diff --git a/2020/2xxx/CVE-2020-2038.json b/2020/2xxx/CVE-2020-2038.json index 8c3f814d050..59d3ccbeab8 100644 --- a/2020/2xxx/CVE-2020-2038.json +++ b/2020/2xxx/CVE-2020-2038.json @@ -121,6 +121,11 @@ "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-2038", "name": "https://security.paloaltonetworks.com/CVE-2020-2038" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/168008/PAN-OS-10.0-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/168008/PAN-OS-10.0-Remote-Code-Execution.html" } ] }, diff --git a/2022/1xxx/CVE-2022-1920.json b/2022/1xxx/CVE-2022-1920.json index 0f2b70379a1..00f8031433c 100644 --- a/2022/1xxx/CVE-2022-1920.json +++ b/2022/1xxx/CVE-2022-1920.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1226", "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1226" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220809 [SECURITY] [DLA 3069-1] gst-plugins-good1.0 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00001.html" } ] }, diff --git a/2022/1xxx/CVE-2022-1921.json b/2022/1xxx/CVE-2022-1921.json index 4f43e51c22e..5ad2c2a7eff 100644 --- a/2022/1xxx/CVE-2022-1921.json +++ b/2022/1xxx/CVE-2022-1921.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1224", "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1224" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220809 [SECURITY] [DLA 3069-1] gst-plugins-good1.0 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00001.html" } ] }, diff --git a/2022/1xxx/CVE-2022-1922.json b/2022/1xxx/CVE-2022-1922.json index 1b8e3d2aade..5fa54bbad05 100644 --- a/2022/1xxx/CVE-2022-1922.json +++ b/2022/1xxx/CVE-2022-1922.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225", "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220809 [SECURITY] [DLA 3069-1] gst-plugins-good1.0 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00001.html" } ] }, diff --git a/2022/1xxx/CVE-2022-1923.json b/2022/1xxx/CVE-2022-1923.json index d55187a9804..f0d989dba0c 100644 --- a/2022/1xxx/CVE-2022-1923.json +++ b/2022/1xxx/CVE-2022-1923.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225", "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220809 [SECURITY] [DLA 3069-1] gst-plugins-good1.0 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00001.html" } ] }, diff --git a/2022/1xxx/CVE-2022-1924.json b/2022/1xxx/CVE-2022-1924.json index 15b679bdeda..12fc70f769d 100644 --- a/2022/1xxx/CVE-2022-1924.json +++ b/2022/1xxx/CVE-2022-1924.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225", "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220809 [SECURITY] [DLA 3069-1] gst-plugins-good1.0 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00001.html" } ] }, diff --git a/2022/1xxx/CVE-2022-1925.json b/2022/1xxx/CVE-2022-1925.json index 09098c2fe6e..5e971079f5e 100644 --- a/2022/1xxx/CVE-2022-1925.json +++ b/2022/1xxx/CVE-2022-1925.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225", "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220809 [SECURITY] [DLA 3069-1] gst-plugins-good1.0 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00001.html" } ] }, diff --git a/2022/29xxx/CVE-2022-29476.json b/2022/29xxx/CVE-2022-29476.json new file mode 100644 index 00000000000..14f44d26825 --- /dev/null +++ b/2022/29xxx/CVE-2022-29476.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-29476", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2122.json b/2022/2xxx/CVE-2022-2122.json index 9719ef43a0e..94627e87192 100644 --- a/2022/2xxx/CVE-2022-2122.json +++ b/2022/2xxx/CVE-2022-2122.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225", "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220809 [SECURITY] [DLA 3069-1] gst-plugins-good1.0 security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00001.html" } ] }, diff --git a/2022/2xxx/CVE-2022-2739.json b/2022/2xxx/CVE-2022-2739.json new file mode 100644 index 00000000000..08f72f71d03 --- /dev/null +++ b/2022/2xxx/CVE-2022-2739.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2739", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2740.json b/2022/2xxx/CVE-2022-2740.json new file mode 100644 index 00000000000..ad4b48c3cd8 --- /dev/null +++ b/2022/2xxx/CVE-2022-2740.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2740", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/31xxx/CVE-2022-31101.json b/2022/31xxx/CVE-2022-31101.json index 4685c5addfa..36161391f69 100644 --- a/2022/31xxx/CVE-2022-31101.json +++ b/2022/31xxx/CVE-2022-31101.json @@ -78,6 +78,11 @@ "name": "https://github.com/PrestaShop/blockwishlist/commit/b3ec4b85af5fd73f74d55390b226d221298ca084", "refsource": "MISC", "url": "https://github.com/PrestaShop/blockwishlist/commit/b3ec4b85af5fd73f74d55390b226d221298ca084" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/168003/Prestashop-Blockwishlist-2.1.0-SQL-Injection.html", + "url": "http://packetstormsecurity.com/files/168003/Prestashop-Blockwishlist-2.1.0-SQL-Injection.html" } ] }, diff --git a/2022/31xxx/CVE-2022-31474.json b/2022/31xxx/CVE-2022-31474.json new file mode 100644 index 00000000000..57b072e24dd --- /dev/null +++ b/2022/31xxx/CVE-2022-31474.