diff --git a/2020/9xxx/CVE-2020-9419.json b/2020/9xxx/CVE-2020-9419.json index 9d45327c8e4..2ae38ed08f8 100644 --- a/2020/9xxx/CVE-2020-9419.json +++ b/2020/9xxx/CVE-2020-9419.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-9419", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-9419", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Arcadyan Wifi routers VRV9506JAC23 allow remote attackers to inject arbitrary web script or HTML via the hostName and domain_name parameters present in the LAN configuration section of the administrative dashboard." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gist.github.com/AsherDLL/03d0762b5a535e300f1121caebe333ce", + "url": "https://gist.github.com/AsherDLL/03d0762b5a535e300f1121caebe333ce" } ] } diff --git a/2020/9xxx/CVE-2020-9420.json b/2020/9xxx/CVE-2020-9420.json index be5df7b6714..8edf0647618 100644 --- a/2020/9xxx/CVE-2020-9420.json +++ b/2020/9xxx/CVE-2020-9420.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-9420", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-9420", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The login password of the web administrative dashboard in Arcadyan Wifi routers VRV9506JAC23 is sent in cleartext, allowing an attacker to sniff and intercept traffic to learn the administrative credentials to the router." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gist.github.com/AsherDLL/03d0762b5a535e300f1121caebe333ce", + "url": "https://gist.github.com/AsherDLL/03d0762b5a535e300f1121caebe333ce" } ] } diff --git a/2022/24xxx/CVE-2022-24765.json b/2022/24xxx/CVE-2022-24765.json index afd0083a26b..9ebb988c381 100644 --- a/2022/24xxx/CVE-2022-24765.json +++ b/2022/24xxx/CVE-2022-24765.json @@ -123,6 +123,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-2a5de7cb8b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20221213 [SECURITY] [DLA 3239-1] git security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html" } ] }, diff --git a/2022/29xxx/CVE-2022-29187.json b/2022/29xxx/CVE-2022-29187.json index 87bf2214869..6b1db6b02e0 100644 --- a/2022/29xxx/CVE-2022-29187.json +++ b/2022/29xxx/CVE-2022-29187.json @@ -137,6 +137,11 @@ "refsource": "FULLDISC", "name": "20221107 APPLE-SA-2022-11-01-1 Xcode 14.1", "url": "http://seclists.org/fulldisclosure/2022/Nov/1" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20221213 [SECURITY] [DLA 3239-1] git security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html" } ] }, diff --git a/2022/39xxx/CVE-2022-39253.json b/2022/39xxx/CVE-2022-39253.json index ed6e3a85bc4..87586dc1fdb 100644 --- a/2022/39xxx/CVE-2022-39253.json +++ b/2022/39xxx/CVE-2022-39253.json @@ -129,6 +129,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-fb088df94c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7B6JPKX5CGGLAHXJVQMIZNNEEB72FHD/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20221213 [SECURITY] [DLA 3239-1] git security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html" } ] }, diff --git a/2022/39xxx/CVE-2022-39260.json b/2022/39xxx/CVE-2022-39260.json index a8d0bdf5a5d..65647f8a513 100644 --- a/2022/39xxx/CVE-2022-39260.json +++ b/2022/39xxx/CVE-2022-39260.json @@ -127,6 +127,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-fb088df94c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7B6JPKX5CGGLAHXJVQMIZNNEEB72FHD/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20221213 [SECURITY] [DLA 3239-1] git security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html" } ] }, diff --git a/2022/42xxx/CVE-2022-42716.json b/2022/42xxx/CVE-2022-42716.json index a322fd3afef..c9288eff5a8 100644 --- a/2022/42xxx/CVE-2022-42716.json +++ b/2022/42xxx/CVE-2022-42716.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue was discovered in the Arm Mali GPU Kernel Driver. There is a use-after-free. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Midgard r4p0 through r32p0, Bifrost r1p0 through r40p0, and Valhall r19p0 through r40P0." + "value": "An issue was discovered in the Arm Mali GPU Kernel Driver. There is a use-after-free. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Valhall r29p0 through r40P0." } ] },