mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-06 18:53:08 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
2f1042dc3f
commit
e9198a1da4
@ -1,17 +1,66 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-45894",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2021-45894",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "An issue was discovered in Softwarebuero Zauner ARC 4.2.0.4. There is Cleartext Transmission of Sensitive Information."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://syss.de",
|
||||
"refsource": "MISC",
|
||||
"name": "https://syss.de"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-066.txt",
|
||||
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-066.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0452",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1284584"
|
||||
"url": "https://crbug.com/1284584",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1284584"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0453",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1284916"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1284916",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1284916"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0454",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1287962"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1287962",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1287962"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0455",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1270593"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1270593",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1270593"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0456",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1289523"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1289523",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1289523"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0457",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1274445"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1274445",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1274445"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0458",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1267060"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1267060",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1267060"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0459",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1244205"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1244205",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1244205"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0460",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1250227"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1250227",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1250227"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0461",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1256823"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1256823",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1256823"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0462",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1270470"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1270470",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1270470"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,8 +61,8 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Inappropriate implementation in Scroll in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page."
|
||||
"value": "Inappropriate implementation in Scroll in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0463",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1268240"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1268240",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1268240"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0464",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1270095"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1270095",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1270095"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0465",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1281941"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1281941",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1281941"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0466",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1115460"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1115460",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1115460"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0467",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1239496"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1239496",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1239496"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0468",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1252716"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1252716",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1252716"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0469",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1279531"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1279531",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1279531"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0470",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1269225"
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1269225",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1269225"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0789",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1289383"
|
||||
"url": "https://crbug.com/1289383",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1289383"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0790",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1274077"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1274077",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1274077"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0791",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1278322"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1278322",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1278322"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0792",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1285885"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1285885",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1285885"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0793",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1291728"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1291728",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1291728"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0794",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1294097"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1294097",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1294097"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0795",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1282782"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1282782",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1282782"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0796",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1295786"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1295786",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1295786"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0797",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1281908"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1281908",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1281908"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0798",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1283402"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1283402",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1283402"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0799",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1279188"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1279188",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1279188"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0800",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1242962"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1242962",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1242962"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0802",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1270052"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1270052",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1270052"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0803",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1280233"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1280233",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1280233"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0804",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1264561"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1264561",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1264561"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0805",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1290700"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1290700",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1290700"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0806",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1283434"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1283434",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1283434"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0807",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1287364"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1287364",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1287364"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0808",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1292271"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1292271",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1292271"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-0809",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com"
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -45,10 +46,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/1293428"
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html"
|
||||
"url": "https://crbug.com/1293428",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/1293428"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -60,4 +65,4 @@
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,100 +1,104 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "product-cna@github.com",
|
||||
"ID": "CVE-2022-23732",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Path traversal in GitHub Enterprise Server management console leading to a bypass of CSRF protections"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "GitHub Enterprise Server",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "3.1",
|
||||
"version_value": "3.1.19"
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "product-cna@github.com",
|
||||
"ID": "CVE-2022-23732",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Path traversal in GitHub Enterprise Server management console leading to a bypass of CSRF protections"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "GitHub Enterprise Server",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "3.1",
|
||||
"version_value": "3.1.19"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "3.2",
|
||||
"version_value": "3.2.11"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "3.3",
|
||||
"version_value": "3.3.6"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "3.4",
|
||||
"version_value": "3.4.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "3.2",
|
||||
"version_value": "3.2.11"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "3.3",
|
||||
"version_value": "3.3.6"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "3.4",
|
||||
"version_value": "3.4.1"
|
||||
}
|
||||
]
|
||||
"vendor_name": "GitHub"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "GitHub"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"credit": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "bitquark"
|
||||
}
|
||||
],
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A path traversal vulnerability was identified in GitHub Enterprise Server management console that allowed the bypass of CSRF protections. This could potentially lead to privilege escalation. To exploit this vulnerability, an attacker would need to target a user that was actively logged into the management console. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.5 and was fixed in versions 3.1.19, 3.2.11, 3.3.6, 3.4.1. This vulnerability was reported via the GitHub Bug Bounty program."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
},
|
||||
"credit": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-23, CWE-352"
|
||||
}
|
||||
"value": "bitquark"
|
||||
}
|
||||
],
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A path traversal vulnerability was identified in GitHub Enterprise Server management console that allowed the bypass of CSRF protections. This could potentially lead to privilege escalation. To exploit this vulnerability, an attacker would need to target a user that was actively logged into the management console. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.5 and was fixed in versions 3.1.19, 3.2.11, 3.3.6, 3.4.1. This vulnerability was reported via the GitHub Bug Bounty program."