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-31474", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34140.json b/2022/34xxx/CVE-2022-34140.json index 318ea851dd6..5446afe0f73 100644 --- a/2022/34xxx/CVE-2022-34140.json +++ b/2022/34xxx/CVE-2022-34140.json @@ -61,6 +61,11 @@ "url": "https://github.com/liufee/cms/issues/61", "refsource": "MISC", "name": "https://github.com/liufee/cms/issues/61" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/168012/Feehi-CMS-2.1.1-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/168012/Feehi-CMS-2.1.1-Cross-Site-Scripting.html" } ] } diff --git a/2022/35xxx/CVE-2022-35277.json b/2022/35xxx/CVE-2022-35277.json new file mode 100644 index 00000000000..136ac401669 --- /dev/null +++ b/2022/35xxx/CVE-2022-35277.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-35277", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/35xxx/CVE-2022-35426.json b/2022/35xxx/CVE-2022-35426.json index 1413a0bc353..cebeaaf876d 100644 --- a/2022/35xxx/CVE-2022-35426.json +++ b/2022/35xxx/CVE-2022-35426.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-35426", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-35426", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "UCMS 1.6 is vulnerable to arbitrary file upload via ucms/sadmin/file PHP file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cc-225/ucms_v1.6/issues/1", + "refsource": "MISC", + "name": "https://github.com/cc-225/ucms_v1.6/issues/1" } ] } diff --git a/2022/35xxx/CVE-2022-35491.json b/2022/35xxx/CVE-2022-35491.json index dcd9d494234..632dcf919f6 100644 --- a/2022/35xxx/CVE-2022-35491.json +++ b/2022/35xxx/CVE-2022-35491.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-35491", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-35491", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "TOTOLINK A3002RU V3.0.0-B20220304.1804 has a hardcoded password for root in /etc/shadow.sample." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/1337536723/iot/blob/main/totolink/A3002RU.md", + "refsource": "MISC", + "name": "https://github.com/1337536723/iot/blob/main/totolink/A3002RU.md" } ] } diff --git a/2022/35xxx/CVE-2022-35725.json b/2022/35xxx/CVE-2022-35725.json new file mode 100644 index 00000000000..4abf03c368c --- /dev/null +++ b/2022/35xxx/CVE-2022-35725.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-35725", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36345.json b/2022/36xxx/CVE-2022-36345.json new file mode 100644 index 00000000000..b8a61a01852 --- /dev/null +++ b/2022/36xxx/CVE-2022-36345.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36345", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36352.json b/2022/36xxx/CVE-2022-36352.json new file mode 100644 index 00000000000..e87ff95a3fe --- /dev/null +++ b/2022/36xxx/CVE-2022-36352.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36352", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36355.json b/2022/36xxx/CVE-2022-36355.json new file mode 100644 index 00000000000..91cfb5cfe7c --- /dev/null +++ b/2022/36xxx/CVE-2022-36355.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36355", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36365.json b/2022/36xxx/CVE-2022-36365.json new file mode 100644 index 00000000000..241b2ae2ac8 --- /dev/null +++ b/2022/36xxx/CVE-2022-36365.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36365", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36373.json b/2022/36xxx/CVE-2022-36373.json new file mode 100644 index 00000000000..ceff947bb60 --- /dev/null +++ b/2022/36xxx/CVE-2022-36373.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36373", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36376.json b/2022/36xxx/CVE-2022-36376.json new file mode 100644 index 00000000000..e1afa6f3619 --- /dev/null +++ b/2022/36xxx/CVE-2022-36376.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36376", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36383.json b/2022/36xxx/CVE-2022-36383.json new file mode 100644 index 00000000000..af12016ed22 --- /dev/null +++ b/2022/36xxx/CVE-2022-36383.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36383", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36387.json b/2022/36xxx/CVE-2022-36387.json new file mode 100644 index 00000000000..9a8b2eb3da7 --- /dev/null +++ b/2022/36xxx/CVE-2022-36387.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36387", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36390.json b/2022/36xxx/CVE-2022-36390.json new file mode 100644 index 00000000000..27e7fbf3713 --- /dev/null +++ b/2022/36xxx/CVE-2022-36390.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36390", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36422.json b/2022/36xxx/CVE-2022-36422.json new file mode 100644 index 00000000000..fa51c8571b0 --- /dev/null +++ b/2022/36xxx/CVE-2022-36422.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36422", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36428.json b/2022/36xxx/CVE-2022-36428.json new file mode 100644 index 00000000000..a9dad0227b4 --- /dev/null +++ b/2022/36xxx/CVE-2022-36428.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36428", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36791.json b/2022/36xxx/CVE-2022-36791.json new file mode 100644 index 00000000000..5fe4a568fb6 --- /dev/null +++ b/2022/36xxx/CVE-2022-36791.