CVE-2022-41665.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41665", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41666.json b/2022/41xxx/CVE-2022-41666.json new file mode 100644 index 00000000000..0e3775e4a76 --- /dev/null +++ b/2022/41xxx/CVE-2022-41666.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41666", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41667.json b/2022/41xxx/CVE-2022-41667.json new file mode 100644 index 00000000000..7ba3a640919 --- /dev/null +++ b/2022/41xxx/CVE-2022-41667.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41667", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41668.json b/2022/41xxx/CVE-2022-41668.json new file mode 100644 index 00000000000..92e16cb8674 --- /dev/null +++ b/2022/41xxx/CVE-2022-41668.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41668", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41669.json b/2022/41xxx/CVE-2022-41669.json new file mode 100644 index 00000000000..59599eacffe --- /dev/null +++ b/2022/41xxx/CVE-2022-41669.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41669", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41670.json b/2022/41xxx/CVE-2022-41670.json new file mode 100644 index 00000000000..73f8e4b9288 --- /dev/null +++ b/2022/41xxx/CVE-2022-41670.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41670", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/41xxx/CVE-2022-41671.json b/2022/41xxx/CVE-2022-41671.json new file mode 100644 index 00000000000..6727e1ebf86 --- /dev/null +++ b/2022/41xxx/CVE-2022-41671.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-41671", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file