"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-10-12 14:00:33 +00:00
parent a24e3d227c
commit e315d4070d
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
6 changed files with 117 additions and 7 deletions

View File

@ -61,6 +61,16 @@
"refsource": "GENTOO",
"name": "GLSA-202007-17",
"url": "https://security.gentoo.org/glsa/202007-17"
},
{
"refsource": "MISC",
"name": "https://bugs.gentoo.org/711220#c3",
"url": "https://bugs.gentoo.org/711220#c3"
},
{
"refsource": "MISC",
"name": "https://bugs.gentoo.org/876247#c0",
"url": "https://bugs.gentoo.org/876247#c0"
}
]
}

View File

@ -61,6 +61,16 @@
"refsource": "GENTOO",
"name": "GLSA-202007-17",
"url": "https://security.gentoo.org/glsa/202007-17"
},
{
"refsource": "MISC",
"name": "https://bugs.gentoo.org/711220#c3",
"url": "https://bugs.gentoo.org/711220#c3"
},
{
"refsource": "MISC",
"name": "https://bugs.gentoo.org/876247#c0",
"url": "https://bugs.gentoo.org/876247#c0"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-33106",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-33106",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "WiJungle NGFW Version U250 was discovered to be vulnerable to No Rate Limit attack, allowing the attacker to brute force the admin password leading to Account Take Over."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://wijungle.com",
"refsource": "MISC",
"name": "http://wijungle.com"
},
{
"refsource": "MISC",
"name": "https://hexisanoob.gitbook.io/hexisanoob/cves/cve-2022-33106",
"url": "https://hexisanoob.gitbook.io/hexisanoob/cves/cve-2022-33106"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with LazyList object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain."
"value": "Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain."
}
]
},
@ -71,6 +71,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2022-07dd9375b2",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ZOZVWY3X72FZZCCRAKRJYTQOJ6LUD6Z/"
},
{
"refsource": "MISC",
"name": "https://discuss.lightbend.com/t/impact-of-cve-2022-36944-on-akka-cluster-akka-actor-akka-remote/10007/2",
"url": "https://discuss.lightbend.com/t/impact-of-cve-2022-36944-on-akka-cluster-akka-actor-akka-remote/10007/2"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3468",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-3469",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}