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.19"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.11"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.3/admin/release-notes#3.3.6"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.1"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "INTERNAL"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-23, CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.19",
|
||||
"name": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.19"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.11",
|
||||
"name": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.11"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.3/admin/release-notes#3.3.6",
|
||||
"name": "https://docs.github.com/en/enterprise-server@3.3/admin/release-notes#3.3.6"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.1",
|
||||
"name": "https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.1"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "INTERNAL"
|
||||
}
|
||||
}
|
@ -1,17 +1,131 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-25584",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2022-25584",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Seyeon Tech Co., Ltd FlexWATCH FW3170-PS-E Network Video System 4.23-3000_GY allows attackers to access sensitive information."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://211.174.227.102:10001/app/multi/single.asp",
|
||||
"refsource": "MISC",
|
||||
"name": "http://211.174.227.102:10001/app/multi/single.asp"
|
||||
},
|
||||
{
|
||||
"url": "http://211.240.10.38:10001/app/multi/single.asp",
|
||||
"refsource": "MISC",
|
||||
"name": "http://211.240.10.38:10001/app/multi/single.asp"
|
||||
},
|
||||
{
|
||||
"url": "http://121.133.21.35:10001/app/multi/single.asp",
|
||||
"refsource": "MISC",
|
||||
"name": "http://121.133.21.35:10001/app/multi/single.asp"
|
||||
},
|
||||
{
|
||||
"url": "http://211.174.227.102:10001/app/multi/single.asp.aa",
|
||||
"refsource": "MISC",
|
||||
"name": "http://211.174.227.102:10001/app/multi/single.asp.aa"
|
||||
},
|
||||
{
|
||||
"url": "http://211.240.10.38:10001/app/multi/single.asp.ab",
|
||||
"refsource": "MISC",
|
||||
"name": "http://211.240.10.38:10001/app/multi/single.asp.ab"
|
||||
},
|
||||
{
|
||||
"url": "http://121.133.21.35:10001/app/multi/single.asp.ac",
|
||||
"refsource": "MISC",
|
||||
"name": "http://121.133.21.35:10001/app/multi/single.asp.ac"
|
||||
},
|
||||
{
|
||||
"url": "http://211.174.227.230:10001/app/multi/single.asp",
|
||||
"refsource": "MISC",
|
||||
"name": "http://211.174.227.230:10001/app/multi/single.asp"
|
||||
},
|
||||
{
|
||||
"url": "http://211.36.62.253:10001/app/multi/single.asp",
|
||||
"refsource": "MISC",
|
||||
"name": "http://211.36.62.253:10001/app/multi/single.asp"
|
||||
},
|
||||
{
|
||||
"url": "http://118.176.196.247:10001/app/multi/single.asp",
|
||||
"refsource": "MISC",
|
||||
"name": "http://118.176.196.247:10001/app/multi/single.asp"
|
||||
},
|
||||
{
|
||||
"url": "http://183.100.61.196:10001/app/multi/single.asp",
|
||||
"refsource": "MISC",
|
||||
"name": "http://183.100.61.196:10001/app/multi/single.asp"
|
||||
},
|
||||
{
|
||||
"url": "http://27.1.124.18:10001/app/multi/single.asp",
|
||||
"refsource": "MISC",
|
||||
"name": "http://27.1.124.18:10001/app/multi/single.asp"
|
||||
},
|
||||
{
|
||||
"url": "http://115.142.194.178:10001/app/multi/single.asp",
|
||||
"refsource": "MISC",
|
||||
"name": "http://115.142.194.178:10001/app/multi/single.asp"
|
||||
},
|
||||
{
|
||||
"url": "http://115.142.194.178:10001/app/multi/single.asp.ad",
|
||||
"refsource": "MISC",
|
||||
"name": "http://115.142.194.178:10001/app/multi/single.asp.ad"
|
||||
},
|
||||
{
|
||||
"url": "http://210.223.145.159:10001/app/multi/single.asp",
|
||||
"refsource": "MISC",
|
||||
"name": "http://210.223.145.159:10001/app/multi/single.asp"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/NSSCYCTFER/Flexwatch",
|
||||
"url": "https://github.com/NSSCYCTFER/Flexwatch"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,61 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-26585",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2022-26585",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Mingsoft MCMS v5.2.7 was discovered to contain a SQL injection vulnerability via /cms/content/list."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://gitee.com/mingSoft/MCMS/issues/I4W1S9",
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitee.com/mingSoft/MCMS/issues/I4W1S9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,61 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-26619",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2022-26619",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Halo Blog CMS v1.4.17 was discovered to allow attackers to upload arbitrary files via the Attachment Upload function."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/halo-dev/halo/issues/1702",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/halo-dev/halo/issues/1702"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user