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36791", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36796.json b/2022/36xxx/CVE-2022-36796.json new file mode 100644 index 00000000000..b61b3a7b028 --- /dev/null +++ b/2022/36xxx/CVE-2022-36796.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36796", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36798.json b/2022/36xxx/CVE-2022-36798.json new file mode 100644 index 00000000000..1580af7b5d5 --- /dev/null +++ b/2022/36xxx/CVE-2022-36798.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-36798", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37024.json b/2022/37xxx/CVE-2022-37024.json index 37d12f1584b..bc4c2a78f0a 100644 --- a/2022/37xxx/CVE-2022-37024.json +++ b/2022/37xxx/CVE-2022-37024.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-37024", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-37024", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 2022-07-29 through 2022-07-30 ( 125658, 126003, 126105, and 126120) allow authenticated users to make database changes that lead to remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.manageengine.com/itom/advisory/cve-2022-37024.html", + "url": "https://www.manageengine.com/itom/advisory/cve-2022-37024.html" } ] } diff --git a/2022/37xxx/CVE-2022-37328.json b/2022/37xxx/CVE-2022-37328.json new file mode 100644 index 00000000000..0679a10ff4e --- /dev/null +++ b/2022/37xxx/CVE-2022-37328.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37328", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37330.json b/2022/37xxx/CVE-2022-37330.json new file mode 100644 index 00000000000..39e69bfaae2 --- /dev/null +++ b/2022/37xxx/CVE-2022-37330.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37330", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37335.json b/2022/37xxx/CVE-2022-37335.json new file mode 100644 index 00000000000..ab5a46c4337 --- /dev/null +++ b/2022/37xxx/CVE-2022-37335.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37335", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37338.json b/2022/37xxx/CVE-2022-37338.json new file mode 100644 index 00000000000..6846d739145 --- /dev/null +++ b/2022/37xxx/CVE-2022-37338.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37338", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37339.json b/2022/37xxx/CVE-2022-37339.json new file mode 100644 index 00000000000..ad9dc28ab5d --- /dev/null +++ b/2022/37xxx/CVE-2022-37339.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37339", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37344.json b/2022/37xxx/CVE-2022-37344.json new file mode 100644 index 00000000000..4c1d153efe7 --- /dev/null +++ b/2022/37xxx/CVE-2022-37344.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37344", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37407.json b/2022/37xxx/CVE-2022-37407.json new file mode 100644 index 00000000000..b67576cc2f4 --- /dev/null +++ b/2022/37xxx/CVE-2022-37407.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37407", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37411.json b/2022/37xxx/CVE-2022-37411.json new file mode 100644 index 00000000000..1f283da8193 --- /dev/null +++ b/2022/37xxx/CVE-2022-37411.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37411", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37412.json b/2022/37xxx/CVE-2022-37412.json new file mode 100644 index 00000000000..069fb6924d4 --- /dev/null +++ b/2022/37xxx/CVE-2022-37412.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37412", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38058.json b/2022/38xxx/CVE-2022-38058.json new file mode 100644 index 00000000000..38147510cb1 --- /dev/null +++ b/2022/38xxx/CVE-2022-38058.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38058", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38059.json b/2022/38xxx/CVE-2022-38059.json new file mode 100644 index 00000000000..b5aadc3edc8 --- /dev/null +++ b/2022/38xxx/CVE-2022-38059.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38059", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38061.json b/2022/38xxx/CVE-2022-38061.json new file mode 100644 index 00000000000..3019689b3ba --- /dev/null +++ b/2022/38xxx/CVE-2022-38061.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38061", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38067.json b/2022/38xxx/CVE-2022-38067.json new file mode 100644 index 00000000000..295c6ed465c --- /dev/null +++ b/2022/38xxx/CVE-2022-38067.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38067", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38068.json b/2022/38xxx/CVE-2022-38068.json new file mode 100644 index 00000000000..07484cac7c8 --- /dev/null +++ b/2022/38xxx/CVE-2022-38068.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38068", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38070.json b/2022/38xxx/CVE-2022-38070.json new file mode 100644 index 00000000000..17528b689cb --- /dev/null +++ b/2022/38xxx/CVE-2022-38070.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38070", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38093.json b/2022/38xxx/CVE-2022-38093.json new file mode 100644 index 00000000000..2ce96814697 --- /dev/null +++ b/2022/38xxx/CVE-2022-38093.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38093", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file